The New York Times has been howling about “warrantless wiretapping” conducted in the United States by the National Security Agency and directed against al-Qaeda operatives who might be wandering around our country carrying carrying knitting needles or other household implements that are still allowed on planes.
But even as the newspaper worries about the privacy rights of suspected terrorists, why has it not said a word about the possibility that it itself is a target of warrantless surveillance, and not by the U.S. government but by far less friendly forces? Is the newspaper unaware of the problem, or does it find it inconvenient to acknowledge it, or does it simply have its head in the sand?
Without subjecting Arthur Sulzberger, Jr. to enhanced interrogation methods, we cannot say. But Jennifer Dyer, formerly a Commander in U.S. Naval Intelligence, offers her analysis of the issue in another Connecting the Dots exclusive. Her short answer is yes, such eavesdropping is probably happening. Her long answer is right here:
Russia, in particular, has an extensive history of using its diplomatic and civilian facilities abroad as bases for intelligence collection — and for collecting against civilian targets as well as government agencies. But Russia is not the only suspect; and technological advances have changed the collection targets and methods somewhat, since the public last had occasion to think very hard about this topic.
The dimensions of the problem are key factors. A Department of Defense publication from 1989 [p. 16] provides a useful overview of former-Soviet attempts and capabilities to monitor foreign communications abroad, pointing out, notably, the suitability of the Soviet consular compound in New York City for intercepting several types of voice communications in most of Manhattan. Although phone communications were overwhelmingly transmitted via landline at that time, the DOD security study observed that in more than half of all phone connections, calls were switched randomly over interim links to optimize circuit loading [p. 159], and that it was impossible to ensure that every potential connection path was secure against monitoring.
This warning was cutting-edge in the 1980’s, when physical tapping, of the phone lines associated with specific individuals or organizations, was still what the average person thought of in this regard. If there were no men in trench coats crouched in leased office spaces next door, could we not assume we were tap-free?
Foreign intelligence agencies, however, study our civil-communications infrastructure far more closely than we do, and for the specific purpose of identifying vulnerabilities. It has been quite some time since the surveillance of a phone call had to be undertaken next door, or even near a switching room in a phone company building. In the wireless microwave age, with routine satellite connections and high-data-rate transmission, 90 percent of the surveillance approach need not even involve collectors physically on the same continent. Soviet collectors in the 1980’s might seek to exploit phone junction facilities; in the 199’0s their Russian successors in New York posted vans near microwave towers. Actual exploitation of the data collected might occur within 24 hours, as linguists labored over replayed recordings.
Today, it is fairly simple not only to monitor microwave relay facilities, but to simply monitor cell-phone chatter through the airwaves. In fact, any phone call may be connected in a variety of ways, regardless of how it was placed by the originator; calling from a fixed, landline phone might once have increased the difficulty of intercept, but today it serves rather to make the originator easier to identify, as links in the transmission path are exploited. Moreover, it takes very little in the way of interception and transmission equipment to instantaneously relay anything collected to the other side of the world, where linguists — whose presence at a consulate, in a big bunker, might seem odd — can quickly interpret and report, unremarked, at home.
Such electronic surveillance produces some of the cheapest and highest-payoff intelligence there is, and we may apply a good rule of thumb from the intelligence world here: if it can be done, someone is trying to do it. It is reasonable to assume that Russia, as she has in the past, performs such monitoring from her consulate on Central Park East, and that Russian surveillance can intercept much of Manhattan via the airwaves, from its roof. Knowing the recent history of Russian attempts to exploit communications relay points with mobile collection, we may equally assume that that is an ongoing effort.
Russia, again, is not our only suspect. While there is less direct evidence available to the public on Chinese efforts at electronic surveillance, we know that espionage against the U.S. is a very high priority for China, and the rule of thumb suggests Beijing will try this method, as well as the human contact espionage China is best known for. China’s New York consulate on East 61 Street provides a useful vantage point for electronic collection. However, a nation need not have a diplomatic facility in New York to have a collection base there. The Iranian Alavi Foundation, a putative charitable foundation that has fallen under suspicion by U.S. federal agencies as a base for espionage and the support of terror cells, owns the 32-story building it occupies at 52nd and Fifth — a position with advantages for electronic collection in Manhattan.
Physical intercept of signals is, of course, only a primitive method of electronic surveillance in today’s technological environment. Because it remains cheap and high-payoff, it will continue for some time. But recent successes in information technology (IT) based espionage highlight the real feasibility of obtaining large amounts of intelligence by intercepting communications digitally. As phone and personal computer capabilities merge, it will be increasingly irrelevant to separate attacks against one from attacks against the other.
Probably the most celebrated monitoring attack to date against a phone network was the “Athens Affair” in 2004-05, when still-unidentified cyber-attackers hacked into switching computers in Greece’s Vodafone network and monitored more than 100 phones used by government officials and private civilians. (A full technical explanation of the hackers’ approach can be found here.)
Although these attackers have not been identified, China was directly implicated in the hacking of German government computers in 2007, when German authorities discovered that data was being “siphoned off” daily from computers in the German Chancellery and other government agencies, by hackers in Lanzhou, Canton Province, and Beijing. The years 2006-07 were busy ones for China’s hackers, who were fingered in network intrusions in the British government and the U. S. Departments of Defense and Commerce. Russia demonstrated some network intrusion prowess of her own in a broad scale cyber attack on Estonia’s government, public facilities, and private organizations – including news media computers — in April-May of 2007.
While only one of these data network intrusions (the Chinese attack on German systems) was characterized by officials as an attempt at extended monitoring, per se, they underscore the easy availability of the technology to manipulate computer networks, and the aptitude of, at a minimum, China and Russia for exploiting it. The applicability of such capabilities to monitoring the journalists at the New York Times is reinforced by the success of eccentric American hacker Adrian Lamo in penetrating the New York Times computer network in 2004. Lamo confessed that while online with the New York Times network, he was able to view not only employment and other personal records of the New York Times staff, but was able to obtain the private phone numbers of journalists and contributors, such as former President Jimmy Carter.
Of course, if the intelligence collector is China, “Trojan” hardware sold to IT providers may be the placement method. The U.S. government decided not to even install 16,000 computers manufactured by the Chinese firm Lenovo, in the wake of Chinese intrusions on U.S. government networks in 2006. Russia’s history of introducing Trojan hardware into U.S. embassies and consulates was certainly a historical factor in this security decision [p. 17]. However, private news organizations do not routinely consider the possibility that IT hardware — phones or computers — that they purchase from commercial vendors may contain manufacturer-embedded code or devices for long-term exploitation.
If it can be done, someone is trying to do it.
Is the New York Times Being Wiretapped?
Must-Reads from Magazine
Expect the impossible.
If the 2016 presidential election cycle demonstrated anything, it was that Republicans suffer from a crippling lack of imagination. That ordeal should have established that the unprecedented is not impossible. Even now, Republicans seem as though they are trying to convince themselves that their eyes are lying to them, but they are not. The tempo of the investigation into President Trump is accelerating, and a nightmare scenario is eminently imaginable. Only congressional Republicans can avert disaster, and only then by being clear about the actions they are prepared to take if Trump instigates a crisis of constitutional legitimacy.
The events of the last 36 hours unrolled like a cascade. Late Wednesday, the New York Times published an interview in which Trump delivered a stinging rebuke for Attorney General Jeff Sessions, scolding him for recusing himself from the investigation into the campaign’s ties to Russian operatives. In that interview, Trump appeared to warn special counselor Robert Mueller not to dig too deeply into his personal finances, or else.
Hours later, Bloomberg News revealed that Mueller’s probe was investigating Trump’s business transactions and tax records—a leak surely made in response to Trump’s arm-twisting. More leaks from the investigation confirmed that former Trump campaign manager Paul Manafort was being investigated for involvement in a money-laundering scheme, a revelation made more discomfiting by the discovery that he owed pro-Russian interests $17 million before joining the Trump campaign.
With the noose tightening, the lead attorney on Trump’s personal defense team, Marc Kasowitz, and the legal team’s spokesperson, Mark Corallo, resigned. The Washington Post reported that “Trump has asked his advisers about his power to pardon aides, family members and even himself in connection with the probe.” Trump’s spokespeople insist the president has no intention of pursuing the dismissal of the special counsel investigating his campaign, but his every action indicates that this is a lie.
Prominent Republicans reacted to all this incredulously. “There is no possible way anybody at the White House could be seriously thinking about firing Mueller,” Sen. Bob Corker insisted. “We all know the president,” said Sen. Orrin Hatch. “He makes some of these comments that he really doesn’t mean.” Sen. Susan Collins was willing to go a bit farther: “It would be catastrophic if the President were to fire the special counsel.”
Off the record, however, Republican lawmakers are far less circumspect in relaying their fears about what the president is capable of doing to the republic. “Any thought of firing the special counsel is chilling. It’s chilling,” an unnamed GOP senator told CNN. “One gets the impression that the President doesn’t understand or he willfully disregards the fact that the attorney general and law enforcement in general—they are not his personal lawyers to defend and protect him,” another added.
These tepid comments for the record, with courage reserved only upon condition of anonymity, expose how Republicans in Congress have again failed to meet the measure of the moment. These are dangerous days, and it is incumbent upon Donald Trump’s party in Congress to deter the executive branch from overstepping its authority. The only way to do that is to be clear about what the consequences for that kind of transgression will be.
The Congressional Research Service defines how the president could execute a nuclear option against the independent counsel’s office. The Attorney General has recused himself from campaign-related investigations, so Trump would have to insist Deputy Attorney General Rod Rosenstein remove Mueller. If Rosenstein declined, his resignation would likely be on offer, and his acting replacement (Associate Attorney General Rachel Brand) would have to field the same request. At this point, the comparisons between the Trump White House’s behavior and that of the Nixon administration ahead of the 1973 “Saturday Night Massacre” are no longer hyperbolic.
In lieu of any ability to contain or control the special counsel’s office, Trump’s defenders have mounted a public relations campaign designed to undermine its authority and discredit its members. That will rally Trump’s diehard supporters, but the president remains unsatisfied. National Review’s Rich Lowry speculated convincingly that Trump would have little choice but to move against Mueller. Sooner rather than later, the conditions the president said would force his hand—a probe of Trump’s personal finances—will be met. Lowry observed that Trump seems to believe his tax records and business practices should be off limits and his experience has taught him “that fortune favors the recklessly bold.”
Republicans in Congress must stop comforting themselves with the notion that the worst cannot happen. They have to summon the courage to state publicly what they so freely tell reporters on background. If they are so concerned that the norms and traditions that have preserved the rule of law in this republic for 240 years are in jeopardy, they must say so. And they must say what the consequences will be for Trump, his associates, and his family if he goes too far. Republicans in office are disinclined to pursue a course of action against Trump that might jeopardize their standing with the voters who love him. None of that matters. Prioritizing their parochial careerist considerations over the best interests of their party and their country is how they got themselves into this mess.
Republicans may dislike the prospect, but it’s fast becoming time for them to start saying the “I” word if only to save the president from his most reckless impulses. The longer they tell themselves that the unthinkable is impossible, the more likely it becomes.
Are the warplane's secrets safe?
The F-35 Joint Strike Fighter is the newest generation air platform for the U.S. Air Force, Navy, and Marines. Lockheed-Martin, which builds the F-35, describes it as “a 5th Generation fighter, combining advanced stealth with fighter speed and agility, fully fused sensor information, network-enabled operations and advanced sustainment.” For both diplomatic reasons and to encourage sales, Lockheed-Martin subcontracted the production of many F-35 components to factories abroad. Many program partners—Australia, Canada, the United Kingdom, Denmark, for example—are consistent U.S. allies.
Turkey, however, is also part of the nine-nation consortium producing the plane, which gives Turkey access to the F-35’s technology. “As a program partner, Turkish industries are eligible to become suppliers to the global F-35 fleet for the life of the program. In total, F-35 industrial opportunities for Turkish companies are expected to reach $12 billion,” the warplane’s website explained. “Turkey plans to purchase 100 of the F-35A Conventional Takeoff and Landing variant. Its unsurpassed technological systems and unique stealth capabilities ensure that the F-35 will be the future of Turkish national security for decades to come.”
But is the F-35 safe with Turkey? In recent years, the Turkish government has leaked highly-classified information to America’s adversaries in fits of diplomatic pique. Back in 2013, for example, Turkey leaked to the Iranians the identities of Israeli spies in Iran. Danny Yatom, former head of the Mossad, told USA Today that the incident would damage U.S. intelligence efforts, “because we will be much more reluctant to work via Turkey because they will fear information is leaking to Iran… We feel information achieved [by Israel] through Turkey went not only to Israel but also to the United States.”
On July 19, the Pentagon criticized Turkey’s state-controlled news agency for exposing ten covert U.S. bases in Syria in a way that can enable both the Islamic State and Iranian-backed forces to target Americans. Bloomberg reported that the leak also detailed aid routes and equipment stored at each base.
Both these incidents raise serious questions about whether Turkey can be trusted with the F-35, especially given Turkey’s growing military and diplomatic ties to Russia, and the wayward NATO state’s recent cooperation with China as well. The United Kingdom’s Ministry of Defense is rightly concerned about the security implications of a plan to service its F-35s in Turkey, but such concern should only be the tip of the iceberg.
Should Turkey even receive F-35s and, to the extent the program relies on Turkish factories, is it time to stand up quickly a Plan B? To do otherwise might squander the billions of dollars already spent on the program, risk increasing President Recep Tayyip Erdoğan’s ability to blackmail the West, and potentially land America’s latest military technology on Kremlin desks.
Too many martyrs make a movement.
If the GOP is to be converted into a vehicle for politicians who evince Donald Trump’s brand of pragmatic center-right populism, Trump will have to demonstrate his brand of politics can deliver victories for people other than himself. Presidential pen strokes help to achieve that, as do judicial appointments. Nothing is so permanent, though, as sweeping legislative change. On that score, the newly Trumpian Republican Party is coming up short. If the passive process of transformational legislative success fails to compel anti-Trump holdouts in the GOP to give up the ghost, there is always arm-twisting. It seems the Republican National Committee is happy to play enforcer.
The RNC’s nascent effort to stifle anti-Trump apostasy by making examples of high-profile heretics has claimed its first victim: New Jersey’s Lieutenant Governor Kim Guadagno. The Republican is running to replace the nation’s least popular governor, Chris Christie, and the effort has been a struggle. Trailing badly in the polls and facing the headwinds associated with trying to succeed an unpopular outgoing GOP governor in a blue state, Guadagno needs all the help she can get. That help won’t be coming from the RNC. According to NJ Advance Media, the committee’s objection to helping Guadagno isn’t the imprudence of throwing good money after bad. It’s that she was mean to President Trump in 2016, and she must be punished.
“[The president] is unhappy with anyone who neglected him in his hour of need,” said a source billed as an RNC insider. The specific complaint arises from an October 8 tweet from the lieutenant governor said that “no apology can excuse” Trump’s “reprehensible” conduct on the infamous “Access Hollywood” tape. “Christie was not as stalwart as some people in the party, but at least he didn’t go against him the way she did,” the insider added.
This source’s version of events was supported by former two-term New Jersey Governor Christine Todd Whitman. “She went down there, and the (Republican National) Committee was reluctant to back the campaign in the way one would have expected,” she said. “The implication was, ‘Well you were not a Trump supporter in the primary, and so don’t expect much money.'”
This is almost certainly a pretext. Republicans are facing stiff competition and an unfavorable political environment in November’s gubernatorial elections in Virginia and New Jersey. In 2017-2018, 27 GOP-held seats are up for grabs, nine of which are in some jeopardy of falling to Democrats. Republicans are going to have to husband their resources and triage their officeholders. That’s a forgivable, if demoralizing, condition. Declaring Guadagno to have offended the leader and to be cut off from the font of Republican goodwill is not only unjustifiable, it’s terribly foolish.
If Republican women are to be punished for saying that Trump’s comments about sexually assaulting unsuspecting females were unacceptable, there are going to be a lot fewer Republican women. Moreover, the RNC has invited the perception that there is a double standard at play here. A slew of Republicans called on Trump to drop out of the race after that tape, but the RNC is unlikely to withhold support for Senators Rob Portman or John Thune when they need it. Among those calling on Trump to drop out was his own chief of staff, Reince Priebus—a fact the president reportedly won’t let Priebus forget.
Cults of personality can be bullied into existence, but they rarely outlast the personality around whom they form unless that personality can claim some lasting achievements. In lieu of any compelling rationale, the effort to remake the GOP in Trump’s image by force will only create dissidents. The ideological conservatives who once dominated the Republican Party are unlikely to make peace with the ascendant populist faction at gunpoint. And the RNC is not solely to blame for this boneheaded move. Even if the notion that Guadagno is being punished for disloyalty is a pretense, it is a response to a clear set of incentives promoted by this White House.
Maybe the most intriguing question of the present political age is whether or not conservatives in the GOP will come to terms with a man they once saw as a usurper. A heavy hand will only catalyze resistance, and Trump needs his own party as much or more than they need him. Guadagno’s gubernatorial bid is on no firmer ground today than it was yesterday, but the Republican candidate’s allies can now legitimately claim persecution at the hands of personality cultists. Too many martyrs make a movement. The White House and the Republican National Committee should tread lightly.
Podcast: Conservatism in shackles while O.J. goes free?
On the second of this week’s podcasts, I ask Abe Greenwald and Noah Rothman whether the health-care debacle this week is simply a reflection of the same pressures on the conservative coalition Donald Trump saw and conquered by running for president last year—and what it will mean for him and them that he has provided no rallying point for Republican politicians. And then we discuss OJ Simpson. Give a listen.
Don’t forget to subscribe to our podcast on iTunes.
Hyperbole yields cynicism, not the other way around.
Newly-elected French President Emmanuel Macron surprised almost everyone when he invited President Donald Trump to celebrate Bastille Day with him in Paris, especially after the two leaders’ awkward first meeting in Brussels in May. After all, between now and then, Trump withdrew the United States from the Paris Climate Change Agreement, and Macron has become perhaps the most vocal critic of Trump among European leaders.
In hindsight, Macron’s reason for embracing Trump might have been to get the president to reverse course on the Paris agreement. From the Associated Press:
French President Emmanuel Macron says his glamorous Paris charm offensive on Donald Trump was carefully calculated — and may have changed the U.S. president’s mind about climate change…. On their main point of contention — Trump’s withdrawal from the landmark Paris climate agreement — Macron is quoted as saying that “Donald Trump listened to me. He understood the reason for my position, notably the link between climate change and terrorism.”
According to Macron, climate change causes droughts and migration, which exacerbates crises as populations fight over shrinking resources. If Macron really believes that, France and Europe are in for some tough times.
First, droughts are a frequent, cyclical occurrence in the Middle East, the Sahel, and the Horn of Africa. The difference between drought and famine is the former is a natural occurrence and the latter is man-made, usually caused by poor governance. Nowhere is this seen more clearly than in the Horn of Africa, where the same drought might kill a few dozens of Ethiopians but wipe out tens of thousands of Somalis.
Second, the common factor in the wars raging in the Middle East today is neither climate change nor extreme weather, but brutal dictatorship, radical ideologies, and the militias supported by the Islamic Republic of Iran. Yemen could be a breadbasket. Its terraced fields rising up thousands of feet in the mountains grow almost every fruit imaginable. Yemen also catches the tail end of the monsoon. If Yemenis planted exportable crops like coffee rather than the mild drug qat, which does not bring in hard currency, they might be fairly prosperous.
It is not climate change that denied the Syrian public basic freedoms and liberty for decades, nor was it climate change that dropped barrel bombs on civilian neighborhoods, tortured and killed 13-year-old Hamza Ali al-Khateeb, or used chemical weapons. For that matter, when it comes to radicalization, the problem is Syria was less climate and more decades of Saudi-and Qatari-funded indoctrination and Turkish assistance to foreign fighters.
Regardless of all this, another obvious factor nullifies Macron’s thesis: When drought occurs in regions outside the Middle East, the result is seldom suicide bombing.
Terrorism does not have a one-size-fits-all explanation but, generally speaking, when it comes to Islamist terrorism, ideology plays a key role. Most terrorists are educated, middle class, and relatively privileged. Islamic State caliph Abu Bakr al-Baghdadi, for example, has a Ph.D. Many of the 9/11 hijackers were educated. In the Gaza Strip, Hamas recruits inside schools. Simply put, there is no linkage between climate change and terrorism.
Not only would Trump be foolish to buy Macron’s argument, but environmentalists who believe climate change puts the Earth in immediate peril should be outraged. It is hyperbole. Moreover, it is the casual invocation of climate change as a catch-all cause for every other issue that breeds the cynicism that leads so many to become so dismissive of everything climate activists say. Macron may look down up Trump as an ignorant bore, but Macron’s own logic suggests he is also living in a world where facts and reality don’t matter.