You choose, we deliver
If you are interested in this story, you might be interested in others from The Journal Gazette. Go to www.journalgazette.net/newsletter and pick the subjects you care most about. We'll deliver your customized daily news report at 3 a.m. Fort Wayne time, right to your email.

Editorial columns

  • Film gives public education boosters a say
    Rocky Killion is the Clark Kent of public education – the superman many have waited for.
  • Harassment fuels race riots
    SWAT teams and angry protesters clashed in a small St. Louis suburb for a third day Tuesday, following the death of unarmed black teenager Michael Brown. The eruption of protests and violence has been a long time coming.
  • Overhaul needed in physician training
    Here’s a deal you might be interested in. You get $10 billion a year of taxpayers’ money to do something you may well have done anyway. You don’t need to say what you spend it on, or why.
Advertisement
Associated Press
Alexander testifies June 12 on Capitol Hill.

Control drives metadata mastermind

Alexander

– In late 2005, as Iraqi roadside bombings were nearing an all-time peak, the National Security Agency’s newly appointed chief began pitching a radical plan for halting the attacks that then were killing or wounding a dozen Americans a day.

At the time, more than 100 teams of U.S. analysts were scouring Iraq for snippets of electronic data that might lead to the bomb-makers and their hidden factories. But the NSA director, Gen. Keith Alexander, wanted everything: Every Iraqi text message, phone call and email that could be vacuumed up by the agency’s powerful computers.

The unprecedented data collection plan, dubbed Real Time Regional Gateway, would play a role in breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices by late 2008. It also encapsulated Alexander’s controversial approach to safeguarding Americans from terrorism and devastating cyberattacks.

In his eight years since taking the helm of the country’s electronic surveillance agency, Alexander, 61, has quietly presided over a revolution in the government’s ability to scoop up information in the name of national security. And, as he did in Iraq, Alexander has pushed hard for everything he can get: tools, resources and the legal authority to collect and store vast quantities of raw information on American and foreign communications.

His successes have won accolades from political leaders as well as counterterrorism and intelligence professionals who say the NSA chief’s efforts have helped foil dozens of terrorist attacks. His approach also has drawn attack from civil rights groups and a bipartisan group of lawmakers.

New details of the spy agency’s vast reach were brought to light by former NSA contractor Edward Snowden, who leaked classified information on government programs that sweep up “metadata” on phone calls and emails by Americans. Those revelations in turn have spotlighted the role played by Alexander, the NSA’s avuncular leader and, by all accounts, a driving force behind a post-Sept. 11, 2001 quest to transform an agency inundated by the data revolution into one that can exploit it to defend the nation.

As portrayed by supporters, Alexander is animated by a spymaster’s awareness of serious, overlapping threats arrayed against the United States. Those include foreign and homegrown terrorists. They also include a host of adversaries who are constantly probing the country’s cyberdefenses, looking for opportunities to steal secrets or unleash mayhem by shutting down critical infrastructure. Like many national security officials of his generation, Alexander’s sensibilities were shaped by a series of painful intelligence lapses leading up to the 9/11 attacks.

To some of Alexander’s most vociferous critics, Snowden’s disclosures confirm their image of an agency and a director so enamored of technological prowess that they have sacrificed privacy rights.

Alexander frequently points out that collection programs are subject to oversight by Congress as well as the U.S. Foreign Intelligence Surveillance Court, although the proceedings of both bodies are shrouded in secrecy. But even his defenders say Alexander’s aggressiveness has sometimes taken him to the outer edge of his legal authority.

Concentrated power

Some are uncomfortable with the extraordinarily broad powers vested in the NSA chief. In 2010, he became the first head of U.S. Cyber Command, set up to defend Defense Department networks against hackers and, when authorized, conduct attacks on adversaries. Pentagon officials and Alexander say the command’s mission is also to defend the nation against cyberattacks.

“He is the only man in the land that can promote a problem by virtue of his intelligence hat and then promote a solution by virtue of his military hat,” said one former Pentagon official. The former official spoke on the condition of anonymity to be able to talk freely.

Alexander himself has expressed unease about secrecy constraints that he says prohibit him from fully explaining what the NSA does. But just as in Iraq, he remains fiercely committed to the belief that “we need to get it all,” said Timothy Edgar, a former privacy officer at the Office of the Director of National Intelligence and at the White House.

The NSA’s 5,000-acre campus at Fort Meade in suburban Maryland contains more than 1,300 heavily guarded buildings and an array of computers and gadgetry sometimes described as “the most wonderful electronic toybox in the world.” But even before his arrival there in 2005 as director, Alexander was regarded as a leading apostle for harnessing technology’s awesome power in the service of national security.

In the mid-1990s, he had pioneered work in battlefield visualization – helping the soldier see on a laptop screen where friendly and enemy forces were on a detailed terrain map. He later led the push for technological innovation as head of the Army’s Intelligence and Security Command.

At the NSA, he has presided over the agency’s physical expansion while moving quickly to speed up the collection, analysis and sharing of massive amounts of raw data.

In the process, the West Point graduate has risen to become arguably the most powerful U.S. general most Americans have never heard of – or at least not until the Snowden affair propelled him into the public spotlight. He runs the nation’s largest, costliest and most secretive intelligence agency – an organization whose very existence was not officially acknowledged in its early years.

Three years ago, Alexander’s responsibilities ballooned with his appointment to lead the Pentagon’s U.S. Cyber Command.

Even close allies have fretted about the concentration of so much responsibility – not to mention influence – in a single individual. Some worry that the job was tailored to the skills of one man and not to the mission itself.

“Where do you find another person like General Alexander who possesses the intel qualifications to run NSA and the operational experience to command” the military’s cyber operations, said retired Lt. Gen. Robert Elder, who launched the Air Force’s first cyber command in 2007.

Supremely qualified

No one questions Alexander’s qualifications for the dual role. With master’s degrees in electronic warfare, physics and national security strategy, the Syracuse, N.Y., native is endowed with technical smarts and ambition as well as a folksy, even goofy, charm that can disarm critics.

He routinely makes references – in speeches and in person with colleagues – to his four daughters and his 14, soon-to-be 15, grandchildren, including how the youngest, a toddler, Skypes with Grandma.

Last summer, Alexander waded into the lion’s den when, wearing jeans and a black T-shirt, he delivered a keynote address at the Def Con hackers convention in Las Vegas and mugged for the cameras. At the time, he told the crowd that “the story that we (at the NSA) have millions or hundreds of millions of dossiers on people is absolutely false.”

That line irked lawmakers who were aware of the NSA’s secret collection of phone data. And this year, following Snowden’s revelations, Def Con organizers said federal officials were not welcome at the event.

Alexander’s outsize commitment to his mission has propelled him to seek new capabilities with an impatience that has sometimes rankled superiors, while also raising concerns about privacy as well as how far he wants to push into offensive uses of cybertools. Alexander has argued for covert action authority, which is traditionally the domain of the CIA, individuals familiar with the matter say.

He has been credited as a key supporter of the development of Stuxnet, the computer worm that infected Iran’s main uranium enrichment facility in 2009 and 2010 and is the most aggressive known use to date of offensive cyberweaponry. U.S. officials have never publicly acknowledged involvement in what has been described by experts as the first known, industrial-scale cyberattack on a sovereign nation, one that is estimated to have set back Iran’s uranium production by as much as a year.

Alexander also pushed hard for expanded authority to see into U.S. private sector networks to help defend them against foreign cyberattacks.

Quiet concerns also have been voiced by some of the private companies that would potentially benefit from government protection against cyberattack.

At a private meeting with financial industry officials a few years ago, Alexander spoke about the proliferation of computer malware aimed at siphoning data from networks, including banks’. The meeting was described by a participant who spoke on the condition of anonymity because the discussion was off the record.

His proposal: Private companies should give the government access to their networks so it could screen out the harmful software. The NSA chief was offering to serve as an all-knowing virus-protection service, but at the cost, industry officials felt, of an unprecedented intrusion into the financial institutions’ databases.

The group of financial industry officials, sitting around a table at the Office of the Director of National Intelligence, were stunned, immediately grasping the privacy implications of what Alexander was politely but urgently suggesting. As a group, they demurred.

“He’s an impressive person,” the participant said, recalling the group’s collective reaction to Alexander. “You feel very comfortable with him. He instills a high degree of trust.”

But he was proposing something they thought was high risk. “Folks in the room looked at each other like, ‘Wow. That’s kind of wild.’ ”

Advertisement