State sanctioned secrecy: NSA’s criminality shield

Patrick Eddington:

NSA has used that blanket authority to try to keep secret details about its lethal 9/11 intelligence failure. A Freedom of Information Act (FOIA) lawsuit I brought on behalf of the Cato Institute against the Defense Department (NSA’s parent organization) in January 2017 has, after over three-and-a-half years in federal court, partially punctured NSA’s veil of secrecy over the cancelled TRAILBLAZER and THINTHREAD digital network exploitation (DNE) programs.

In brief, during the five-year period leading up to the 9/11 attacks, a bureaucratic war raged inside of NSA over the best way to handle the exploding volume of digital communications the agency was trying to keep up with. On one side was a group of veteran NSA cryptographers, mathematicians and computer scientists who developed a cheap, extremely effective, and Constitutionally compliant in-house DNE system codenamed THINTHREAD. On the other side was then-NSA Director Michael Hayden, who favored an unproven, external, contractor developed DNE system called TRAILBLAZER. When then-GOP House Intelligence Committee staffer Diane Roark got the THINTHREAD team development money and language in the FY 2002 Intelligence Authorization bill directing wider deployment of the cheaper, off-the-shelf THINTHREAD system, Hayden refused to deploy it as directed — even though THINTHREAD, still in prototype development, was already producing intelligence NSA couldn’t get from any of its other existing systems.

Three weeks before the 9/11 attacks, Hayden killed further THINTHREAD development, despite the fact that TRAILBLAZER was still little more than an idea on PowerPoint slides. The former THINTHREAD team members believe to this day that had their system been deployed even a few weeks before the 9/11 attacks, bin Laden’s hijackers would never have made it onto a single plane. I agree.