Expert Commentary

Time for a New CIA?

March 2, 2016 | John Sipher
 

Across the Central Intelligence Agency lobby from the iconic stars memorializing officers killed in the line of duty is a less well-known memorial.  It is an understated relief in honor of those foreign spies who risked and lost their lives to provide secret information to the United States.  It is a reminder that the CIA remains at its core, the nation’s espionage arm.  Apparently, however, CIA Director John Brennan doesn’t see it that way.

In what was otherwise a thoughtful interview with National Public Radio last week, CIA Director John Brennan expressed his personal view that the CIA should be not be viewed as a spy agency.  In the 24 February interview he said, “I don’t support government spying…. We don’t steal secrets…  We uncover, we discover, we reveal, we obtain, we elicit, we solicit.  All of that.”  What?  We don’t steal secrets?  Is he joking?  Brennan has reportedly also made clear to the officers under his charge that he eschews the term espionage, and does not view the CIA as an espionage service. 

Fortuitously, former CIA Director Michael Hayden’s new book, “Playing to the Edge” was released on the same day that Brennan made his comments, and he seems more comfortable advocating for CIA’s espionage role.  The title of Hayden’s book is sports metaphor meant to highlight how he viewed his responsibility as the Director of the NSA and CIA.  That is, in an effort to secure the safety of the American people, U.S. officials should use all of their authorities under the law.  They should use the entire playing field, even right up to the boundary.  In the book, Hayden refers to a speech in which he comments that “the American people expect CIA to use every inch we are given to protect her fellow citizens,” adding his view that espionage is essential to a democracy.  Sadly, Brennan’s remarks on the same day suggest that he does not see his authority in the same way.

While his comments might not resonate outside of the Intelligence Community, make no mistake, it is a long term danger to our security when the head of the nation’s espionage organization says that he doesn’t support spying.  It sends a chill through those who work in the shadows to keep us safe and makes them wonder if their boss has their back.  It also confirms the fears of many CIA employees and alumni that Brennan’s recent efforts to restructure and change CIA culture were a furtive means of weakening the clandestine service.  

CIA houses several very different cultures under one roof.  The three main tribes are the analysts, the spies and the techies.  For outsiders, the analysts are in-house academics and experts who brief and write papers for the President and policymakers.  The spies are those officers of the Clandestine Service (now called the Directorate of Operations, or DO) who live overseas and manage human spy networks.  They tend to be the cocky jet pilots of the CIA.  The techies spend the money and manage huge, sophisticated, cutting edge programs.  They are engineers, scientists and visionaries.  Housing these three tribes under one roof has always been both CIA’s strength and weakness.  The training, mission and career progression of the three tribes are very different and don’t always mesh.  When they work together it is magical. 

However, in order to maintain that magic, one tribe cannot seek to dominate the others.

Since his arrival in 2012, there has been a fear in the clandestine side of the house that Brennan, a career analyst, was intent on taking the clandestine service down a peg.  There is a view that he has never been comfortable with the DO culture and was looking to neuter them.  Some view the highly publicized restructuring (“modernization”) as means to accomplish this culture change.  The Washington Post even reported that the previous Chief of the Clandestine Service abruptly retired in opposition to the restructuring plan that he believed was a calculated effort to weaken the spy side of the house at the expense of the Intelligence Directorate (the analysts).  Despite the whispers, I didn’t believe that the CIA Director could be so petty.  Now I wonder if I was wrong.

Let me be clear.  Despite what Mr. Brennan says, what my colleagues and I did in the CIA was espionage – stealing secrets.  We didn’t “discover,” we stole.  Our sources were not taxi drivers, social media feeds, or newspapers.  They were people with access to secrets who were well aware that they were risking their lives, and possibly those of their families, to steal information for the U.S.

The CIA steals secrets and will always need to do so.  We don’t do it for fun or because we can.  The clandestine arm of the CIA is the collector of last resort.  The USG should use all means—open, technical, and diplomatic—to gather the information it needs to inform policy.  Collecting information openly is certainly preferable to stealing it.  However, if a critical piece of information is determined in our national interest and nobody else can get it, we have to steal it.  The officers of the clandestine service take their responsibilities seriously and often put themselves in harm’s way to get the job done.  We are not always successful, and sometimes create political scandals, but we succeed more often that the public knows.

Also, for those of us in the business, it is hard to fathom why a CIA Director would even bother to claim that he doesn’t steal secrets.  Our adversaries are not likely to take him at his word.  Further, we don’t really get to define what counts as espionage and what doesn’t.  Other countries decide what constitutes treachery and secrecy in their countries.  As far as I know, every country in the world views espionage as a crime and punishes those who engage in it with prison or death.  I certainly took my responsibility seriously and worked diligently to protect those in my care – always well aware of what would happen to them if caught.  No government in the world would see what we did as “discovering or eliciting” information consistent with their laws.  We scrupulously followed U.S. law, while consistently breaking foreign laws.

Surely, the CIA is much more than just an espionage Agency.  It is a central clearing house for open source information, human intelligence, diplomatic reporting, military reporting, academic expertise, signals intelligence, electronic intelligence, covert action, relations with foreign security services, and a world class analytical shop.  CIA’s magic is that it can do so much under one roof.  It needs to put all data and information in context for policymakers.  That said, its life blood is secret information – information that no other organization can provide.

While Mr. Brennan can claim that the CIA doesn’t engage in espionage, that would come as a surprise to those sources sitting in foreign prisons for allegedly cooperating with the CIA.  Dr. Shakil Afridi is still sitting in a Pakistani jail for reportedly helping the CIA find Osama Bin Ladin.  According to press accounts, he is the Pakistani physician who ran a fake hepatitis vaccine program in Abbottabad to collect DNA and confirm Bin Ladin’s presence.  Over the years, many brave foreigners provided information to the U.S. and paid the ultimate price.  Dozens of Russian spies were killed due to the treachery of Aldrich Ames and Robert Hanssen.  Pyotr Popov was reportedly thrown into a fire pit in front of his GRU colleagues in an effort by the KGB to show its officers the price of treachery (see the book “Mole” by William Hood).  And sadly, many more.  Those brave souls would be surprised to hear that CIA doesn’t engage in espionage.

Shortly after its stand-up in 2004, the Office of the Director of National Intelligence tried to create lead agencies for all of the various functions of the Intelligence Community – NSA for signals intelligence, FBI for domestic intelligence, DIA for military support, NRO for space based collection, NGA for imagery, and CIA for human intelligence – spying.  If Brennan is not comfortable with the spying side of the house and is intent on re-crafting the CIA into an analytical agency, the time has come to look to our history and re-create a separate espionage service along the lines of the WWII era OSS.  Spying, stealing, suborning, and pilfering is often dirty work, but someone has to do it if CIA won’t.

The Author is John Sipher

John Sipher is a Director of Client Services at CrossLead, Inc. John retired in 2014 after a 28-year career in the Central Intelligence Agency’s National Clandestine Service. At the time of his retirement he was a member of the CIA’s Senior Intelligence Service.  John served multiple overseas tours as Chief of Station and Deputy Chief of Station in Europe, Asia, Southeast Asia, the Balkans, and South Asia. He is the recipient of the Agency's Distinguished Career Intelligence Medal.

Learn more about The Cipher's Network here

Next Steps in U.S.-Cuba Relations
Strengthening U.S. Cyber Defenses
Russia Sanctions: The New Normal
Corruption in China: The Party’s Over
Change in the Kingdom: Three Big Shifts
Managing Information & Risk in the Digital Age
Endgame in Afghanistan
The Convergence of Crime and Terror
Strengthening the Public-Private Partnership
The Billion Dollar Spy: An Interview with Author David Hoffman
The New Battlefield
North Africa: Instability Increasing
The Kidnapping Capital of the World
Homegrown Terror in the Age of ISIS
The Refugee Crisis: Europe on the Brink
The Future of Mexican Oil
Cracks in the System
Embassy Security Three Years After Benghazi
Fourteen Years Later
Can Congress Solve the Cybersecurity Problem?
Arctic Game Changer?
Where They Stand on National Security
The First 100 Days
Worthy of Fleming: Anthony Horowitz's "Trigger Mortis"
At the Crossroads
Eye in the Sky
Rough Road Ahead for Rousseff
Leveling the Playing Field: Tech Access in China
The Dead Drop
Top of Mind for Chief Security Officers
Protecting Your Business
The Future of Oil
Chinese Expansion in Latin America
American Involvement in Syria
The Future of Geospatial Intelligence
The Umbrella Movement: One Year Later
Ebola: An End in Sight?
The Pakistan Problem
The Dead Drop
The Encryption Debate
Going Dark
The US-Mexico Relationship
The Rise of Mobile Technology in Africa
The Dead Drop
Construction Boom in the Gulf
Cybersecurity: The Human Factor
Beijing and the South China Sea
Will Peace Talks Succeed in Colombia?
Social Media and Terrorism
The Rise of Israel’s Tech Sector
Securing the Border
Red Sun Rising
The Dead Drop
Adopting the Iran Deal
Stability on the Peninsula
Crime in South Africa
Combatting Terrorist Financing
The Dead Drop
Recovering from a Cyber Attack
Stability in South Asia
Veterans Day
Israel’s Wave of Violence
The Dead Drop
Protecting Critical Infrastructure
ISIS on the March
The Paris Attacks
Rethinking U.S. Security Assistance
The War on Terror 2.0
Putting Mali in Context
Will Russia Ever Change?
Will Canada Pull Back?
Understanding Putin’s Popularity
Chinese Expansion in Africa
Terrorism Finance and Wildlife Poaching
Illicit Trafficking in Latin America
Climate Change and Security
Preventing Another San Bernardino
Supply Chain Security
Negotiating a New Safe Harbor Agreement
The Battle for Yemen
Foreign Tech Access in China
The Dead Drop
Offensive Cyber Operations
Travel Security in the Age of ISIS
Iran: A Rising Cyber Power?
The Future of Cybersecurity
The Arab Spring Five Years Later
Preparing Today’s Military for Tomorrow’s Wars
Cybersecurity for Small and Medium-Sized Enterprises
Maritime Security in the Gulf of Guinea
Improving Aviation Security
The Dead Drop
Terrorism in 2016
Cybersecurity in 2016
The World in 2016: Opportunities and Risks
China in 2016
Russia in 2016
Moscow’s Cyber Buildup
The China-India Relationship
Russian Influence in Latin America
The Future of Homegrown Terrorism
Stability in Sub-Saharan Africa
Protecting Your Digital Identity
Elections in Taiwan: A Turning Point?
The Caliphate of Crime
Biotechnology’s Dark Side
Rethinking U.S. Strategy Toward China
The Evolution of Weapons of Mass Destruction
A New Era in US-Iranian Relations?
Will Information Sharing Improve Cybersecurity?
Evaluating China's New Silk Road
Tech in Latin America: Opportunities and Challenges
The Destruction of Libyan Oil
Ransomware: Protecting Yourself from Cyber Extortion
The US and India: Strengthening Security Cooperation
Security and Stability in Afghanistan
Combatting the Al Shabaab Threat
Sports Security: Protecting Your Venue
Israel’s Arab Alliance: A Counter to ISIS and Iran?
The End of U.S. Space Supremacy
The Caucasus: Instability Increasing
Stabilizing Iraq
The Trans-Pacific Partnership: Deepening U.S. Commitment to Asia
Securing Industrial Control Systems
The Battle for Ukraine
Defeating Boko Haram
Jordan: The Indispensable Ally
China’s Military Modernization
The Cybersecurity Skills Shortage
Solving Mexico’s Violence Problem
The Northern Triangle: The Most Violent Region in the World
The Future of the Middle East
Terrorism in the World’s Largest Muslim Country
The Rise of Quantum Computing
Europe’s Terrorism Problem
Stability in the East China Sea
The Rise of Counter-Drone Technology
The ISIS WMD Threat
Healthcare and the Cyber Threat
Security in the Indo-Pacific: Australia’s New Role
Countering ISIS' Message
Containing the ISIS Cancer
Security, Privacy, and the Fight Over Encryption
Taking Aim at Smart Guns
Losing Patience with North Korea
The Difficult Road Ahead for Colombia
The Taliban Resurgence
ISIS: The New Face of Global Jihad?
Connecting with Latin America
Russia and China: Mutually Assured Detachment
The Scourge of Terrorism
The Security Challenge of Terror
European Unity in the Face of Crises
Developing Enhanced Cybersecurity Systems
Pakistan: Friend and Foe?
Egypt’s Economy on the Brink
Tehran’s Balancing Act
Russia Makes Moves in the Middle East
Kenya’s Battle with al-Shabaab
Missile Defense in the Korean Peninsula
Are America's Ports Secure?
The Human Factor Behind the Panama Papers Leak
Russian Military Modernization
APTs: The Boogeymen of Cybersecurity
Vietnam: Guns and Butter
Syria: Power-sharing, Partitioning, and the Fight Against ISIS
Turbulence in Turkey
The U.S. and the Philippines: Shoulder to Shoulder in the South China Sea
The Darker Side of the Internet of Things
Cybersecurity Challenges in Asia
Taliban on the Offensive
Quagmire in Yemen
Cocaine and Conflict in Colombia
The Cloud: Nebulous, but Nimble
Censorship in China
An Emerging Crime-Terror Nexus in Europe
IRGC: Iran's Power Player
Latin America: The New Frontier for Cyber Attacks
The Hydra and the Snake: The Death of Osama Bin Laden
Nuclear Deterrence and Assurance in East Asia
Vehicle Cybersecurity: Running in Place
What Drives ISIS
Tensions Simmer in the South China Sea
Managing the Mobile Phone Malware Threat
Leaving the Oil Spigot Open
Burundi: A Path Toward Civil War?
The Value of Special Operations Forces
ISIS in the Balkans
The Tech Must Flow
North Korea’s Party Congress: What was all the fuss about?
Argentina: A Smoother Ride
Libya: Obama’s “Worst Mistake”
Tsai Ing-Wen’s Balancing Act
The North Korea Workers’ Party Congress and Kim Jong-un’s Legitimacy
Flying the Unfriendly Skies: Airline Security
Nuclear Standoff in South Asia
How to Read Riyadh
Even in Defeat, Austria’s Far-right Emulates Populist Growth in Europe
More Effective, Less Secure: The Cyber-Threat to Medical Devices
A New Era in the U.S.-Japan Security Partnership
Passing the Torch to the Next Generation of Saudi Leaders
U.S. Military Aid to Egypt Continues Despite Democratic Struggle
How Secure are Radiological Materials?
Roadblocks on the Path to Normality in Iran
Caracas in Crisis
Algeria: Exporting Stability
The Push for Kurdish Independence
U.S. and China: Strategic Cooperation at Arm’s Length
City Life: Living Smarter, Not Harder
Homegrown Terror in Orlando
A Rough Patch in U.S.-Saudi Relations
Japan’s “Abenomics”
A Tale of Two Bears: The DNC Hack
The Origins of Brexit
The Chinese Communist Party Under Xi Jinping
The Arctic: Technology and Infrastructure on Earth and in Space
Jordan: Stability Amidst Chaos
Exporting Jihad: Bosnia and Kosovo
Changing World Order: The Effects of Brexit
Navigating Uncharted Waters
Iraq after ISIS: Divide it or Fix it?
Terrorism in Istanbul: Severe Implications
North Korea as a Cyber Threat
One If By Air, Two If By Sea: Unmanned Surface Vehicles
The FBI’s Intelligence Mission
Does NATO Need a New Ideology?
Philippines v. China: Laying Down the Law of the Sea
Is Turkey Returning to a Policy of “Zero Problems?”
Federal Cybersecurity One Year After the OPM Breach
NATO: Weathering the Storms
The Rise of the Fringe: A Threat to Democracy?
Hezbollah's Many Faces
Trans-Pacific Trade Deal Remains in Limbo
The Aftermath of the Nice Attack: Is ISIS’ “Prestige” on the Rise?
Crossing the Line: A Failed Coup in Turkey
France’s Vulnerabilities in a Changing Terror Landscape
The Problem with Proxies
Water Security in South Asia: Running Dry and Running Out of Options
The Clash over Social Media Data
Extremist Groups Target Diversity in Bangladesh
Kenya: Private Sector and Government Coordinate on National Security
The ISIS-Al Qaeda Rivalry
Will Syria’s Most Productive Citizens Ever Return Home?
Trust but Verify: The United States, China & Economic Espionage
The World is Watching: The American Election and China
The Status Quo Will Not Work in South Sudan
Kurdistan as a Geopolitical Playground
Rio Olympic Games: A Missed Opportunity
Spinning Silk: Asia and the GCC
China-Japan Relations: Trading Goods While Exchanging Words
Climate Change in Ethiopia: Managing the Risks
Mounting Security Challenges in Afghanistan
Is There a Future for the Muslim Brotherhood in Egypt?
Niger Delta Militants Compound Nigeria’s Security Crises
Thailand Under the Junta
Brazil: Getting its House Back in Order Post Olympics
Indicators of Political Instability
Finding Water in the Desert: Water Security in the Middle East
The Blurring Line Between Cyber and Physical Threats
The World is Watching: The American Election and Russia
NATO’s Ambiguity on the Red Line for Russia
Boko Haram: The Plague Affecting Nigeria and Beyond
Tunisia: From Revolution to Governance
Russia, China, and Cyber Espionage
The F-35 Joint Strike Fighter: Potential Game-Changer or Procurement Nightmare?