James Bamford has what he calls a love-hate relationship with America’s most secret intelligence agency. During more than 30 years of writing about the US National Security Agency (NSA) he has been threatened with prosecution, occasionally been praised for his work – but has mostly met with hostility. “It’s not a good relationship...

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent.

Please check the box if you want to proceed.

Please check the box if you want to proceed.

Enjoy this article as well as all of our content, including E-Guides, news, tips and more.

because they don’t like what I write,” he says.

Bamford is one of the foremost experts on the US’s electronic spying agency and its UK partner organisation, GCHQ in Cheltenham, Gloucester. His books and documentaries have shed often uncomfortable light on an increasingly powerful organisation with an estimated annual budget of over $10bn and some 40,000 employees. Despite its vast size, the organisation is so secret that even US senators were unaware of its existence. Its employees still speak of it as No Such Agency.

Bamford’s first brush with the NSA came during the Vietnam war, when he was posted in the Navy in Hawaii. There, his job was to plough through piles of top secret NSA reports and make sure they were delivered to the right people.

During law school, and running low on funds, he joined the Navy Reserves and secured a two-week posting in 1974 to one of the NSA’s key listening posts – Sabana Seca, Puerto Rico. Bamford says his main aim was to avoid doing any work during the school break.

But one day an intercept operator invited him to put on the headphones. He heard American voices – intercepted, he later realised, without judicial warrants. It was this discovery that propelled him to blow the whistle to a senate investigation and abandon a career in law to become an investigative journalist and author.

The beginnings of the NSA The NSA was set up by president Truman in 1951 and formally established a year later, under a secret law that was kept hidden from the public and Congress. It had one aim initially, says Bamford, and that was to monitor the growing threat from the Soviet Union. “The whole idea was never to allow another Pearl Harbor; to get an early warning if the Russians were about to launch a nuclear missile. So you’re listening to their air communications, their naval communications, all their communications, to develop intelligence,” he says. However, the secrecy surrounding the NSA gave it substantial freedom – and potential for abuse. One of its founding principles was that the organisation does not have to follow government edicts unless they specifically mention the NSA. About James Bamford James Bamford is an author, journalist and documentary maker. His books include: The Shadow Factory, Body of Secrets, A Pretext for War and The Puzzle Palace. He writes for Rolling Stone, Wired and The New York Times. “So if a president came out and said, ‘I am ordering all the federal government agencies not to do domestic eavesdropping,’ that is a get-out-of-jail-free card because, if he did not mention the NSA, the NSA did not have to follow that,” Bamford explained at a conference in 2014. When the Soviet Union collapsed in the 1990s, the agency was temporarily thrown into a crisis of identity. Its budget and workforce were cut dramatically. But the 9/11 attacks gave it a new lease of life – preventing terrorism – and the US government began pouring billions into the organisation.

Truck loads of money “The NSA was given enormous amounts of money. It was just like dump trucks dumping money. Before 9/11, there really wasn’t much in the way of outsourcing, everything was done in-house,” he says. “They were given money that they could handle in the agency itself.” For the first time, the agency began to outsource significant parts of its work to external contractors. Companies such as Lockheed Martin, Northrop Grumman, SAIC and Booz Allen Hamilton secured lucrative contracts. That gave a vast army of security-vetted contractors access to the NSA’s secure networks and secret files – opening security risks for the organisation; Booz Allen Hamilton was later to employ Edward Snowden.

The expansion also created internal tensions. The NSA started investing hundreds of millions in developing a sophisticated surveillance programme, called Thinthread. That project was carefully designed to limit surveillance and meet the requirements of the Foreign Intelligence Surveillance Act (Fisa) and the Fourth Amendment of the US constitution. But Bill Binney, former technical director at the NSA’s Signals Intelligence Automation Research Centre (Sarc) turned whistleblower, later revealed that those safeguards were jettisoned as the NSA poured billions of dollars into projects undertaken by external contractors that either failed or swept away the protocols built into Thinthread. The ethos appeared to move away from targeted surveillance towards gathering as much data on as many people as possible.

NSA city Today the NSA is a vast organisation. Its headquarters in Fort Mead, Maryland, is, as Bamford describes it, like a small city, inhabited by tens of thousands of people with its own post office, fire department and police office. Hidden from view by forests, it is heavily protected by electric fences, anti-tank barriers, motion sensors and cameras. The buildings and windows are protected with copper shielding to prevent electromagnetic signals escaping. Nearby – and nearly as well-protected – is the National Business Park, a hidden compound for the NSA’s high-tech contractors, Bamford reveals in his book, The Shadow Factory. The contractors include Booz Allen Hamilton, which occupies what Bamford describes as a 250,000ft2 “mausoleum”. And in Bluffdale, the NSA has built its Utah Data Centre – known as the Bumblehive. The mammoth “mission data repository” cost at least $1.5bn and was designed specifically to store digital data gleaned from the internet. Bamford suggests it will be able to process all forms of communications, including the contents of private emails, mobile phone calls and personal data trails – including parking receipts and purchases at book stores. The building will occupy over one million square feet, including 100,000ft2 of datacentre space. Forbes magazine estimates its capacity as at least 12 exabytes of data, and calculates that just 200 of its 10,000 racks of servers would be enough to store all the phone calls made in the US in a year.

Meeting Edward Snowden The vast scale of the NSA’s interception programme became clear when Edward Snowden, a former CIA employee – then working for the NSA contractor Booz Allen Hamilton, – flew from an NSA facility in Hawaii to Hong Kong in May 2013. A few weeks later, under conditions of secrecy, he handed tens of thousands of classified documents over to journalists Glenn Greenwald, Laura Poitras and Ewen MacAskill. Bamford is one of a handful of journalists to meet Edward Snowden in person. He spent three days with him in Moscow in 2014, interviewing and filming. Bamford already knew a lot about Snowden, having spoken to Glenn Greenwald and others, and through his own research. Nevertheless, he says, what most struck him was Snowden’s life story. “I didn’t know anything about him growing up, like when he was a kid,” he says. Snowden’s family were models of respectability. His father spent his career in the military, his mother worked for the US court system, and his sister was a lawyer – not the sort of background you might expect of one of America’s most wanted fugitives. As Snowden grew up, he spent time at his grandmother’s house and became fascinated with books about mythology. “That sort of gave him these ideas of the good and the bad, you know, how somebody can fight against evil, fight against bad. That was all brand new to me, and that was really an interesting insight,” says Bamford. Edward Snowden At school, Snowden was forced to take time out for 10 months, due to illness. He missed his class year, and went to community college instead, where he developed a passionate interest in computers. “He’s like a natural born computer geek.” Snowden wanted to follow his father’s footsteps into the military and serve his country. He aimed high, signing up for the US special forces. “He wanted to not only join the army as an enlisted guy, but join the special forces. And, you know, he’s a slight guy. He’s smaller than me, very thin. So he’s not the kind of guy that is going in there because he’s macho,” says Bamford. Snowden told Bamford that he was forced to leave when he broke both his legs during a training accident, and was discharged. He still wanted to serve his country, and ended up taking a job as a security guard at an NSA facility, gaining top secret security clearance along the way. Snowden’s interest in computers and top security clearance ultimately helped him land a job in the CIA, then later Booz Allen Hamilton. “It was there that he started seeing the video of the drones, and started meeting other people in the CIA who knew about the torture and all the bad stuff that was going on,” he says. “He started to see the darker side of what was going on, both in the military and the intelligence community.”

Collaboration between the US and Israel One of the things Snowden was most outraged about, during his meeting with Bamford, concerned co-operation between the US and Israel. Snowden disclosed that the NSA was passing the unredacted interceptions of the communications of Arab and Palestinian Americans to the Israeli government. Normally, when the NSA shares such sensitive information, it removes personally identifiable information – but in this case, the NSA did not appear to be following its own rules. “The Israelis could take that and blackmail Palestinians into going to work for them as spies, or use it to put them in jail. This is the United States giving information to another country that there’s no justification for,” says Bamford. Bamford discovered that 43 members of a secret Israeli military organisation – known as Unit 8200 – had written to prime minister Benjamin Netanyahu, and to the head of the Israeli army, alerting them that Israel had wrongly used the information against innocent Palestinians for political persecution. He wrote a critical op-ed piece about the affair for The New York Times, highlighting abuses. “You’d think there would be a big outcry, but there wasn’t. There wasn’t any outcry at all,” says Bamford. “The public wasn’t outraged, congress wasn’t outraged. That’s the problem in doing this kind of work.” Ultimately, it was discoveries like this that led Snowden on the path to becoming the world’s most notorious whistleblower. Remarkably, he was able to download hundreds of thousands of pages of NSA documents, and take them out of his offices, undetected. The NSA has formed alliances with a wide range of US technology companies to support interception of telephone, email and internet traffic The documents Snowden handed over to journalists showed just how closely the tentacles of the NSA are entwined with US technology and communications companies. The agency relies on them – wittingly or unwittingly – to supply the electronic intelligence it gathers. According to Bamford, it began with “Operation Shamrock”, in the 1940s and 1950s, when the US government put pressure on communications companies such as ITT, Western Union and RCA, to hand over telegrams without the judicial oversight required by law. “They used a lot of intimidation to do that,” he says. “They set up this secret little office in New York, masquerading as a television tape company,” said Bamford, speaking at the Logan Symposium in London in 2014. Technicians collected tapes after midnight, copied them and returned them before the morning shift arrived. Under Nixon, in the late 1960s and early 1970s, the NSA expanded its operations, by supplying intelligence on US citizens involved in protests against the government. They included well-known figures such as actress Jane Fonda, singer Joan Baez and the clinician Benjamin Spock. The NSA in numbers 5 countries; 50 partner countries 90 commercial partners; 20 major cable accesses; 20 covert cable accesses; 100 embassy interception sites; millions of computers affected by NSA malware. Source: Duncan Campbell, investigative journalist, speaking at the Logan Symposium 2014. Telephone calls, telegrams and telexes from thousands of innocent people were vacuumed up by the NSA, which had a policy of collecting everything, even tangentially related to their investigation, Bamford revealed in The Puzzle Palace, the first book to lift the lid on the NSA. In the 1990s, the NSA proposed that US telecommunications companies adopt the Clipper Chip to encrypt communications. The chip contained a backdoor that would allow the NSA access – it attracted opposition from the public and telecommunications companies themselves. It was eventually dropped but, behind the scenes, the NSA was making other secret arrangements with telecommunications and IT companies. The reach of the NSA’s tentacles became exposed to public scrutiny when the Guardian, the Washington Post, Der Speigel and The New York Times published their analysis of the Snowden documents. Prism, a programme which allowed judges to order the disclosure of data about customers from Microsoft (including Hotmail) Google, Facebook, Yahoo, YouTube, Paltalk, AOL and Skype, is perhaps the best-known example. Another programme, Operation Muscular, sought to bypass the encryption Google and Yahoo use to make their customers’ emails private, allowing the NSA to hoover up data on a much larger scale. “The fibre optic links between the companies and their datacentres, or between the datacentres themselves, were unencrypted, so they were able to access that,” says Bamford. An NSA PowerPoint of the operation shows a smiley face where the encryption is removed. Meanwhile, the NSA’s Tailored Access Operations (TAO) unit intercepted Cisco servers, routers and network gear in transit, and installed covert interception devices before they were repacked and delivered. The operation gave the NSA backdoor access into networks around the world.

The collateral damage to technology firms The disclosures damaged confidence in the technology companies, from both businesses and the public – and damaged them financially. “The last figures I saw, it was costing them a huge amount of money in lost sales,” says Bamford. “Because if somebody’s going to spend a lot of money, millions of dollars, on a system, why would they buy it from a company where they know there’s a backdoor to NSA? So they’ll go to a Swiss company, or a French company or they’ll go someplace else.” Brazil, for example is looking to build an undersea communications cable to Europe to bypass the US, and switched from buying satellites from a US company to a French company, says Bamford. Firms such as Apple and Yahoo are now encrypting their systems so the government does not automatically have access to their customers’ metadata. And some US cloud-based companies are starting to offer services guaranteeing customers that their data, and support and maintenance services, will be kept in Europe. “I think they realised that that’s the only way they’re going to start getting some of their customers back,” says Bamford. “There are a lot of people losing a lot of money in Silicon Valley because of this.”

GCHQ warns technology companies But there is little sympathy from government for the technology companies. Robert Hannigan, then director of GCHQ, fired a shot across the bows of US internet companies in 2014, warning them not to go too far to protect their customers’ data, in the face of terrorist threats such as Daesh. Like it or not, he argued – in remarkably strong terms in a newspaper article – US technology companies have “become the command and control networks of choice for terrorists and criminals”. Bamford sees Hannigan’s comments as public support for the NSA’s lobbying to expand its data-gathering capabilities. From Five Eyes to 35 eyes. The NSA’s signal intelligence partners have expanded from the original five - US, UK, Australia, Canada, New Zealand and UK – into a global network “I think that he was basically supporting the NSA’s position, which is that the NSA and GCHQ should be able to get access to that information whenever they want,” says Bamford. It is perhaps not surprising that Hannigan should have spoken out so strongly, given the close working relationship between the two organisations. They are part of the Five Eyes network, a group that shares electronic intelligence with the US, UK, Australia and New Zealand.

The NSA’s twin brother The relationship between the NSA and GCHQ is far closer than the relationship between the NSA and the CIA, says Bamford. “The NSA and GCHQ are like twin brothers.” And for good reason. GCHQ has access to all the satellites across Europe and the transatlantic cables which are a rich source of intelligence for the NSA. When workers at GCHQ’s Cheltenham headquarters went on strike for a week, the NSA took up the slack. And when the NSA’s director, Michael Hayden, received a phone call alerting him that all the NSA’s computers had crashed in 2000, GCHQ stepped in to cover. “General Michael Hayden was at home, around seven o’clock on a Sunday night, and the guy in charge of the operation centre called up and said, ‘All the computers have crashed.’ And Hayden said something like, ‘which one?’ He said, ‘All of them.’ And then they kept it a secret for about a week. That was a big deal,” says Bamford.

Pat and Louis – the antennas Bamford has uncovered close financial links between the two organisations. In the early 1980s, for example, he obtained documents which showed the NSA had paid for two large antennas at GCHQ’s intelligence-gathering facility near Bude in Cornwall. The then director of GCHQ was so grateful that he wrote to his counterpart at the NSA, Pat Carter, saying the dishes should be named “Pat”, after him, and “Louis”, after his deputy director, Louis Tordella. “They talked about how ‘our employees are in bed with each other’ and ‘should we pull the sheets up tight’. But that’s the way it’s been – GCHQ people at NSA, and NSA out here in the UK,” he says. The relationship between GCHQ, the NSA and the other Five Eyes partners is a complex one. Bamford had sight of one document in the Snowden archive that showed that US policy is to honour its agreements with its collaborators only if it is convenient to do so. “It was fascinating, because it stated in black and white that the US would honour its agreements with its partners – unless there is a reason not to,” says Bamford. “So it made no sense. If one side can unilaterally go against the nature of the agreement, then there really isn’t an agreement, right?”

US citizens protected by law While in theory there are laws to protect US citizens from being monitored by the NSA, there are few similar protections for UK, or other non-US, citizens. “There is nothing at all legally, or any other way, preventing the NSA from eavesdropping on non-US citizens,” says Bamford. If anything, GCHQ has fewer legal constraints than its larger counterpart, he says. “There are things that GCHQ does that I don’t think the NSA could get away with.” German news magazine Der Speigel, for example, exposed a “dirty tricks” unit in GCHQ, dubbed My Networks Operations Centre (MYNOC). One of its tasks was to create fake LinkedIn pages, infected with malware. It used them to target engineers working at the Belgian mobile phone company, Belgacom, opening up a gateway into the phone company’s networks, and its customers’ mobile phones for an extensive surveillance operation. “That’s an area that I think would be a little beyond the pale for NSA. But for GCHQ and this organisation MYNOC, there’s almost no limit to what they do,” he says. More recently, GCHQ has admitted in court that it carries out Computer Network Exploitation (CNE) – in other words hacking – in the UK and overseas. The agency has the ability to turn on microphones and cameras on electronic devices without the owner’s knowledge, identify a person’s location and to make copies of personal documents. The projects have fanciful names, such as Nosey Smurf, which plants malware to turn on smartphone microphones; Dreamy Smurf, for switching on smartphones; and Paranoid Smurf, for hiding malware on mobile devices. GCHQ told the court that the measures are proportionate, and conducted under strict legal safeguards. Opponents argue that the warrants are so broad they could allow GCHQ to legally hack all the phones in a city.

Fighting terrorism – missed opportunities The NSA has grown enormously over the past decade, in its capability, financial resources and political power. And in the 1990s, the NSA stepped up its fight against terrorism. “They were terrible at it,” says Bamford. “I mean, the first World Trade Center attack in the early 1990s, they completely missed, even though there was a lot of planning back and forth between the Middle East and the conspirators in New York. And they missed the attack on the USS Cole in Yemen. Yemen was a big target. And they missed the attacks on the embassies in East Africa. These are really big deals. Two US embassies blew up, they didn’t have a clue.” The 11 September 2001 attacks against the World Trade Center caught the NSA off-guard. “General Hayden [the NSA director] watched it happen on his television in his office, no clue whatsoever,” says Bamford. Bamford lists a long list of other cases the NSA should have known about: The underwear bomber, the attempted bombing in Times Square and the Boston Marathon bombing. “Even though they’d been communicating back and forth to Chechnya, and flown back and forth, they had no clue,” he says. After the Snowden revelations, the NSA said publicly that it had found more than 50 incidents where it was able to find clues to terrorist plots. But even that didn’t stand up, claims Bamford. “After they were questioned by the Senate Intelligence Committee, it got down to one. And that one was a taxi driver in San Diego who sent $8,000 to some group in Somalia,” he says.

Calls for checks and balances Following Snowden’s leaks, there has been widespread pressure to introduce checks and balances to control the workings of the NSA and GCHQ. US technology companies are among those pressing for the US government to restrain the NSA, and bring it under greater legal control. In the UK, internet service providers (ISPs) have brought challenges in the interception of communications tribunal. There have been some changes. The NSA has lost its legal authority to collect bulk records of phone metadata on American citizens, following the passage of the US Freedom Act. The executive branch will now have to apply to the US Foreign Intelligence Surveillance Court to require telecommunications companies to hand over specific records. There is no such protection, however, for phone or internet traffic of non-US citizens. But Bamford sees little sympathy for technology companies in Washington. It is simply not a vote winner. The NSA monitors internet traffic and attempts to “collect it all” After the Snowden revelations broke, the people who were fighting most against the NSA were the biggest losers in elections. There were only two senators fighting for reforms – Mark Udall and Ron Wyden – and Udall lost his seat.

“The critics are getting fired and the people pushing for more and more spying have basically been winning,” says Bamford. If anything, Bamford says he has seen an appetite in the White House to ensure that technology companies co-operate more with the intelligence agencies. “I’ve seen these proposed legislations to force these companies to give them the keys to the encryption,” he says. In an address to the nation in December 2015, president Barak Obama hinted at plans to toughen the government’s stand against strong encryption, urging high-tech leaders to make it harder for terrorists to hide from injustice. Hillary Clinton, the Democratic front-runner to succeed Obama in 2017, has joined the fray, saying technology companies need to join the fight against Islamic State. The UK has seen the draft Investigatory Powers Bill, which sets out powers for the security and intelligence services to collect telephone and internet data from communications companies in bulk. The bill will require ISPs to keep records of every website visited by the public for a year. There are powers for police and the security services to carry out hacking, and powers to demand access to encrypted communications from technology companies.

Where is the outrage? Bamford is surprised just how little outrage there has been in the UK over the growing encroachment of the state on people’s private lives, without the strong oversight that should demand. “You have somebody like Snowden who basically gives his life away, and then there’s only a temporary outrage and it goes away, and everything’s back to normal again,” he says. The reaction has been stronger in Brazil, where president Dilma Rousseff cancelled a state visit to Washington, following allegations that the NSA was intercepting her emails and messages, along with those of the state oil company, Petrobras. And in Germany, where the country’s relations with the US were shaken after it emerged that the NSA had eavesdropped on chancellor Angela Merkel’s mobile phone. “I would think there’d be more outrage in what they’re doing domestically, but it’s far less than I would expect. And I think a lot of it is because of we have this post-9/11 attitude where, whatever the government is doing, it’s doing to protect us from the terrorists,” he says.