Opinion

Jack Shafer

What an NSA charm offensive looks like

By Jack Shafer
June 27, 2013

Banged and bruised in the press over the NSA secrets liberated by Edward Snowden and serialized in the Guardian and the Washington Post, the national security establishment resorted to a little media offense earlier this week with a series of conversations with major news outlets.

As media blitzes go, it was sedate and vague. The natsec establishment made its first landing in the Washington Posts June 25 print edition, where two unnamed senior intelligence officials speculated about the damage done to U.S. national security by the leaks (“U.S. is worried about security of documents Snowden has”). The Post reported:

“Already, several terrorist groups in various regions of the world have begun to change their method of communication based on disclosures of surveillance programs in the media, the official said. He would not elaborate on the communication modes.”

Later that day, two unnamed senior intelligence official presented to CNN a slightly less gauzy picture of the terrorist organizations revising their use of communication technology following Snowden’s revelations (“Terrorists try changes after Snowden leaks, official says”). CNN reported:

“‘We can confirm we are seeing indications that several terrorist groups are in fact attempting to change their communications behaviors based specifically on what they are reading about our surveillance programs in the media,’ a U.S. intelligence official told CNN.”

The media tour included Reuters, which had a similar conversation with “two U.S. national security sources.” Its piece, time-stamped two hours after CNN’s, reported that “militants have begun responding by altering methods of communication.” Like CNN, Reuters learned from the intel officials that both Sunni and Shi’ite groups had changed communications methods and that those changes might leave the U.S. blind to future attacks.

How, exactly, had terrorist groups modified their behaviors? Relying more heavily on encryption? Dropping out of chat rooms? Streaming “Zero Dark Thirty” to review Osama bin Laden’s communications security faux pas? Resorting to carrier pigeons? “The officials declined to specify what changes were spotted among militant groups,” Reuters reported, “fearing that the more details provided on what was known about their behavior, the easier it would be for them to adapt.”

Were the intelligence officials teasing Reuters with their explanation? Or were they inadvertently revealing valuable methods and sources? After all, even vague press accounts about terrorist groups changing the way they converse are likely to be read by the very terrorist groups who intelligence officials observed changing their use of phones and computers. Might not this disclosure also encourage hard U.S. signals collection by encouraging terrorist groups to change the way they are changing their communications practices? It essentially tells terrorist groups that U.S. intelligence just watched them changing or discussing a change in the way they communicate. The shorter form of this disclosure might be, “Hey, terrorist groups! You’re communicating in a very sloppy and visible manner!”

The media barnstorming ended, at least temporarily, at the Associated Press, where a story (“Al-Qaida said to be changing its ways after leaks”) time-stamped June 26, 3:27 a.m. EDT, also reported assertions by two “U.S. intelligence officials” that “al-Qaida and other terrorists … are working frantically to change how they communicate.” Again, the nameless duo declined to provide any details beyond the self-evident.

Although each outlet on the tour added additional reporting beyond what the duo disclosed, and each has done fine work since Snowden dropped his bomb, the stories reek of official spin, of news by press release, of a government handout, and of a coordinated propaganda push. And the unnamed duo’s disclosure was a tad redundant: More than two weeks ago, Director of National Intelligence James Clapper went on NBC News to say the Snowden leaks would “obviously give our enemies a ‘playbook’ of how to avoid detection.”

Of course you’ll rarely hear beat reporters complain about special briefings like these in which the sources request anonymity and don’t say much. If anything, reporters are more likely to file a protest with the unnamed sources if excluded from the whistle-stop because their editors don’t want to be beaten on any story, even obvious — as Clapper would put it — stories like this. Besides, it’s as likely as not that the two intelligence officials who were the sources for this week’s stories are regular intelligence sources for the major news outlets, and it’s a time-honored journalistic practice to keep regular sources satisfied if not happy.

You might guess that I find this kind of water-carrying by the press corrupting. I do, but not absolutely corrupting. I’m fairly certain that the reporters who filed the stories cited here have broken stories that have angered the two unnamed intelligence officials and will gladly do so in the future.

Reporters, no matter what beat they cover, work with their government sources at the same time they work against one another, just like Ralph Wolf and Sam Sheepdog in the Warner Bros. cartoons. As long as I don’t have to read too many vapid accounts from unnamed intelligence officials, I won’t gripe too much.

Less cynical readers have every right to object, and the consumer adviser in me would instruct the unnamed intelligence officials to call a press conference and put their names to their warnings if the news is that urgent. I’d also have intelligence beat reporters and their editors affix warning labels to stories like these to signal readers that the story didn’t come from their initiative: I want intelligence beat reporters to come clean with their readers when government officials aggressively peddle a story line to the media but won’t take personal and professional responsibility for the peddling.

I single out intelligence reporters for abuse here, but the practice exists on every beat. Sometimes the story isn’t the story — the metastory is. When it is, reporters have no excuse not to say so.

******

Send your press releases for consideration to Shafer.Reuters@gmail.com, where I’ve set up a rule to route your email directly to the trash. The “Snowden effect” has had no effect on my Twitter feed? Sign up for email notifications of new Shafer columns (and other occasional announcements). Subscribe to this RSS feed for new Shafer columns.

 

 

 

 

 

PHOTO: An illustration picture shows the logo of the U.S. National Security Agency on the display of an iPhone in Berlin, June 7, 2013. REUTERS/Pawel Kopczynski 

Comments
3 comments so far | RSS Comments RSS

I myself am going back to using smoke signals — three puffs on my little cigar means that I really love Jack!

Posted by MIKEROL | Report as abusive
 

It is about time a journalist noted the NSA’s PR offensive. Thank you for this good article.

Posted by DeborahL | Report as abusive
 

A very thought provoking article.
Perhaps the 2 unnamed ‘intelligence officials’ who apparently went through a phone list of media contacts peddling a ‘talking points’ paper both have the job title of ‘Disinformation Czar?’

Posted by PatrickZ | Report as abusive
 

Post Your Comment

We welcome comments that advance the story through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Reuters. For more information on our comment policy, see http://blogs.reuters.com/fulldisclosure/2010/09/27/toward-a-more-thoughtful-conversation-on-stories/
  •