Sunday, February 8, 2009

Obama plans complete overhaul of National Security Council

(Compiler's note: A must read and still developing .... We are bound to see more on this topic.)

from GulfNews

Washington: US President Barack Obama plans to order a sweeping overhaul of the National Security Council (NSC), expanding its membership and increasing its authority to set strategy across a wide spectrum of international and domestic issues.

The result will be a "dramatically different" NSC from that of the Bush administration or any of its predecessors since the forum was established after Second World War to advice the president on diplomatic and military matters, according to national security adviser James Jones, who described the changes in an interview.

"The world that we live in has changed so dramatically in this decade that organisations that were created to meet a certain set of criteria no longer are terribly useful," he said.

Jones, a retired Marine general, made it clear that he will run the process and be the primary conduit of national security advice to Obama, eliminating the "back channels" that at times in the Bush Administration allowed Cabinet secretaries and the vice president's office to unilaterally influence and make policy out of view of the others.

"We're not always going to agree on everything," Jones said, and "so it's my job to make sure that minority opinion is represented" to the president. "But if at the end of the day he turns to me and says, 'Well, what do you think, Jones?', I'm going to tell him what I think."

The new structure, to be outlined in a presidential directive and a detailed implementation document by Jones, will expand the NSC's reach far beyond the range of traditional foreign policy issues and turn it into a much more elastic body, with Cabinet and departmental seats at the table- historically occupied only by the secretaries of defence and state - determined on an issue-by-issue basis. Jones said the directive will probably be completed this week.

"The whole concept of what constitutes the membership of the national security community - which, historically has been, let's face it, the Defence Department, the NSC itself and a little bit of the State Department, to the exclusion perhaps of the Energy Department, Commerce Department and Treasury, all the law enforcement agencies, the Drug Enforcement Administration, all of those things - especially in the moment we're currently in, has got to embrace a broader membership," he said.

New NSC directorates will deal with such department-spanning 21st-century issues as cybersecurity, energy, climate change, nation-building and infrastructure.

Many of the functions of the Homeland Security Council, established as a separate White House entity by President Bush after the terrorist attacks of September 11, 2001, may be subsumed into the expanded NSC, although it is still undetermined whether elements of the HSC will remain as a separate body within the White House.

Over the next 50 days, John Brennan, a CIA veteran who serves as presidential adviser for counterterrorism and homeland security and is Jones's deputy, will review options for the homeland council, including its responsibility for preparing for and responding to natural and terrorism-related domestic disasters.

In a separate interview, Brennan described his task as a "systems engineering challenge" to avoid overlap with the new NSC while ensuring that "homeland security matters, broadly defined, are going to get the attention they need from the White House."

Organisational maps within the government will be redrawn to ensure that all departments and agencies take the same regional approach to the world, Jones said.

Communist: Obama working to nationalize U.S. economy

By Aaron Klein

President Obama is "considering" a radical agenda to nationalize the U.S. financial system, the Federal Reserve Bank, and private industries such as energy and other sectors whose future is "problematic" in private hands, claims the leader of the Communist Party USA.

In a major speech focused on Obama titled "Off and running: Opportunity of a lifetime," CPUSA leader Sam Webb also alleges Obama's administration is considering turning education, childcare, and health care into "no profit zones;" rerouting investment capital from military infrastructure to "green economy" projects and public infrastructure; and waging a "full scale" assault on global warming.

"We now have not simply a friend, but a people's advocate in the White House," declared Webb at a recent speech in Ohio for People's Weekly World Communist newspaper.

"An era of progressive change is within reach, no longer an idle dream. Just look at the new lay of the land: a friend of labor and its allies sits in the White House," Webb proclaimed.

He stated Obama and the "broad coalition that supports him will almost inevitably have to consider – and they already are – the following measures:

  • Public ownership of the financial system and the elimination of the shadow banking system and exotic derivatives.
  • Public control of the Federal Reserve Bank.
  • Counter-crisis spending of a bigger size and scope to invigorate and sustain a full recovery and meet human needs – something that the New Deal never accomplished.
  • Strengthening of union rights in order to rebalance the power between labor and capital in the economic and political arenas.
  • Trade agreements that have at their core the protection and advancement of international working class interests.
  • Equality in conditions of life for racially minorities and women.
  • Democratic public takeover of the energy complex as well as a readiness to consider the takeover of other basic industries whose future is problematic in private hands.
  • Turning education, child care, and health care into "no profit" zones.
  • Rerouting investment capital from unproductive investment (military, finance and so forth) to productive investment in a green economy and public infrastructure.
  • Changing direction of our nation's foreign policy toward cooperation, disarmament, and diplomacy. We can't have threats, guns and military occupations on the one hand and butter, democracy, goodwill, and peace on the other.
  • Full scale assault on global warming.
  • Serious and sustained commitment to assisting the developing countries that are locked in poverty and misery."

Webb lauded Obama's $800-plus billion so-called stimulus package as "a good bill that will ease the pain of this crisis, create jobs, and begin to reflate the economy."

He explained labor unions, which he said were instrumental in Obama's election, must work to keep the White House in check by "exercis[ing] an enormous influence on the political process. Never before has a coalition with such breadth walked on the political stage of our country," he said.

Indeed, in an article just after last November's election titled, "Special Interest or Class Consciousness? How Labor Put Obama in the White House," Political Affairs reported on polling data released that revealed the extent of union support for Obama.

The American Federation of Labor and Congress of Industrial Organizations, or AFL-CIO, sponsored a poll showing union members supported Obama by a 68-30 margin and strongly influenced their family members.

According to the survey, Obama won among white men who are union members by 18 points. Union gun-owners backed Obama by 12 points, while union veterans voted for Obama by a 25-point margin. In the general population, Obama lost these groups by significant margins.

Cracking the case: ‘DOMEX’ system is tool used to analyze crime

(Compiler's note: A must read as the gov't readies for possible budget cuts from the new administration.)

BY MIKE FAHER

When Baltimore authorities seized computers connected to a multimillion-dollar Internet pharmacy operation in late 2006, they turned to Johnstown for help.

Specialists at the National Drug Intelligence Center analyzed large amounts of electronic information, providing crucial evidence that led to two convictions in Maryland’s largest-ever pharmaceutical-trafficking case.

I just cannot say enough about what they did with these computers,” said Andrea Smith, an assistant U.S. attorney in Baltimore.

That same process has been repeated more than 700 times since 1993: NDIC analysts dissect computers, cell phones and other electronic devices – along with mountains of documents – to support federal criminal cases.

They’ve developed their own software to speed up the process and have quietly assisted in major probes, including the large-scale investigation of the 9/11 terrorist attacks.

At an agency that often is accused of being wasteful and duplicative, NDIC’s Document and Media Exploitation Branch – called DOMEXis a little-known function that has had a significant impact across the nation and around the world, NDIC officials said.

Nobody else does what we do,” said Harry Kuerner, DOMEX branch chief.

NDIC officials acknowledge that what they call “document exploitation” is nothing new: Analyzing information and evidence is a vital part of any criminal case.

But the difference in their work, they say, is speed and clarity.

A law-enforcement agency may have limited resources and time to examine large amounts of evidence, particularly data buried deep in a computer system.

But when a federal agency asks NDIC for help, a DOMEX team – usually made up of 18 to 23 people – forms and quickly establishes “priority intelligence requirements” – the slivers of information to look for when sifting through an evidentiary hay stack.

Examples include assets and associates of a suspect, financial transactions, phone numbers and “references to a specific crime in notes, e-mails or other communications,” officials said.

DOMEX staff can deploy anywhere, and most foreign-language missions are conducted at a satellite facility called the Utah National Guard/Joint Language Training Center near Salt Lake City.

But in most cases, evidence is shipped directly to Johnstown. A DOMEX team – assisted by specialists working in the NDIC’s Digital Evidence Laboratory – then sifts through that information, coming up with a concise report in an average of two weeks’ time.

That report ensures that evidence is linked to a specific document that was in a suspect’s possession.

Baltimore’s Internet-pharmacy case, for example, involved “overwhelming” amounts of information, Smith said.

But NDIC analysts showed that, of 36 doctors writing prescriptions for the painkiller hydrocodone through a targeted pharmacy called NewCare, 11 of those physicians accounted for more than 98 percent of those prescriptions.

The analysis also found that hydrocodone accounted for about 88 percent of the prescriptions filled by NewCare – for a total of 9.9 million doses.

“It was so compelling,” Smith said.

“You can’t argue against numbers like that.”

She added that the data was “mined from the defendants’ own computers, so they couldn’t say they didn’t know.”

Specialized software

Early on, officials say, NDIC analysts used “whatever tool they could” to compile evidence in Microsoft Word documents for presentation to investigators.

But times have changed: Highly specialized software developed in Johnstown now helps NDIC staff sort and prioritize evidence.

One program is called RAID, short for Real-time Analytical Intelligence Database. It is an organizational tool that allows management of “large quantities of data,” with links between related pieces of information – a suspect’s associates, for example, along with his addresses and travel destinations.

RAID’s reach has extended far beyond Johnstown.

NDIC makes the software available free to law enforcement and intelligence agencies. Last year, the center provided RAID installation and training in the West African countries of Ghana and Togo; conducted a seminar employing RAID in Uganda, East Africa; and finished development of a new, Spanish-language version of the program.

Another important tool – also developed at NDIC – is dubbed “HashKeeper.”

It allows analysts to put aside all commercial software files on a computer and focus solely on files that a user has created or altered. In other words, HashKeeper ignores a Microsoft Word program and zeroes in on Word documents a suspect created.

“This can reduce the amount of time required to analyze computers by up to 60 percent,” an NDIC official said in a recent briefing.

Like RAID, HashKeeper also has found a wider audience: In June 2007, officials announced that the Department of Defense was using the program in Iraq.

Analyzing evidence

But even with help from high-tech tools, NDIC administrators say, it’s the people – or in this case, the analysts – who make the difference.

Those analysts, with various areas of expertise, have to know what they’re looking for, how to find it and how to interpret what they find.

The work is complicated and can be intense, with information the DOMEX team uncovers sometimes used by investigators to seize more evidence or make an arrest.

“We’re getting something out to the field that they can use now – not six months or a year from now,” said Steve Gironda, NDIC’s Digital Evidence Laboratory supervisor.

While most missions are drug-related, DOMEX staff members are trained to handle all kinds of cases: They have helped with investigations involving terrorism, child abduction, weapons trafficking and organized crime.

“It pretty much works on anything,” Kuerner said. “White-collar crime, public corruption – anything that we’ve been asked to do, we’ve been able to do.”

Often, no matter what the alleged crime, NDIC experts are looking at the same types of devices. Paper evidence remains important, but more and more information is in electronic form:

Cell phones, with their increasing complexity and capacity, can be virtual gold mines for analysts who are looking for phone numbers, addresses, pictures, etc.

“There’s no much information on a cell phone right now that never leaves it,” Gironda said, while adding that examining phones can be a complicated endeavor.

Three identically branded cell phones, for example, may be connected to three different service providers.

“All three of them, you have to attack a different way because they have different operating systems,” Gironda said.

Computer-based instant messaging “gets the bad guys into more trouble than you might think,” Gironda said.

• Even video-game systems can play an important role, since many have hard drives and Internet connectivity.

Such systems “are used for nefarious activities because criminals believe those items will be overlooked by law enforcement because they are gaming machines,” NDIC spokesman Charles Miller said.

Getting results

With the average mission involving six computers and two phones, DOMEX staff members are not prone to overlooking anything.

“If we know what to look for – and our people are very good at this – we can provide a very good report,” said Bill Scott, a DOMEX team leader.

Last month, officials announced sentencings in the long-running Baltimore hydrocodone case: Two pharmacists will serve five years in prison, and each was ordered to pay nearly $11.9 million.

Forfeited to the government were houses, a business, seven cars and money in 33 bank accounts. The probe involved several federal agencies and numerous law-enforcement entities.

But Smith credits Paul Short, a DOMEX supervisor, with testifying in court on three occasions and helping to slam the door shut on the defendants.

“No one can hold a candle to (NDIC),” she said. “This was just amazing.”

Though they labor in relative anonymity in a former Johnstown department store, Short and his NDIC colleagues understand the potential impact of their work.

“This isn’t the guy selling crack on the street corner,” Short said. “These are guys who are dealing with tons and tons of drugs.”

NDIC probes range from drugs to terrorism

BY MIKE FAHER

In the aftermath of the Sept. 11, 2001, terrorist attacks, a team of analysts based in Johnstown played a critical role.

Their work grabbed no headlines, and they had no visible presence at the three attack sites.

But document-exploitation experts at the National Drug Intelligence Center assisted the FBI by analyzing more than 75,000 subpoenaed documents related to potential terrorist financing.

The work NDIC produces continues to initiate actionable leads and identify avenues of investigation,an FBI official wrote in a November 2001 letter.

“NDIC has integrated seamlessly with the FBI investigation and has enhanced the way the FBI will investigate future financial cases.”

Since NDIC’s inception in the early 1990s, analysts have assisted hundreds of cases by poring over documents and probing electronic devices, searching for key bits of evidence.

In just the past few years, members of what is now called the NDIC’s Document and Media Exploitation Branch have participated in multiple complex missions for a variety of federal agencies.

Examples include:

• In fiscal year 2007, document-exploitation staff assisted in a probe of a Colombian drug kingpin; examined links between Philippines drug traffickers and terrorist organizations; and participated in Operation Raw Deal – a case officials called “the largest steroid-enforcement action in U.S. history.”

• October 2007: An Army officer accused of crimes in Iraq, Lt. Col. William Steele, is sentenced to prison time. NDIC analysts supported the case by examining phone records and “nearly 12,000 classified documents that existed alone or as attachments to e-mail files,” officials said.

• November 2007: Analysts identify assets valued at more than $5 million in connection with a “multinational investigation of a major international money-laundering organization” in the U.S., Mexico, China and Switzerland.

• December 2007: The Johnstown center supports a probe of a terrorist organization. Analysts “identified 70 individuals with direct connections to the conspirators and provided 92 linked media files – including photo identification – documenting the links,” officials said.

• July and August 2008: In support of a Department of Justice probe, NDIC finds more than 800 suspected child pornography photographs “and provided investigators with important information on conspirators’ financial assets and leads regarding additional potential targets,” center administrators said.

• August and September 2008: Analysts identify assets controlled by a South American drug-trafficking organization, including more than 300 properties and 100 bank accounts.

French fighter planes grounded by computer virus

by Kim Willsher

The aircraft were unable to download their flight plans after databases were infected by a Microsoft virus they had already been warned about several months beforehand.

At one point French naval staff were also instructed not to even open their computers.

Microsoft had warned that the "Conficker" virus, transmitted through Windows, was attacking computer systems in October last year, but according to reports the French military ignored the warning and failed to install the necessary security measures.

The French newspaper Ouest France said the virus had hit the internal computer network at the French Navy.

Jérome Erulin, French navy spokesman told the paper: "It affected exchanges of information but no information was lost. It was a security problem we had already simulated. We cut the communication links that could have transmitted the virus and 99 per cent of the network is safe."

However, the French navy admitted that during the time it took to eradicate the virus, it had to return to more traditional forms of communication: telephone, fax and post.

Naval officials said the "infection"' was probably due more to negligence than a deliberate attempt to compromise French national security. It said it suspected someone at the navy had used an infected USB key.

The Sicmar Network, on which the most sensitive documents and communications are transmitted was not touched, it said. "The computer virus problem had no effect on the availability of our forces." The virus attacked the non-secured internal French navy network called Intramar and was detected on 21 January. The whole network was affected and military staff were instructed not to start their computers.

According to Liberation newspaper, two days later the chiefs of staff decided to isolate Intramar from the military's other computer systems, but certain computers at the Villacoublay air base and in the 8th Transmissions Regiment were infected. Liberation reported that on the 15 and 16 January the Navy's Rafale aircraft were "nailed to the ground" because they were unable to "download their flight plans". The aircraft were eventually activated by "another system".

Liberation also reported that Microsoft had identified the Conficker virus in the autumn of 2008 and had advised users from October last year to update their security patches. IntelligenceOnline reports that "at the heart of the (French) military, the modifications were, for the most part, not done." It was only on the 16 January "three months later" that the navy chiefs of staffs began to act.

"At that point, the chiefs of staff and the defence ministry had no idea how many computers or military information systems were vulnerable to having been contaminated by the virus," said Liberation.

The French press also reported that the only consolation for the French Navy was that it was not the only ones to have fallen victim to the virus. It said that a report in the military review Defense Tech revealed that in the first days of January 2009 the British Defence Ministry had been attacked by a hybrid of the virus that had substantially and seriously infected the computer systems of more than 24 RAF bases and 75 per cent of the Royal Navy fleet including the aircraft carrier Ark Royal.

CIA Warns Obama British Terrorists Biggest Threat To US

(Compiler's note: A must read!)

By Tim Shipman

Barack Obama with CIA Director-designate Leon Panetta: CIA warns Barack Obama that British terrorists are the biggest threat to the US

The CIA has told President Barack Obama that British terrorists are the biggest threat to the US

American spy chiefs have told the President that the CIA has launched a vast spying operation in the UK to prevent a repeat of the 9/11 attacks being launched from Britain.

They believe that a British-born Pakistani extremist entering the US under the visa waiver programme is the most likely source of another terrorist spectacular on American soil.

Intelligence briefings for Mr Obama have detailed a dramatic escalation in American espionage in Britain, where the CIA has recruited record numbers of informants in the Pakistani community to monitor the 2,000 terrorist suspects identified by MI5, the British security service.

A British intelligence source revealed that a staggering four out of 10 CIA operations designed to thwart direct attacks on the US are now conducted against targets in Britain.

And a former CIA officer who has advised Mr Obama told The Sunday Telegraph that the CIA has stepped up its efforts in the last month after the Mumbai massacre laid bare the threat from Lashkar-e-Taiba, the militant group behind the attacks, which has an extensive web of supporters in the UK.

The CIA has already spent 18 months developing a network of agents in Britain to combat al-Qaeda, unprecedented in size within the borders of such a close ally, according to intelligence sources in both London and Washington.

Bruce Riedel, a former CIA officer who has advised Mr Obama, told The Sunday Telegraph: "The British Pakistani community is recognised as probably al-Qaeda's best mechanism for launching an attack against North America.

"The American security establishment believes that danger continues and there's very intimate cooperation between our security services to monitor that." Mr Riedel, who served three presidents as a Middle East expert on the White House National Security Council, added: "President Obama's national security team are well aware that this is a serious threat."

The British official said: "The Americans run their own assets in the Pakistani community; they get their own intelligence. There's close cooperation with MI5 but they don't tell us the names of all their sources.

"Around 40 per cent of CIA activity on homeland threats is now in the UK. This is quite unprecedented."

Explaining the increase in CIA activity over the past month, Mr Riedel added: "In the aftermath of the Mumbai attack the US and the UK intelligence services now have to regard Lashkar-e-Taiba as just as serious a threat to both of our countries as al-Qaeda. They have a much more extensive base among Pakistani Diaspora communities in the UK than al–Qaeda."

Information gleaned by CIA spies in Britain has already helped thwart several terrorist attacks in the UK and was instrumental in locating Rashid Rauf, a British-born al-Qaeda operative implicated in a plot to explode airliners over the Atlantic, who was tracked down and killed in a US missile strike in November.

But some US intelligence officers are irritated that valuable manpower and resources have been diverted to the UK. One former intelligence officer who does contract work for the CIA dismissed Britain as a "swamp" of jihadis.

Jonathan Evans, the director general of MI5, admitted in January that the Security Service alone does not have the resources to maintain surveillance on all its targets. "We don't have anything approaching comprehensive coverage," he said.

The dramatic escalation in CIA activity in the UK followed the exposure in August 2006 of Operation Overt, the alleged airline bomb plot.

The British intelligence official revealed that CIA chiefs sent more resources to the UK because they were not prepared to see American citizens die as a result of MI5's inability to keep tabs on all suspects, even though the Security Service successfully uncovered the plot.

MI5 manpower will have doubled to 4,100 by 2011 but many in the US intelligence community do not think that is enough.

For their part, some British officials are queasy that information obtained by the CIA from British Pakistanis was used to help target Mr Rauf, a British citizen, whom they would have preferred to capture and bring to trial.

Sensitivities over the intelligence arrangement formed a key part of briefings given to Mr Obama, since they are central to what is often called "the most special part of the special relationship" and could complicate his dealings with Gordon Brown.

Tensions in transatlantic intelligence relations which were laid bare last week during the High Court battle over Binyam Mohamed, the British resident held in Guanatanamo Bay. British judges wanted to publish details of the torture administered to Mr Mohamed, an Ethiopian national, in US custody. But key paragraphs were blacked out after American officials threatened it could damage intelligence sharing between the two countries.

Intelligence experts said that a trusting intelligence relationship, in which one country does not publish intelligence data obtained by the other, is vital to both countries' national security.

Patrick Mercer, chairman of the House of Commons counter-terrorism sub-committee, said: "The special relationship is a huge benefit to us. It clearly works to our advantage and helps keep the people of the UK and the US safe.

"There is no doubt that a great deal of valuable intelligence vital to British national security is procured by American agents from British sources."

Mr Riedel added: "The partnership between the two intelligence communities is dynamic; it is one of great intimacy. We overuse the term special relationship, but this is an extraordinarily special relationship.

"Since September 11 the philosophy on both sides has been to err on the side of telling each other more rather than less. It is in everyone's interests that that continues."

Homegrown Jihad: The Terrorist Camps Around the U.S.

from The National Terror Alert Center


On February 11, 2009, at 7:30 pm. The Christian Action Network will premiere a new documentary, Homegrown Jihad, at the Landmark Theater in Washington, DC. There is no charge to attend the viewing.

According to the press release, “The American public was never supposed to know. The 2006 Justice Department document that exposes 35 terrorist training compounds in the U.S. was marked “Dissemination Restricted to Law Enforcement.” All the copies of Sheik Muburak Gilani’s terrorist training video, “Soldiers of Allah,” had been confiscated and sealed, all of them, that is, except one that Christian Action Network now reveals in the documentary Homegrown Jihad: The Terrorist Camps Around the U.S.

The Spymaster of New York

(Compiler's note: A must read)

By Christopher Dickey

David Cohen and the NYPD are pioneering a new way of fighting terrorism.

In sweltering Mumbai last November, two days after the terrorist rampage that killed or wounded more than 500 people, some odd figures joined the alphabet soup of agencies investigating the atrocity—three New York City police detectives. In 2005 other American cops looked at bomb detonators with Scotland Yard after the London tube bombings. Still others turned up in Madrid after its own train attacks in 2004, and several times in Jerusalem after suicide bombings there.

The cops showed up because David Cohen, the spymaster of the NYPD, sent them. A former director of clandestine operations for the Central Intelligence Agency, Cohen wants his own people seeing up close and right away the warning signs—he calls them signatures—that might have revealed a terrorist operation taking shape. And if the FBI, the CIA or any other federal agency objects to the NYPD making the world its beat, Cohen doesn't really care. "Listen to this," he told me one morning at his office at police headquarters in downtown Manhattan. "We got a report from the FBI on the Madrid bombing which was terrific, it was greatIt was ... 18 months later!" He drank from a mug with the eagle-and compass seal of the CIA on it. "They tried the best they could."

Ever since Police Commissioner Ray Kelly took over the NYPD in 2002 and set out to reinvent the department's role fighting terrorists, there have been fights with the Feds, too. Cohen has been right in the middle of them. The most recent, last year, involved his demand that the FBI move faster on requests for federal wiretaps on people with suspected links to terrorists. In a testy exchange of letters between Kelly and the then Attorney General Michael Mukasey, the Feds said they didn't want to submit requests to the courts that might get shot down. The cops wanted them approved yesterday. "In situations short of unambiguous emergency, the system too often moves too slowly and with too little urgency," Kelly wrote.

As the cops see it, "there's a plot taking shape against New York City every day of every week since 9/11," says Cohen. "What that plot consists of, who's doing it and where it's percolating from can change, but there's someone out there every day of the week thinking about that." Kelly, who did a turn as commissioner in 1993, when the World Trade Center was first attacked, returned to the job after 9/11 determined to make sure the city would not be blindsided again. Never a believer in the "clash of civilizations," he called the Bush administration's Global War on Terror "the GWOT," and made the word sound almost obscene. Kelly wanted to keep the combat intensely focused and pragmatic. The idea would be to prevent terrorists from acting, not to prosecute them after the fact. And the key to that would be real-time, actionable intelligence. Which is why he called on Cohen.

The choice wasn't as obvious as a CV might make it seem. There's probably never been a spymaster at the Central Intelligence Agency so hated by so many of his own spies as Cohen was in the mid-1990s when he ran the Directorate of Operations. "His first name wasn't David," recalls a top operative who served with him. "It was 'F–––ing Cohen'." Working obsessively, smoking pack after pack of cigarettes each day, Cohen was one of those gray men in the world of intelligence who can disappear into the background of a room, like John le Carré's George Smiley. He never quite fit in with the self-styled swashbucklers of the DO.

His whole career, in fact, Cohen had been an outsider on the inside. He was a street-smart kid from Boston, educated at Northeastern University, who joined the agency in 1967 when it was still dominated by the Ivy League. As an analyst, he focused on global issues like commodity markets and the oil trade, while most others specialized in countries or regions. In the late 1980s he oversaw the CIA's highly limited and controversial intelligence gathering inside the United States, which included recruiting "agents of access" in immigrant communities who could help recruit other agents abroad. After he was appointed deputy director for operations in 1995, he led the agency's spies around the world yet had never served in the field himself.

Throughout the storms that battered the CIA in the late 1980s and early 1990s, Cohen seemed to fall upward. The agency suffered through Iran-contra, failed to foresee the collapse of the Soviet empire or Iraq's invasion of Kuwait, and discovered moles burrowed deep inside its clandestine services. All around Cohen, things seemed to be crumbling. "When I became the DDO, there were seven people in clandestine service training. Seven!" he remembers. He kept on as best he could, creating what became known as the bin Laden unit in the mid-1990s, long before most of the world had heard of the terrorist mastermind. But by the time Cohen decided to take a job in the private sector in 2000, he was more reviled than revered, blamed for many woes that were not of his making.

Then 9/11 happened, and Kelly asked him to head the NYPD's Intelligence Division, making its primary mission to stop terrorist attacks on New York. Cohen asked for two days to decide, but called back in about an hour. "It's like starting the CIA over in the post-9/11 world," he said later. "What would you do if you could begin it all over again? Hah. This is what you would do."

In those first months of 2002, the conventional wisdom was that Al Qaeda was planning a second wave of attacks on the United States—as Vice President Dick Cheney said, new horrors were "not a matter of if, but when." Cohen had to scramble to get his organization up and running. "It was like putting tires on a speeding car," he said. He turned to the CIA for help, getting Lawrence Sanchez, a senior operative who had also been head of intelligence at the Department of Energy, seconded to the NYPD. Sanchez was able to keep Cohen abreast of anything and everything the CIA learned abroad, including whatever information about New York might be spilled by prisoners interrogated at the agency's "black sites."

But when it came to dealing with his old agency, Cohen believed, as he told colleagues, "there's no such thing as information sharing, there is only information trading." So the question was how his shop could start generating the kind of intel product that he could barter. He suggested to Kelly that New York cops be assigned overseas in cities where the local police were already deeply immersed in the fight against terrorists. But the real key to the success of the intelligence division lay closer to home.

Some 40 percent of New Yorkers are born outside the United States. That could be a dangerous problem, and in the popular imagination it probably is, but Kelly and Cohen saw the city's demographics as one of their greatest assets. In the aftermath of 9/11, the FBI and CIA (the "three-letter guys," in police parlance) had terrible problems finding agents and operatives who were fluent in foreign languages. Cold War–style background checks often eliminated recruits who had been born overseas. And native-born Americans were uninterested in foreign languages. In 2002, the total number of undergraduate degrees granted in Arabic in all U.S. colleges and universities—yes, all of them—was six.

In the NYPD, on the other hand, among the more than 35,000 serving officers in 2002, language testing quickly identified hundreds fluent in Arabic or Dari, Persian, Pashto, Fukienese—45 languages in all. Today, in any graduating class of the police academy there may be 50 nationalities or more.

In 2003, two alleged Iranian agents caught photographing the No. 7 subway line beneath the East River were surprised to find themselves confronted by a cop who spoke fluent Persian. They quickly left the country. In 2003, a young undercover officer born in Bangladesh penetrated a small group of angry young immigrants, two of whom had started plotting to blow up targets in Staten Island and the subway station at Herald Square.

When it comes to disrupting potential terrorist plots, cops can use simple techniques out of bounds to the CIA or even the FBI. Cohen's detectives, for instance, might follow a suspect onto a subway and have a uniformed cop collar him for an infraction as minor as sitting on two seats at a time. Once he's taken down to the station, he may be faced with the threat that his friends will find out he was there and think he's talked. "Mostly, we don't hear from those guys again," says one of Cohen's senior operatives.

Are we safe yet? Cohen doesn't think so. Homegrown "groups of guys" angered and inspired by what they see on the Web may be spotted and disrupted, but the threat remains that some will be missed. Others, like the London bombers in 2005, can visit terrorist-training camps to learn truly deadly skills. And all the while, Osama bin Laden remains at large, still looking for "the big bang," for another 9/11, says Cohen. "That ... wants to do it before he dies!" Not if the NYPD can help it.