The tickle of curiosity. The gasp of discovery. Fingers running across the keyboard.

The tickle of curiosity. The gasp of discovery. Fingers running across the keyboard.

The World of Iniquus - Action Adventure Romance

Showing posts with label Edward Snowden. Show all posts
Showing posts with label Edward Snowden. Show all posts

Sunday, May 18, 2014

Government Intelligence 101 - Information for Writers with Jeff Critser



Author, Jeff Critser
Fiona - 


Hi Jeff - so great that you stopped by ThrillWriting today - can you take a minute and introduce yourself to the readers? You know the usual - what you've done with your life, your aspirations, and dreams...

Jeff - 
Sure thing. I am a former Naval Aviator and military intelligence officer on national SIGINT programs. I've always had a storytelling mindset (despite being an engineer by training) and during a writing assignment in graduate school, I knew at that stage that I wanted to be a novelist. Tom Clancy was one of my first inspirations when he wrote The Hunt for Red October, and even to this day, he is one of my favorite authors.

In addition to working signals intelligence operations (SIGINT) in the military and other national operations, I consult on security programs today in a variety of capacities. My main goal as an author is to weave stories in and around intelligence and espionage situations.

Fiona - 
Let's start there. Can you give us a mini tutorial. A kind of "What Every Author Should Know About Intelligence" overview?

Jeff - 
Here are some of the key points I would like to impart to the readers regarding military intelligence:

1) Intelligence agencies are byzantine organizations. They are
     highly compartmentalized, thus making it difficult for any one
     person (or persons) to know all of the activities and operations.
     Even the appointed heads of NSA, DIA, and other military
     agencies (a flag-ranked officer*)  only serve for a few years at
     the post and have difficulty learning the full breadth and scope
     of their own organization. Most of the continuous knowledge
     base resides with the deputy directors (civilians) who serve in
     the same role for many years.

   * Flag Rank Definition: (DOD) A term applied to an officer
      holding the rank of general, lieutenant general, major general,
      or brigadier general in the US Army, Air Force or Marine
      Corps or admiral, vice admiral, rear admiral or commodore in
      the US Navy or Coast Guard. source



The seal of the U.S. National Security Agency....
(Photo credit: Wikipedia)



2) The compartmentalization and frenetic pace of intel collection and the backlog of background checks can lead to security breaches and help enable turncoats like Edward Snowden. The intel community relies too heavily on Counter Intelligence (CI)/Lifetsyle Polygraphs (with EPQ*) to “catch” potential spies. While there has been considerable push-back regarding the validity of polygraphs, the agencies are essentially doubling down on them to shore up security problems.

(*EPQ: Embarrassing Personal Questions)

Link - to NSA Polygraph brochure dos and don'ts, expectations.


 3) Most intelligence agencies exists to provide actionable
     intelligence to the war fighter in the field. That is
     why most of the intelligence agencies are part of the DoD and
     not civilian. The CIA is a major intel agency but is not part of 
     the defense establishment. 

 4) There are 16 identified intelligence agencies (actual number is
      classified). 

      The “Big Five” agencies are:
National Geospatial Intelligence Agency
 (Photo credit: Wikipedia)
      * Central Intelligence Agency (CIA) 
      * National Security Agency (NSA) 
      * National Reconnaissance Office (NRO) 
      * Defense Intelligence Agency (DIA) 
      * National Geospatial-Intelligence Agency 
         (NGA) 

       While most people think the CIA is the
       biggest intelligence group, the NSA and
       NRO have much larger budgets (which is
       classified). 

 5) Inter-agency rivalries and feuds are very common, marked by
     senior representatives from each agency vying to out-work the 
     others for recognition and control of budget. There are
     numerous examples (most of which cannot be discussed
     outside of a cleared audience) in which a major intelligence
     operation went terribly wrong because one group refused to
     share intelligence with a sister agency for fear of losing bragging
     rights or having budgets diminished. The Berlin Wall tunnel 
     snafu during the Cold War was a famous case of inter-agency 
     fighting and posturing. Despite many attempts to corral this 
     infighting, these feuds are still prevalent today. In my
     novel, COLD SHADOWS, the various agencies had different
     parts to play. The insidious Rafter was a direct action (DA)
     operative from a deep black  group of the CIA. The DIA was the
     agency overseeing operation URGENT VECTOR, and the NSA
     was providing real time SIGINT tracking for targets of interest.

Fiona - 
You were explaining to me that the agencies are byzantine, and they are run by both military and civilians. The military are rotated out fairly rapidly leaving these groups to mainly be captained by civilians. What qualifies the civilians and is there difficulty in communication between these two groups and trust issues?

Jeff - 
There are significant trust issues between the agencies because they compete for recognition and funding by the White House, Congress and National Command Authority. The main weapon they use against one another is withholding information from another agency.

The military staff in these agencies have significant operational experience and provide critical insight as to what works (or what won't work) while most of the civilians are scientists, analysts, and engineers that are focused on the technologies and developments needed to accomplish the mission. For example, the NSA is one of the largest employers of scientists and engineers in the world. These guys are 20-30 years ahead of anything we've seen in the commercial sector.

Fiona - 
Who is more likely to be the next Snowden? Military personnel or civilian?

Jeff -
Современный компьютерный полиграф ЭПОС-7: сенс...
 (Photo credit: Wikipedia)
Traditionally, leaks come more from civilians than military, but both sides have been guilty over the years. Two issues that impact the trustworthiness of the people hired for these sensitive programs are: 
1) The overload that the investigative teams
    are facing with vetting employees for
    clearances. 
2) The dependence on CI/Lifestyle
     Polygraphs for weeding out potential
     traitors. Many of the traitors
     historically have passed their polys with no
     problem, so the efficacy of these are often
     debated.

Fiona - 
Polygraphs and psychopaths don't mix. As in - a psychopath (like your character, Rafter) won't have biomarkers of anxiety.

Jeff - 
Yes, that is correct. Many psychopaths and sociopaths will pass their polygraphs. They have no conscience.

Fiona - 
The NRO - Why have I never heard of this before our little chat?

Jeff - 
NRO logo
NRO logo (Photo credit: Wikipedia)
The NRO is highly secretive because they maintain and operate the entire fleet of "overhead assets." This is intel-speak for spy satellites. Some of the most sensitive technologies used in the intelligence gathering reside in the satellites. Very powerful and highly sensitive programs exist with the "overheads."

Fiona - 
Okay so let's talk vocab.

Jeff - 

Seal of the C.I.A. - Central Intelligence Agen...
(Photo credit: Wikipedia)
Sure thing

Fiona - 
DA means direct action what would that entail?
Also, Deep black and SA...



Jeff - 
CIA DA groups are ones that employ paramilitary tools and techniques to accomplish the mission. They're armed with conventional and unconventional weaponry and spy gear/techniques (called "tradecraft") to accomplish the mission. CIA DA teams belong to the clandestine services are often recruited from military special operations teams like SEAL Team Six (DEVGRU) and Delta.Deep black means "Special Access Program." This is abbreviated as "SAP". SAP programs are ones that don't officially "exist" and are wrapped in very tight secrecy and highly compartmented. Before the F-117 and B2 programs were released to the public, they were SAP.
"Above Top Secret" is used a lot in the movies and TV. Here's what that means: The clearances run, Confidential, Secret, Top Secret, and Top Secret/Sensitive Compartmented Information (abbreviated "TS/SCI"). The TS/SCI programs require very special clearances and "need-to-know" before someone can be "read in" to the program. These are the so-called "above Top Secret" clearances.

Fiona - 
"NSA was providing real time SIGINT tracking for targets of interest." Explain SIGINT

Jeff - 
SIGINT is Signals Intelligence. Essentially, this is intelligence garnered and exploited through any electronic medium. Cell phones, faxes, emails, radar, etc. SIGINT is gathered through a global array of very sophisticated sensors that eavesdrop on electronic comms.

LINK - This is the NSA frequently asked questions document.

Fiona - 
If I put this information into my blog, tell the truth, will the NSA bang on my door? Not that I'm afraid - I like meeting new people, mind you - I just want to be prepared.

Jeff - 
No worries, we will not divulge anything that is sensitive.

Fiona - 
Explain the use of the word paramilitary.

Jeff - 
Para literally means "above". This does not mean that paramilitary groups are better than military from that word, but that the teams have are trained and outfitted similarly to elite military teams, but their missions and reporting agencies are very different from military ones. The CIA clandestine service is a "paramilitary" group As stated before, many in that group come from military spec-ops, SEALS, Delta, Force Recon, etc



Amazon Link

Only 2.99 for the next 2 days

Fiona - 
Your thriller Cold Shadows has to walk a line between being accurate with the terms (the alphabet soup of military talk) and vocabulary that civilians use. You also have the CIA, DIA, and NSA involved. DIA being the Defense Intelligence Agency. When many people don't know what these agencies are/do how do you pull the reader along? I imagine that this is problematic for anyone who is coming from a place of expertise and now, as novelists, they have to "keep it real" and yet keep it accessible.

Jeff - 
It is a very fine line to walk, and if you're not careful, you could end up in the weeds and confuse the reader. Some authors go way too deeply into the military jargon and operational speak. For me, I have no problem following that since that is the world that I come from, but civilians' eyes glaze over pretty quickly. In COLD SHADOWS, I wanted to give just enough detail to explain what was happening (and to keep military enthusiasts happy) without boring the reader with deep technical descriptions.

The feedback so far has been very positive that there was enough explanation embedded without killing the pace of the story.

The military loves jargon and bizarre vernacular, so authors with military backgrounds have to remind themselves to not wade too deeply into those waters unless the work in question is specifically intended for a military audience. If that is the case, then the more techno-speak, the better!

Fiona - 
So when you are reading along, and a civilian has attempted to make a military enthusiast happy, what is a tell-tale sign that they are not from a military background? Do you see a mistake pattern that you can give us a heads-up about?

Jeff- 
Yes, military people pick up on that right away

For example, the "above Top Secret" line. Nobody with SCI access uses that term. When I see it, I know it was from a civilian with no intel background

Fiona - 
Is it offensive? Amusing? Irritating?

Jeff
It's not offensive, but it's irritating that it's not authentic.

Fiona - 
So they should buddy up with a military guy/gal and get them to beta read for them?

Jeff - 
That's always a good idea.

Fiona - 
So writers the big take away here is - if you know the vernacular use it like salt a little adds flavor too much makes the end product unpalatable - and writers if you don't have the background seek out a beta reader and bake them a chocolate cake to thank them for their help.

So here's an snippet from a story I'm working on:
Amanda reached out to pull her purse from its resting spot by the sink. Reaching in, she retrieved her work badge. It was a Pentagon issued SCI biometric badge. “Sensitive Compartmented Information, Amanda? Dr. Amanda Campbell? What the hell?"

Jeff - 
Regarding Dr. Campbell, Small point of distinction with SCI - 
The general clearance level is called "TS/SCI", but her actual compartments that she is cleared for would be listed after "TS". 

I can't list the actual compartments because the names are classified, so I will make this up. If she were cleared for the "ZEBRA ELEPHANT" compartment, her clearance in writing would read "TS/ZE". You can make up fictional compartments (they're typically two words) and use that in your writing. Only people who are similarly cleared will know the actual compartments, and they will NEVER be used outside of a cleared SCIF. SCIF - Sensitive Compartmented Information Facility. These are the blacked out rooms with big vault doors and armed guards and only special comms gear inside.

Fiona - 
Yes, that's what she does. Define "comms gear."

Jeff - 
Communications gear that is encrypted to that level of security needed for that SCIF. No regular phones or computers.

Fiona - 
Okay so on her badge what would it say to give her access to the area?

Jeff - 
It usually says nothing, but it will have several things on it. 
1) A photo 
2) Bio-metric coded info (for readers that have it) 
3) A color scheme to denote the compartments she's cleared for 
4) Her name 

Fiona - 
You can tell she is SCI by the colors on her badge?

Jeff - 
Yes. The color codes are unique to the agency and are classified in their meaning. It helps make sure that everyone can quickly spot those who are cleared and those who aren't.

Fiona - 
OK I'll revisit how I said that. May I cut a slice of your chocolate cake for you now?

Jeff - 
Yes, thank you. It's fine how it is. Just a very minor point in distinction. Remember, the compartments are never spoken in an unclassified setting. The names of the compartments themselves are classified.

For writers of intelligence-genre books, have fun with the writing and let your imagination run wild. Call on a friend who is "in the business" if you need a reality check on what you've written. A VERY important thing to remember is that you should NEVER divulge an actual intelligence apparatus/asset or operation if you have knowledge of it. Not only will you land in a lot of legal hot water including jail time, but you will be endangering the lives of agents in the field. For most people, though, knowledge of actual operations is hard to come by, so this rule isn't broken often. Have fun, be imaginative, and sweep the characters into the deep unknown. The more fictional it may appear, the closer to reality you might actually be.

Fiona -
This is the part of the interview when I whip out our traditional question, "Tell us the story behind your favorite scar."

Jeff - 
Well, the one that is most prominent in my life is above my left eye. It was from a soccer accident at Vanderbilt in my senior year. It required surgery to fix my badly broken nose and ruptured blood vessels. The interesting part was that exactly two years earlier, I had another head-on collision with a player that damaged my right eye (also needed it stitched). The player that ran into me was the same guy both times, just two years apart. After being hit the second time, I actually started to punch him for splitting my head open (again!). I couldn't see because I had blood in my eyes, but I found him on the ground next to me and started punching him furiously. We were both taken to the hospital for surgery (he had torn a major blood vessel in his head that had to be sewn together).

Fiona - 
Was there a girl involved in this saga?

Jeff - 
No girl this time...just two aggressive males duking it out on the field two different times two years apart. I even yelled obscenities at him as we rode in the ambulance together (side by side gurneys).

Fiona - 
I caught the "this time" bit about the girl. The chances of being hit by the same guy are really pretty slim - I'm sure you've considered that this was karmic retribution for some past life offense...

Jeff - 
Most likely so. I've had my turn in the barrel for sure.

Fiona- 
I would pay good money for the ambulance ride video.

Jeff - 
Had this been today, I'm sure it would be on YouTube from someone's cell phone camera two guys squirting blood out of their faces, blind, punching each other in the middle of a soccer field as ambulances rush to the scene. Classic. It looked more like a horror film. Texas Chainsaw style.

Fiona - 
Thanks to Jeff Critser for sharing his knowledge and insights with us. 


Thank you so much for stopping by. And thank you for your support. When you buy my books, you make it possible for me to continue to bring you helpful articles and keep ThrillWriting free and accessible to all.


Enhanced by Zemanta

Sunday, April 27, 2014

Using Technology in Your Plot with Frederick Wysocki



______________________________________________

WARNING: The interviewee is a recovering serial technology CEO.

Fiona -
Hi there. Today on Thrillwriting we have Rick Wysocki. Rick can you start us off by giving the readers a little of your background?

Rick -
I started my first computer software company in 1975 and stayed in it until recently when I was inspired to try writing. My first novel was inspired by my experiences in the business. I have done five start-ups, was hired by VCs to turn around 2 start-ups, was a SVP for Computer Associates (now CA) for 14 years as a result of being acquired by them.

Fiona -
Let's talk about one of the perils I see in writing a novel in this day and age. Very quickly, it will be a historical and not a modern read.

Can you talk about how a writer can include technology and not become dated within six months? 

Rick - 
Fiona, in your blog Digital Footprints (LINK) you state that, “If you're writing a contemporary suspense/thriller/crime novel, then digital information is an important angle to consider.”

I couldn’t agree more. In fact, I would say that unless a writer embraces the possibilities technology affords us, we could appear to be out of touch. When Apple introduced the iPhone in 2007 it started a wave of change that writers need to utilize if they want to connect with readers, especially younger readers.

There is a fun book by Jeffery Deaver from 2008 called the Broken Window that lays out the kind of mayhem that a techno genius can have with identity theft and manipulation. Those technologies exist and are used by business today to help market goods and services to you. Twisting the use of the tech was brilliant.

For thriller and mystery writers the possibilities are endless. As I play out in The Startup the differences between science fiction and reality are shrinking incredibly fast. As technology takes over our lives, the possibilities for writers are phenomenal. The boundaries of genre will be disrupted. What was science fiction a few years ago is hard reality today.


Fiona - I am almost finished with your novel The Start-up can you use your own work for demonstrating your point?





Rick - 
In The Start-up a traditional PC company purchases a mobile app firm which has the first retinal app for the iPhone. Apple just brought out a finger print reader. The technology for a retinal app will take a few more years. But it doesn't matter. If you ignore technology as a writer you run the risk of being old school - out of touch. Technology is only going to become more common in our day to day lives. If you look at wearable tech like the iWatch or what they are calling "The Internet of Things" they are a cause for inspired creativity for a writer.

Do you think that including tech limits or dates a writer too quickly?

Fiona - 
When you asked, my immediate thought went to the Stephanie Plum By the Numbers books by Janet Evanovich. Evanovich started writing her novels back when people used beepers and a select few had car phones. For those of us old enough to remember, one spent as little time on the phone as possible because those calls were incredibly expensive. At .30 a minute a ten minute call cost $3.00. People would think it was insane to pay that now. In her most recent Stephanie Plum books, Evanovich has kept the technology modern and even has a digitally encrypted photograph that causes her heroine some pains. The issue? The character doesn't age. She has been the same age for about 20 yrs. And so yes, that is pretty weird. And her first books are rather dated.

Rick - 
Do you have a smartphone? Are you using Facebook, Twitter etc? When you read a modern writer who is writing set present day, and they do not mention using them, do you wonder? I think that the use of technology makes a writer current. I understand your question about change. There is an old adage in tech that, "if you are bored you're not paying attention."

Fiona - 
I think you used that in your book...

Rick - 
Were you okay with the technology angle?

Fiona - 
So far I am able to follow it without any problems - but I didn't actually have to implement the technology, I just had to get the concepts.

Rick -
Exactly. When you finish, I hope you see what I was going for. The story of a young man who strives to earn his wealth in the tech business, and the story of a young man who discovers that he becomes increasingly corrupt as he faces difficult decisions.Remember when you said in a post "If you're writing a contemporary suspense thriller story, the digital info is an important angle? That's where we are in total agreement.

Fiona -
There are a lot of plot twists that can take place because of technology.

Rick -
For most everyone, the benefits of mobile technology have made it compelling and a necessity to own and carry them. How else do we know what our schedule is, get directions on where to go, find the best restaurant for lunch or take that once in a lifetime picture with an old friend and immediately share it. 

The downside is that everything you do, where you go, who you see, write and talk about is recorded and available for discovery.

Everyone has now heard about whistleblower Edward Snowden and the NSA. So it is no secret that the NSA is spying on us. The technologies are there for our federal governments as well as foreign governments and eventually State and local law enforcement to aid in the profiling, monitoring and capture of suspected wrong doers.

The US is in an undeclared cyber war, and other governments and groups are doing their very best to beat us.

Anytime data lives on a third-party system, it can be decrypted and examined by company employees, the government and lawyers with subpoenas. This is how so many tech companies were able to give up data to the NSA upon request.

There is no such thing as privacy and surveillance and data recording will only accelerate. It is not just the USA. It is China, Russia and everyone else.

I am not an expert on cyber identities, but I’ve been interested in the topic for years. In my new novel The Start-up the hero is confronted and told he must abandon technology in order to protect his benefactor, his uncle who a is mob raised venture capitalist. As I state in The Start-up -


If twenty years ago you had asked an FBI agent for the ideal tool they could use for tracking and capturing criminals, it would have been a smart device. They’d probably have said they would love a suspect to be carrying a hidden GPS tracking device to track them. A hidden microphone so they could turn it on and hear everything that was said. Oh, and a camera to see where and who you are with. The bottom line is that your smartphone is the ideal tracking device.
Fiona- 
How would an intrepid heroine protect herself?

Rick -
These days it is virtually impossible. You can take steps to partially erase yourself from the web. Unless you want to live alone in a cave you can’t. There are a lot of tools and applications that might lull you into feeling secure. Personally, I don’t trust any of them. No data is safe.

You have to assume that nothing is safe. You have heard of Bitcoin, which was supposedly an unhackable digital medium. Well guess what - it got hacked.

Fiona - 
What are some ways that a hacker could get your private info that you have no control over - ex. I read about the sale of copy machines that held the printed data from dentist offices with the social security
numbers etc. 

Rick - 
Wherever data is stored, it can be accessed and taken. Your character could stay off the internet. Cut up credit cards – pay cash. Go off the grid. Which is not likely. And it is only going to get worse. We will only get more dependent on our devices. We will become digital identities, and we will increasingly have our lives run by software.

Fiona - 
I imagine that going off grid is far easier for the older generation.

Rick - 
For most of the younger generation, it is an impossible dilemma. The benefits far outweigh the downside –If they are not involved in questionable activities. If they are, they are being tracked and their data is becoming their digital identity. Privacy is an outdated concept. It is gone. If someone wants to get your information they will. Having said all that, there is still time until all law enforcement have access.

Fiona - Rick has graciously put together some research sites that might help you:


RESEARCH SITES
For writers who want to research what is happening, here are a few web sites that might provide inspiration:

FBI.gov 
SEC.gov
BusinessInsider.com
TechCrunch.com
JDSupra for legal and compliance viewpoints

I also try to use real world points I hear from the experts. For example in talking with the head of police for a major US city he told me his biggest peeve was continual budget cuts. I used that tidbit in The Start-up.

HOW TO USE THE INFORMATION / TWISTS

1. Use the technology to spy on, steal identity of/or murder
    someone.  A TWIST - Use technology to steal identity of a bad 
    person and end up accused of their crimes.

2. Use the technology to find victim, find where they have been and
    what they have done

3. Commit crime and try to erase themselves, to get off the grid

4. Use the technology to find culprit
    A TWIST - Use the technology to falsely accuse someone.

When you have data overload, it’s easy to weave the data into a narrative that substantiates what they already believe. There is an interesting article by Criminologist D. Kim Rossmo, a retired detective inspector of the Vancouver Police Department, was so concerned about confirmation bias and the investigative failures it causes that he warned police officers in Police Chief Magazine to always be on guard against it. “The components of confirmation bias,” he wrote, “include failure to seek evidence that would disprove the theory, not utilizing such evidence if found, refusing to consider alternative hypotheses and not evaluating evidence diagnosticity.”

Fiona - 
Those are some pretty fun plotting ideas. Okay, traditional ThrillWriting question - can you tell us about your favorite scar?

Rick - 
I am scar free. Before we go, let me tell you that I think your blog is fantastic. I have already gleaned a few points that I am including in my next book.

Fiona - 
Hooray!  I love flattery!

See how this article influenced my plot lines in my novella MINE and my novel CHAOS IS COME AGAIN.



Thank you so much for stopping by. And thank you for your support. When you buy my books, you make it possible for me to continue to bring you helpful articles and keep ThrillWriting free and accessible to all.




Enhanced by Zemanta