conversations, without going through Treasury, NIST, or any legal process.
The Clipper Chip ended with a whimper. It was McConnellâs well-intentioned, but misguided, effort to forge a compromise between personal privacy and national securityâand to do so openly, in the public eye. The next time the NSA created or discovered back doors into data, it would do so, as it had always done, under the cloak of secrecy.
CHAPTER 3
----
A CYBER PEARL HARBOR
O N April 19, 1995, a small gang of militant anarchists, led by Timothy McVeigh, blew up a federal office building in Oklahoma City, killing 168 people, injuring 600 more, and destroying or damaging 325 buildings across a sixteen-block radius, causing more than $600 million in damage. The shocking thing that emerged from the subsequent investigation was just how easily McVeigh and his associates had pulled off the bombing. It took little more than a truck and a few dozen bags of ammonium nitrate, a common chemical in fertilizers, obtainable in many supply stores. Security around the building was practically nonexistent.
The obvious question, in and out of the government, was what sorts of targets would get blown up next: a dam, a major port, the Federal Reserve, a nuclear power plant? The damage from any of those hits would be more than simply tragic; it could reverberate through the entire economy. So how vulnerable were they, and what could be done to protect them?
On June 21, Bill Clinton signed a Presidential Decision Directive, PDD-39, titled âU.S. Policy on Counterterrorism,â which, among other things, put Attorney General Janet Reno in charge of a âcabinetcommitteeâ to reviewâand suggest ways to reduceâthe vulnerability of âgovernment facilitiesâ andâcritical national infrastructure.â
Reno turned the task over to her deputy, Jamie Gorelick, who set up a Critical Infrastructure Working Group, consisting of other deputies from the Pentagon, CIA, FBI, and the White House. After a few weeks of meetings, the group recommended that the president appoint a commission, which in turn held hearings and wrote a report, which culminated in the drafting of another presidential directive.
Several White House aides, who figured the commission would come up with new ways to secure important physical structures, were startled when more than half of its report and recommendations dealt with the vulnerability of computer networks and the urgent need for what it called âcyber security.â
The surprise twist came about because key members of the Critical Infrastructure Working Group and the subsequent presidential commission had come from the NSA or the Navyâs super-secret black programs and were thus well aware of this new aspect of the world.
Rich Wilhelm, the NSA director of information warfare, was among the most influential members of the working group. A few months before the Oklahoma City bombing, President Clinton had put Vice President Al Gore in charge of overseeing the Clipper Chip; Mike McConnell sent Wilhelm to the White House as the NSA liaison on the project. The chip soon died, but Gore held on to Wilhelm and made him his intelligence adviser, with a spot on the National Security Council staff. Early on at his new job, Wilhelm told some of his fellow staffers about the discoveries heâd made at Fort Meade, especially those highlighting the vulnerability of Americaâs increasingly networked society. He wrote a memo on the subject for Clintonâs national security adviser, Anthony Lake, who signed it with his own name and passed it on to the president.
When Jamie Gorelick put together her working group, it was naturalthat Wilhelm would be on it. One of its first tasks was to define its title, to figure out which infrastructures were critical âwhich sectors were vital to the functioning of a modern society. The group came up with a list of eight: telecommunications, electrical power, gas