RLB Letterhead

Total Page:16

File Type:pdf, Size:1020Kb

RLB Letterhead 2-7-14 White Paper Re: Complaint against OIP Director Melanie Pustay for “defrauding” President Obama by failing to docket and process a December 3, 2013 expedited FOIA request for two classified OLC Memos that affect the President’s 2014 NSA TSP reforms This is a 2-7-13 White Paper in support of a Complaint against OIP Director Melanie Pustay for “defrauding” President Obama by failing to docket and process a December 3, 2013 expedited FOIA request for two classified OLC Memos that affect the President’s 2014 NSA TSP reforms. The December 3, 2013 FOIA request sought the following documents: 1. May 24, 1984 classified Constitutionality of Certain National Security Agency Electronic Surveillance Activities Not Covered Under the Foreign Surveillance Act of 1979 of AAG of the OLC Theodore Olson, the “OLC Olson FISA Memo” 2. May 6, 2004 reclassified Memorandum for the Attorney General: Review of the Legality of the (redacted b1,b3) Program, of AAG of the OLC Jack Goldsmith, the “OLC Goldsmith FISA Memo” The Robert v Holz, Robert v National Archives, 1 Fed. Appx. 85 (2d Cir. 2001), Robert v DOJ, 2001 WL 34077473 (EDNY), 26 Fed. Appx. 87 (2d Cir. 2002), Robert VII v DOJ, 2005 U.S. Dist. LEXIS 39616, 193 Fed. Appx. 8 (2d Cir. 2006), cert. den. 127 S.Ct. 1133 (2007), Robert VIII v DOJ, HHS, and SSA, 439 Fed. Appx 32 (2d Cir. 2011), cert. den. 132 S. Ct. 1549 (2012), Robert II v CIA and DOJ plaintiff complains that Office of Information and Privacy (OIP) Director Melane Pustay is “defrauding” President Obama by failing to docket and process a December 3, 2013 Office of Legal Counsel (OLC) FOIA request for 1984 and 2004 Top Secret OLC FISA Memos that President Obama has an Article II Commander in Chief duty to read as he considers his 2014 reforms re the storage of 1982-2014 E.O. 12333 NSA TSP data banks. This December 3, 2013 FOIA White Paper (WP) is in support of the OLC FOIA request, provides background information as to the 2014 importance of these Top Secret 1984 and 2014 OLC FISA opinions. http://snowflake5391.net/12_3_13_FISA_MEMOS.pdf. The FOIA requester assumes that the FOIA requests will be denied because the documents remain as classified documents. However, in the process of making that decision OIP Director Pustay will be able to determine for herself whether the complainant’s assertion is correct: OIP Director Pustay is working in concert with other USG officials who have “defrauded” President Obama in order to provide President Obama with a “plausible deniability” defense to the serial impeachable violations of § 413 (a) of the National Security Act, the “exclusivity provision” of the FISA of 1978, the Posse Comitatus Act of 1878 limitations on military domestic law enforcement, and the Social Security Act. See the 10-3-13 Robert Review Group Comments §§ A-D, P-Y. http://snowflake5391.net/review_group_comments.pdf The complainant asserts that time is of the essence. On January 17, 2014, President Obama tasked AG Holder to work with the intelligence community and provide the President with alternative approaches for storing metadata data by March 28, 2014. Upon information and belief, AG Holder does not know of these two Top Secret OLC FISA Memos. However, OIP Pustay knows whether AG Holder knows of these Top Secret OLC FISA memos. Hence, the importance of IG Horowitz docketing the complaint and deciding whether to conduct a preliminary investigation. This will result in IG Horowitz reading the two Top Secret OLC FISA Memos and making sure that President Obama has an opportunity to read these OLC opinions. 1 A. The complaint against OIP Director Pustay that she is “defrauding” President Obama The complainant is asserting that OIP Director Pustay knows that President Obama does not know that the May 24, 1984 Top Secret “OLC Olson FISA Memo” and the March 18, 2011 reclassified Top Secret May 6, 2004 “OLC Goldsmith FISA Memo” apply to the 1982-2014 E.O. 12333 Top Secret “FISA exempt” NSA TSP data banks that have never been subject to Article III review. He is asserting that OIP Director Pustay is “defrauding” President Obama because she knows that docketing this OLC FOIA request will lead to a FOIA action that will lead to President Obama reading these two OLC Memos. OIP Director Pustay knows that if President Obama reads these OLC Memos, then he will learn that USG officials and attorneys have intentionally not informed President Obama that his January 17, 2014 NSA TSP reforms will not affect the 1982-2014 E.O. 12333 Top Secret “FISA exempt” NSA TSP data banks transferred into the Utah Data Center, and the continuation of warrantless domestic content data mining that is based on the Top Secret 1984 and March 18, 2011 reclassified 2004 OLC FISA Memos that President Obama had never read. See 12-3-13 OLC FOIA WP §§ A-D, P, U, Y. The complainant’s assertion that OIP Director Pustay has “defrauded” President Obama is based on an application of 18 U.S.C. § 371, Conspiracy to commit offense or to defraud United States, as interpreted by Independent Counsel (IC) Lawrence Walsh in the March 21, 1991 "Memoranda on Criminal Liability of Former President Reagan and of Vice President Bush" Memorandum. IC Walsh alleged that AG Meese, CIA Director Casey, and DOD Secretary Weinberger had “defrauded” President Reagan by withholding the fact that their Article II interpretations of the Boland Amendment and other statutes had never been reviewed by Article III Judges, and they had learned that their interpretations were incorrect. IC Walsh determined that President Reagan and VP Bush had no Iran-Contras criminal liability because they had reasonably relied upon the accuracy of AG Meese’s Top Secret Article II legal opinions that upon Article I and Article II review were incorrect legal interpretations. See “Iran Contra at 25, Reagan and Bush ‘Criminal Liability” Evaluations” Document 1-Parts 1-4 the National Security Archive posted at its http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB365/index.htm. 18 U.S.C. § 371, Conspiracy to commit offense or to defraud United States provides: If two or more persons conspire either to commit any offense against the United States, or to defraud the United States, or any agency thereof in any manner or for any purpose, and one or more of such persons do any act to effect the object of the conspiracy, each shall be fined under this title or imprisoned not more than five years, or both. Emphasis added. The complainant asserts that OIP Director Pustay knows whether the May 24, 1984 Top Secret “OLC Olson FISA Memo” and the March 18, 2011 reclassified Top Secret May 6, 2004 “OLC Goldsmith FISA Memo” are the “FISA secret law” that determined that the “exclusivity provision” of the FISA of 1978 was an “unconstitutional” encroachment on the President’s “inherent” authority” to conduct domestic surveillance of U.S. citizens to protect the nation from terrorists. The complainant asserts that OIP Director Pustay knows that President Obama, a Constitutional Law Professor, has not read the 1984 and 2004 OLC FISA opinions. As a result, OIP Director Pustay knows that she is “defrauding” President Obama. See 10-3-13 Robert Review Group Comments §§ A, H, P, S. http://snowflake5391.net/review_group_comments.pdf 2 B. OIP Director Pustay knows that AAG of the National Security Division Wainstein’s Top Secret November 20, 2007 Memo to AG Mukasey cited to the May 24, 1984 Top Secret “OLC Olson FISA Memo” and explained a Fourth Amendment “constitutionally seized” theory that was applied to the 1982-2007 Top Secret “FISA exempt” NSA TSP data banks OIP Director Pustay knows that one of the Edward Snowden 2013 leaked documents was the November 20, 2007 Memorandum for the Attorney General from AAG of the National Security Division Kenneth Wainstein to AG Michael Mukasey (November 7, 2007-January 20, 2009) with a copy to OLC Principal DAAG Stephen Bradbury. This document quoted from the Top Secret May 24, 1984, AAG of the OLC Theodore Olson OLC FISA Memo: Constitutionality of Certain National Security Agency Electronic Surveillance Activities Not Covered Under the Foreign Intelligence Surveillance Act of 1979 Memorandum, that established a Fourth Amendment warrantless domestic electronic surveillance “constitutionally seized” theory that applied to the 1982-2007 Top Secret “FISA exempt” NSA TSP data banks. AAG of the National Security Division Wainstein explains the Fourth Amendment standard that continued to apply in 2007 to the content of the 1982-2007 E.O. 12333 Top Secret “FISA exempt” NSA TSP data banks that had never been reviewed by the FISC: As an initial matter, we note that the analysis of information legally within the possession of the Government is likely neither a “search” nor a “seizure” within the meaning of the Fourth Amendment. See, e.g. Jabara v Webster, 691 F. 2d 272, 277-279 (6th Cir 1982) (holding that the disclosure of information by an agency that lawfully possessed it to another agency does not implicate the Fourth Amendment); Memorandum for the Attorney General from Theodore B. Olson, Assistant Attorney General, Office of Legal Counsel, Re Constitutionality of Certain National Security Electronic Surveillance Activities Not covered Under the Foreign Intelligence Surveillance Act of 1979, at 59 (May 24 1984) (“Olson Memorandum” (Traditional Fourth Amendment analysis holds that once evidence is constitutionally seized, its dissemination or subsequent use raises no additional Fourth Amendment question.” As noted, we assume for the purpose of this memorandum that the NSA has lawfully acquired the information it wishes to analyze. Nevertheless, the Olson Memorandum went on to consider the limits on the subsequent use of information when assessing the constitutionality of NSA’s surveillance activities under the Fourth Amendment.
Recommended publications
  • Mein Nachbar
    Das deutsche Nachrichten-Magazin Leitartikel Partner und Gegner zugleich Warum der SPIEGEL weitere geheime Dokumente über die NSA-Affäre enthüllt as Verhältnis Deutschlands zu den USA in Zeiten der Die Bundesregierung hat die Selbstherrlichkeit der Welt- NSA-Affäre gleicht dem Ritt auf einer Schiffschaukel: macht lange hingenommen. Sie hat manches geahnt, vieles DAus luftigen Höhen geht es atemberaubend in die verdrängt und einiges über die Allgegenwart der NSA gewusst, Tiefe. Im Sommer vergangenen Jahres, als die ersten Snowden- weil der Bundesnachrichtendienst bei den Operationen mit- Enthüllungen bekannt wurden, erklärte die Regierung Merkel mischt. Dass der BND mit der NSA intensiv kooperiert, nicht die Affäre schon für beendet, bevor sie ihre Wucht entfaltete. nur bei der Terrorbekämpfung, sondern auch bei der unter- Im Herbst aber, als bekannt wurde, das private Handy der schiedslosen Massenüberwachung globaler Kommunikations- Bundeskanzlerin sei überwacht worden, erreichte das Ver- ströme, belegen die neuen Snowden-Dokumente. Die Deut- hältnis einen Tiefpunkt. Nun war von Konsequenzen die Rede, schen sind Partner und Gegner zugleich. von einem anderen Umgang unter Verbündeten. Die Bundeskanzlerin hat einen Amtseid auf das Grund- Dann reiste die Kanzlerin nach Washington, und wieder gesetz geschworen. Spionage gegen Deutschland ist nach kehrte Friede ein. Seither würden Transatlantiker wie Sicher- dem Strafgesetz verboten. Die Grundrechte der Bürger sind heitsbehörden am liebsten zum normalen Geschäft übergehen, also keine flexible Größe, abhängig davon, wie es um das Ver- bei dem die Aufgaben verteilt hältnis Deutschlands zu den sind: Die NSA ist der omnipo- USA gerade bestellt sein mag. tente Weltgeheimdienst, die Entweder haben die ameri- Deutschen sind der verständ- kanische und die deutsche nisvolle, hilfreiche Bündnis- Regierung miteinander ab - partner.
    [Show full text]
  • Penetrate, Exploit, Disrupt, Destroy: the Rise of Computer Network Operations As a Major Military Innovation
    PENETRATE, EXPLOIT, DISRUPT, DESTROY: THE RISE OF COMPUTER NETWORK OPERATIONS AS A MAJOR MILITARY INNOVATION by Craig J. Wiener A Dissertation Submitted to the Graduate Faculty of George Mason University in Partial Fulfillment of The Requirements for the Degree of Doctor of Philosophy Biodefense Committee: _______________________________________ Gregory Koblentz, Chair _______________________________________ A. Trevor Thrall _______________________________________ Stuart Malawer _______________________________________ Gregory Koblentz, Program Director _______________________________________ Mark J. Rozell, Dean Date: __________________________________ Fall Semester 2016 George Mason University Fairfax, VA Penetrate, Exploit, Disrupt, Destroy: The Rise of Computer Network Operations as a Major Military Innovation A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at George Mason University By Craig J. Wiener Master of Science George Mason University, 2010 Bachelor of Arts New York University 1992 Director: Gregory Koblentz, Associate Professor Schar School of Policy and Government Fall Semester 2016 George Mason University Fairfax, VA Copyright 2016 Craig J. Wiener All Rights Reserved ii DISCLAIMER Any errors herein are solely those of the author. Additionally, the views expressed herein are those of the author. iii DEDICATION To Betty: I wish you were here. iv ACKNOWLEDGEMENTS I have a tremendous number of people to thank who have helped me throughout my Master of Science and PhD studies, leading to the submission of my dissertation. It literally took a village, and although I cannot thank everyone here, please know the depth of my gratitude is significant and ongoing. I would like to thank the faculty and staff of the George Mason School of Policy, Government and International Affairs, and the Graduate School of Public and International Affairs for giving me an opportunity to pursue my studies in national security.
    [Show full text]
  • Cyber Center for Education & Innovation
    VISION FOR THE NEW CYBER CENTER FOR EDUCATION & INNOVATION Home of the National Cryptologic Museum A PUBLIC-PRIVATE PARTNERSHIP WITH UNPARALLELED CYBER DEFENSE EXPERTISE. PLEASE JOIN US AND GET INVOLVED! The Cyber Center and our participation, volunteer Yleadership and support are urgently Museum Master needed to help us conceptualize, Plan includes: capitalize and construct the new Cyber Center for Education & Innovation, n A new state-of-the-art Home of the National Cryptologic Museum. Join us now! Museum To discuss your interest in supporting our efforts to create n The Conference Center this vital new resource, please contact: n Vigilance Air Park MGEN Roderick J. Isler, USA (Ret) n Classroom facilities Vice President, Cyber Center for Education & Innovation, New Museum Project Campaign n World class research National Cryptologic Museum Foundation and rare books library P.O. Box 1563 Millersville, MD 21108 n A comprehensive site and Office: 443-292-0091 land use concept Cell: 301-785-0896 Continued strong private and [email protected] public leadership is needed to realize this challenging vision. 1 CCEI-NCM Parking 498 Spaces 2 CCEI-NCM 3 Museum and Conference Center Drop-off 4 Service Road/ Loading Dock 5 Existing Museum 6 National Vigilance Park 7 Security Check Point 8 Colony Seven Road 9 Current NSA Parking (N1) 10 Current NSA Parking (N10) 11 Future VCP-1 12 86 foot Security Set Back 13 Entrance Signage PROPOSED SITE PLAN HELP US BUILD AND COMPLETE THIS NEW NATIONAL TREASURE. THE CYBER CENTER FOR EDUCATION & INNOVATION, HOME OF THE NATIONAL CRYPTOLOGIC MUSEUM is envisioned to be an integrated multi-purpose facility serving public and private stakeholders.
    [Show full text]
  • Airpower Journal, Published Quarterly, Is the Professional Journal of the United States Air Force
    Wínter 1994 JOURNAL rrM . Lü 1 Secretary of the Air Force Dr Sheila E. Widnall Air Force Chief of Staff Gen Ronald R. Fogleman Commander, Air Education and Training Command Gen Henry Viccellio, Jr. Commander, Air University Lt Gen Jay W. Kelley Commander, College of Aerospace Doctrine, Research, and Education Col Leroy Barnidge, Jr. Editor Col Thomas M. Kearney Associate Editor Maj John M. Poti Professional Staff Hugh Richardson, Contributing Editor Marvin W. Bassett, Contributing Editor Steven C. Garst, Director ofArt and Production Daniel M. Armstrong, Illustrator L. Susan Fair, Illustrator Thomas L. Howell, Prepress Production Manager The Airpower Journal, published quarterly, is the professional journal of the United States Air Force. It is designed to serve as an open forum for the presentation and stimulation of innovative think- ing on military doctrine, strategy, tactics, force structure, readiness, and other matters of national defense. The views and opinions expressed or im- plied in the Journal are those of the authors and should not be construed as carrying the official sanction of the Department of Defense, the Air Force, Air Education and Training Command, Air University, or other agencies or departments of the US government. Articles in this edition may be reproduced in whole or in part without permission. If they are reproduced, the Airpower Journal requests a cour- tesy line. JOURNAL Wlnter 1994. Vol. Vlll. No. 4 AJRP 101 Editorial 2 Desert Storm: The First Inform ation W ar? Col Edward Mann, USAF 4 M ilitary Ethics Col Richaxd Szafranski, USAF Dr James H. Toner lst Lt William D. Casebeer, USAF 15 N onlethal Concepts: Im plications for Air Force Intelligence Capt Edward F.
    [Show full text]
  • Historical Dictionary of International Intelligence Second Edition
    The historical dictionaries present essential information on a broad range of subjects, including American and world history, art, business, cities, countries, cultures, customs, film, global conflicts, international relations, literature, music, philosophy, religion, sports, and theater. Written by experts, all contain highly informative introductory essays on the topic and detailed chronologies that, in some cases, cover vast historical time periods but still manage to heavily feature more recent events. Brief A–Z entries describe the main people, events, politics, social issues, institutions, and policies that make the topic unique, and entries are cross- referenced for ease of browsing. Extensive bibliographies are divided into several general subject areas, providing excellent access points for students, researchers, and anyone wanting to know more. Additionally, maps, pho- tographs, and appendixes of supplemental information aid high school and college students doing term papers or introductory research projects. In short, the historical dictionaries are the perfect starting point for anyone looking to research in these fields. HISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE Jon Woronoff, Series Editor Israeli Intelligence, by Ephraim Kahana, 2006. Russian and Soviet Intelligence, by Robert W. Pringle, 2006. Cold War Counterintelligence, by Nigel West, 2007. World War II Intelligence, by Nigel West, 2008. Sexspionage, by Nigel West, 2009. Air Intelligence, by Glenmore S. Trenear-Harvey, 2009. Middle Eastern Intelligence, by Ephraim Kahana and Muhammad Suwaed, 2009. German Intelligence, by Jefferson Adams, 2009. Ian Fleming’s World of Intelligence: Fact and Fiction, by Nigel West, 2009. Naval Intelligence, by Nigel West, 2010. Atomic Espionage, by Glenmore S. Trenear-Harvey, 2011. Chinese Intelligence, by I. C.
    [Show full text]
  • THE VULNERABLE Our Military Problems and How to Fix Them
    AMERICA THE VULNERABLE Our Military Problems And How To Fix Them EDITED BY JOHN F. LEHMAN AND HARVEY SICHERMAN FOREIGN POLICY RESEARCH INSTITUTE PHILADELPHIA Dedication On a sad note, Colonel Harry G. Summers Jr., U.S. Army (ret.), who penned the article dealing with operations, procurement, and the defense industrial base and sat as a panelist for our second conference, passed away on November 14, 1999. Colonel Summers, a veteran of the Korean and Vietnam Wars, was the recipient of two Legions of Merit, the Silver Star, three Bronze Stars, two Purple Hearts, two Air Medals, and two awards of the Combat Infantryman’s Badge, and also authored numerous books, articles, and columns. He was, in short, the quintessential soldier- scholar. We dedicate this volume to his memory. TABLE OF CONTENTS Preface vii John H. Ball America the Vulnerable 1 John F. Lehman and Harvey Sicherman Roles and Missions 12 Donald Kagan Superpowers Don’t Do Windows 27 John Hillen The U.S. Presumption of Quick, Costless Wars 48 Andrew P. N. Erdmann Operations, Procurement, and Industrial Base 73 Harry G. Summers Jr. Civil-Military Relations 84 Eliot A. Cohen The U.S. Military Must Find Its Voice 96 Sam C. Sarkesian An Uninformed Debate on Military Culture 115 Don M. Snider Does Military Culture Matter? 134 Williamson Murray Must U.S. Military Culture Reform? 152 John Hillen The Case for National Missile Defense 171 Keith B. Payne v AMERICA THE VULNERABLE Rethinking Bio-Chemical Dangers 182 Henry Sokolski PREFACE Bad Medicine for Biological Terror 196 Andrew J. Bacevich Asymmetrical Adversaries 215 In 1996, the Foreign Policy Research Institute convened a Defense Winn Schwartau Task Force composed of distinguished scholars and practitioners The Risks of a Networked Military 225 to examine the increasingly important debates over U.S.
    [Show full text]
  • NSA-FOIACASELOG-2016.Pdf
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 100503A 4 April 2017 JOHN GREENEWALD Dear Mr. Greenewald: This responds to your Freedom of Information Act (FOIA) request dated 1 January 2017 which was received by this office on 2 January 2017, for "a copy of the FOIA case log for calendar year 2016." For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. Since processing fees were minimal, no fees were assessed. Your request has been processed under the FOIA, and the logs for calendar year 2016 are enclosed, along with a FOIA Case Dispositions reference sheet that explains the final case dispositions. Please be advised that the logs do not contain the number of pages released. They contain a final disposition if the case was closed at the time the logs were created. If there is no final disposition, the case was still pending at the time the logs were created. Certain information has been deleted from the enclosures.
    [Show full text]
  • State Intervention in Cross-Border Mergers and Acquisitions
    Balancing Power without Weapons Why do states block some foreign direct investment on national security grounds even when it originates from within their own security com- munity? Government intervention into foreign takeovers of domestic companies is on the rise, and many observers find it surprising that states engage in such behavior not only against their strategic and mil- itary competitors, but also against their closest allies. Ashley Thomas Lenihan argues that such puzzling behavior can be explained by recog- nizing that states use intervention into cross-border mergers and acqui- sitions as a tool of statecraft to internally balance the economic and military power of other states through non-military means. This book tests this theory using quantitative and qualitative analysis of transac- tions in the United States, Russia, China, and fifteen European Union states. It deepens our understanding of why states intervene in foreign takeovers, the relationship between interdependence and conflict, the limits of globalization, and how states are balancing power in new ways. ashley thomas lenihan is a fellow at the Centre for Inter- national Studies at the London School of Economics and Political Science, and a term member of the Council on Foreign Relations. Her research focuses on the relationship between state power and foreign direct investment from an international relations perspective. Balancing Power without Weapons State Intervention into Cross-Border Mergers and Acquisitions Ashley Thomas Lenihan London School of Economics and Political Science University Printing House, Cambridge CB2 8BS, United Kingdom One Liberty Plaza, 20th Floor, New York, NY 10006, USA 477 Williamstown Road, Port Melbourne, VIC 3207, Australia 314–321, 3rd Floor, Plot 3, Splendor Forum, Jasola District Centre, New Delhi - 110025, India 79 Anson Road, #06-04/06, Singapore 079906 Cambridge University Press is part of the University of Cambridge.
    [Show full text]
  • Amdocs and the NSA =Go to NFU Pages
    NewsFollowUp NewsFollowUp.com search Franklin Scandal Omaha Obama sitemap home Amdocs Amdocs and the NSA =go to NFU pages News for the 99% ...................................Refresh F5...archive home 50th Anniversary of JFK assassination "Event of a Lifetime" at the Fess Parker Double Tree Inn. JFKSantaBarbara. Mossad, 9/11 Israeli Art Students Amdocs employee bailed out an 'Israeli art student' Gerald Shea, Memorandum to 9/11 Commission NFU MOST ACTIVE PA MP3 file of Fox News, Israeli Art Students, Amdocs Story Go to Alphabetic list Academic Freedom FOX NEWS CARL CAMERON FOUR-PART Conference REPORT: Fox News Series On Israeli Spying In Obama Death List Rothschild Timeline Bush / Clinton Body Count Narus / NSA / Boeing -- John O'neil , FBI agent killed on 9/11 Warrantless data mining ? in the WTC was investigating the Israeli Art Students, Amdocs Amdocs complicity Flight 77, Pentagon, 9/11? Amdocs / Narus / NSA 9/11 WTC art students Amdocs links DEA wire tap Fox News / Carl Cameron, Amdocs DEA / Amdocs links Whitehouse Telephone System Israeli art students / Amdocs Senate Select Committee on Intelligence Corporate Espionage John O'Neil, FBI, Israeli art students Israeli art students, 9/11 DEA, Amdocs, Israeli art students Fox News / Carl Cameron Report Amdocs and the NSA PROGRESSIVE REFERENCE CONSERVATIVE* AfroCubaWeb Israel Actions in the Americas Amdocs search: Narus AntiWar News: AMDOCS Dov Baharav, CEO Ron Moskovitz , CFO Antiwar pdf file art students, Israeli spies. Suspicious Rense 2001 All US Phone Call Records Michael Blum , Division Pres of Financial Services activities involving Israeli art students at DEA And Billing Done In Israel - Part 2 Carl Thomas G.
    [Show full text]
  • NSA Hacks China, NSA Leaker Snowden Claims - CNN.Com
    6/12/13 NSA hacks China, NSA leaker Snowden claims - CNN.com You've selected the U.S. Edition. Would you like to make this your default edition? Yes | No Close SET EDITION: U.S. INTERNATIONAL MÉXICO ARABIC Sign up Log in TV: CNN CNNi CNN en Español HLN Home TV & Video CNN Trends U.S. World Politics Justice Entertainment Tech Health Living Travel Opinion iReport Money Sports NSA hacks China, NSA leaker Snowden SHARE THIS Print claims Email By Jethro Mullen and Michael Pearson, CNN More sharing Recommend 1.6k updated 4:05 PM EDT, Wed June 12, 2013 Former intelligence worker Edward Snowden revealed himself as the source of documents outlining a massive effort by the NSA to track cell phone calls and monitor the e- mail and Internet traffic of virtually all Americans. Snowden, 29, fled to Hong Kong after copying the last set of documents. He says he just wanted the public to know what the government was doing. "Even if you're not doing anything wrong you're being watched and recorded," he said. The Justice Department has begun a preliminary investigation into what it called "the unauthorized disclosure of Part of complete cov erage on classified information by an Data mining & privacy individual with authorized access." HIDE CAPTION Notable leakers and whistle-blowers Who is Edward Snowden? updated 9:32 AM EDT, Mon June 10, 2013 He's a high school dropout << < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 > >> w ho w orked his w ay into the most secretive computers in U.S.
    [Show full text]
  • The Changing Face of the NCMF
    The Link BULLETIN OF THE NATIONAL CRYPTOLOGIC MUSEUM FOUNDATION, INC. VOLUMES 9, NO. 3 - , NO. 2, COMPOSITE Summer 2008 THe CHANGING FAce of THe NCMF Events of the past year have moved too quickly for the slow pace of publication of The Link. Issues intended for publication covering Fall 2006 and Winter 2006-2007 have, accordingly, been “pulled back” from the printer and – to adopt the term recently applied to military action in Iraq – we are “surging” by consolidating about a year and a half of content into a single composite issue. That requires a great deal of compression and omission, even to “hit the highlights.” We apologize in advance for the omitted coverage. In return, we plan next to introduce a new look, with color photographs, as the beginning of some further experiments to improve our communication with you, our members and readers. We thank our ambidextrous colleague, John Garcia, and his associates and corporate sponsors for the interim issuance of the occasional “NCMF Newsletter,” mailed to you. Our webmaster, Bob Bowie, Bill Saadi, our website coordinator, and others are pondering changes in the NCMF web site. Thanks also go to occasional Link contributors Ray Schmidt, David Hamer, “cub reporter” Mary Faletto, Kirsten Eland, Jim Boone, Prof. Mark Sommer, and others whose by-lines have appeared. They represent the vanguard of what we hope will be a plethora of “new” (and familiar) names as we invite others of you to remember (as we reminded you in Volume 1, Number 1 ten years ago) that, by our old definition, a “link” should go both ways.
    [Show full text]
  • Presidential Transition 2001: NSA Briefs a New Administration" Reviewed for Declassification
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com 1111111111111111111111111111111111 UNCLASSIFIED 1111111111111111111111 Request 10: 0000954449 TRANSMITTAL OF MATERIAL Type: OMAL 1111111111111111111111 Submitted- 20190130 TO FROM (RETURN ADDRESS) MR. JOHN GREENEWALD, JR. DEPARTMENT OF DEFENSE This transmittal may NOT be downgraded upon removal of the 27305 W. LIVE OAK ROAD NATIONAL SECURITY AGENCY enclosure(s). SUITE #1203 9800 SAVAGE ROAD This transmittal may NOT be declassified upon removal of the CASTAIC, CA 91384 FORT MEADE MARYLAND 20755-6000 enclosurejs). PHN#: (800)456-2228 ATTN : RAMSEY,VICKI LYNN WRAPPED COMSEC SUBMITTED SUITE: 6881 lRlu Os Do DYES IRl NO 20190130 SHIPPING MODE PACKAGE CT USPS - First Class 1 of 1 LN# UNCLASSIFIED TITLEIDESCRIPTION OF ITEM QTY TOT COST MFG SERIAL# BARCODE CLASS. OF ITEM 1 SERIAL: MDR-103569, DATED 28 JANUARY L 0 UNCLASSIFIED 2019 SERIAL: MDR-103570, DATED 29 JANUARY 2019 DESIG ACCT TYPE PAS STATEMENT APPROVAL CPODIR NO NA Not Applicable SPECIAL HANDLING INSTRUCTIONS (UNCLASSIFIED) ~ REQUESTED BY ORG PHONE RAMSEY,VICKI LYNN (VLRAMSE) SI\flf1; 1?i1MiJlb P133 (301)688-7785 UNCLASSIFIED v U. DO NOT STAMP RECEIPT PORTION WITH CLASSIFICATION f---------- ­ - -----------------­ - -­ -----­ RECEIPT 1111111111111111111111111111111111 (Please sign and return immediately. Avoid tracer action) 1111111111111111111111 ReauestlO: 0000954449 Tvee: OMAL RETURN TO FROM Receipt is hereby acknowledged for the material or documents listed under DEPARTMENT OF DEFENSE MR .
    [Show full text]