Funciones E Instrumentos De Inteligencia Al Servicio De Los Intereses De Seguridad De Estados Unidos

Total Page:16

File Type:pdf, Size:1020Kb

Funciones E Instrumentos De Inteligencia Al Servicio De Los Intereses De Seguridad De Estados Unidos C UADERNOS DE I NVEST I G A C I Ó N Funciones e instrumentos de inteligencia al servicio de los intereses de seguridad de Estados Unidos Programas de vigilancia masiva de la National Security Agency, ¿Razón de Estado? Enrique Utrilla Quintanar Director: Soledad Segoviano Monterrubio CI 23/2016 ISSN: 2530-3570 Universidad Complutense de Madrid Facultad de Ciencias Políticas y Sociología Índice 1. Introducción. ................................................................................................................ 6 1.1. Delimitación del tema y objetivos. ................................................................................... 6 1.2. Metodología y fuentes. ................................................................................................... 8 1.3. Hipótesis. ..................................................................................................................... 10 1.4. Marco teórico y aproximación conceptual. ....................................................................... 11 2. La construcción de la maquinaria de inteligencia norteamericana. ...................................... 18 2.1. La National Security Act. Erigiendo la estructura de inteligencia. [1947] ............................ 18 2.2. De la Armed Forces Security Agency a la National Security Agency. [1949-1952] ............... 20 3. La National Security Agency: Etapas en la configuración del centinela global. ....................... 21 3.1. La NSA en la Guerra Fría. [1952-1991] .......................................................................... 21 3.1.1. El antecedente de la vigilancia: El Counter Intelligence Program. [1956-1971] ............ 21 3.1.2. La National Reconnaissance Office (NRO). Comienzo de las rivalidades entre Agencias Ejecutivas de vigilancia. [1961] ....................................................... 23 3.1.3. Creación del Central Security Service. El complemento funcional de la NSA. ................ 24 3.1.4. El Church Committee: Las revelaciones de los programas MINARET y......................... 24 3.1.5. La Foreign Intelligence Surveillance Act (FISA). El mecanismo supervisor de inteligencia. [1978] ......................................................................................... 26 3.1.6. La era del criptosecretismo: La NSA e IBM. El algoritmo Data Encryption Standard. [1970-1979] ...................... 27 3.1.7. La Orden Ejecutiva 12333. Las 16 Agencias Ejecutivas de inteligencia. [1981] ............ 29 3.1.8. La Goldwater-Nichols Act. La reorganización del Department of Defense. [1986] ........ 30 3.2. La NSA en la post-Guerra Fría. [1991-2001] ................................................................... 32 3.2.1. El dividendo de la paz en la etapa Clinton y la puesta en marcha de la Revolution in Military Affairs. El impacto en la vigilancia del siglo XXI. [1993-2001] ..................... 32 3.3. La NSA en el siglo XXI. Del 11-S a las revelaciones de Edward Snowden. [2001- 2013] ...... 34 3.3.1. Administración George W. Bush. [2001-2009] ......................................................... 34 3.3.2. Administración Barack Obama. [2009-Actualidad] ..................................................... 44 4. El desafío de las filtraciones en la comunidad de inteligencia norteamericana........................ 50 4.1. Filtradores y filtraciones anteriores a WikiLeaks. .............................................................. 50 4.2. WikiLeaks. La ventana a las revelaciones masivas. ............................................................. 56 4.3. Filtraciones más relevantes de WikiLeaks. ....................................................................... 57 4.4. Edward Snowden. ¿Héroe o traidor? ............................................................................... 59 5. Programas de espionaje masivo de la NSA revelados por Edward Snowden. ........................... 61 5.1. Tratado UKUSA. Construyendo la estructura de espionaje. El club de “Los Cinco Ojos”. .... 61 5.2. Clasificación de los objetivos de espionaje. El impulso de la cooperación y la ausencia de amistades en el entorno global. ................................................................................... 63 5.3. Programa PRISM. .......................................................................................................... 64 5.4. Programa BOUNDLESS INFORMANT. ......................................................................... 66 5.5. Programa SHELLTRUMPET.......................................................................................... 68 5.6. Programa X-KEYSCORE. .............................................................................................. 68 3 5.7. Programa PROJECT BULLRUN. .................................................................................... 70 5.8. Programas Upstream Collection. ..................................................................................... 71 5.8.1. Programa STORMBREW. ........................................................................................ 71 5.8.2. Programa OAKSTAR. .............................................................................................. 72 5.8.3. Programa BLARNEY. .............................................................................................. 74 5.8.4. Programa FAIRVIEW. ............................................................................................. 75 5.9. La Estrecha colaboración con el Government Communications Headquarters (GCHQ) británico. ...................................................................................................................... 77 5.9.1. Programa OPTIC NERVE. ....................................................................................... 77 5.9.2. Programa THIEVING MAGPIE. ............................................................................... 78 5.9.3. Programa TEMPORA. ............................................................................................. 79 6. Análisis de impacto de las revelaciones de Edward Snowden. ............................................... 81 6.1. Ámbito interno de Estados Unidos. ................................................................................. 81 6.2. Panorama internacional. ................................................................................................. 82 6.2.1. Naciones Unidas frente a los programas de la NSA. La acción diplomática de Brasil y Alemania.............................................................. 82 6.2.2. El Parlamento Europeo: Comisión de Libertades Civiles, Justicia y Asuntos de Interior. [21/02/14] ........................................................................ 84 6.2.3. Reacciones por países: ............................................................................................. 84 6.3. Reacciones de otros observadores: Human Rights Watch y American Civil Liberties Union. 89 7. Conclusiones. ................................................................................................................ 92 8. BIBLIOGRAFÍA ............................................................................................................ 95 9. ANEXO APÉNDICES ..................................................................................................... 104 9.1. APÉNDICE A: .............................................................................................................. 105 9.2. APÉNDICE B: .............................................................................................................. 111 9.3. APÉNDICE C: .............................................................................................................. 115 9.4. APÉNDICE D: .............................................................................................................. 124 9.5. APÉNDICE E: .............................................................................................................. 129 9.6. APÉNDICE F: .............................................................................................................. 134 9.7. APÉNDICE G: .............................................................................................................. 139 9.8. CRONOLOGÍA DE ACONTECIMIENTOS ................................................................... 143 4 RESUMEN La comunidad de inteligencia norteamericana ha experimentado profundas mutaciones con objeto de adaptarse a las diferentes dinámicas y desafíos internacionales. No obstante, han sido dos los acontecimientos que han supuesto un punto de inflexión en su adaptación a la coyuntura global. Por un lado, la confrontación bipolar y el cuestionamiento de liderazgo estadounidense por parte de la URSS durante la Guerra Fría. Por el otro, los ataques terroristas del 11 de septiembre de 2001. Frente al primer escenario, la Administración Truman respondió con la aprobación de la National Security Act de 1947, sobre la que se fue conformando la comunidad de inteligencia norteamericana, readaptada otras tantas veces con motivo de las diferentes crisis internacionales y con el objetivo prioritario de garantizar la seguridad nacional en un entorno internacional adverso. En cuanto al segundo escenario, ya en el siglo XXI, la Administración George W. Bush reaccionó a través de una Ley que ayudara al Gobierno a tener controlada cualquier posible amenaza: la USA PATRIOT ACT. Un contexto de Global War on Terror donde la seguridad dependiente de las actividades de inteligencia quedaba subordinada a la razón
Recommended publications
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • Case3:08-Cv-04373-JSW Document174-2 Filed01/10/14 Page1 of 7 Exhibit 2
    Case3:08-cv-04373-JSW Document174-2 Filed01/10/14 Page1 of 7 Exhibit 2 Exhibit 2 1/9/14 Case3:08-cv-04373-JSWNew Details S Document174-2how Broader NSA Surveil la n Filed01/10/14ce Reach - WSJ.com Page2 of 7 Dow Jones Reprints: This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers, use the Order Reprints tool at the bottom of any article or visit www.djreprints.com See a sample reprint in PDF Order a reprint of this article now format. U.S. NEWS New Details Show Broader NSA Surveillance Reach Programs Cover 75% of Nation's Traffic, Can Snare Emails By SIOBHAN GORMAN and JENNIFER VALENTINO-DEVRIES Updated Aug. 20, 2013 11:31 p.m. ET WASHINGTON—The National Security Agency—which possesses only limited legal authority to spy on U.S. citizens—has built a surveillance network that covers more Americans' Internet communications than officials have publicly disclosed, current and former officials say. The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans. In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say. The NSA's filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S.
    [Show full text]
  • I,St=-Rn Endorsedb~ Chief, Policy, Information, Performance, and Exports
    NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY 2-4 Issue Date: IO May 20 I 9 Revised: HANDLING OF REQUESTS FOR RELEASE OF U.S. IDENTITIES PURPOSE AND SCOPE This policy, developed in consultation with the Director of National Intelligence (DNI), the Attorney General, and the Secretary of Defense, implements Intelligence Community Policy Guidance I 07 .1 , "Requests for Identities of U.S. Persons in Disseminated Intelligence Reports" (Reference a), and prescribes the policy, procedures, and responsibilities for responding to a requesting entity, other than NSA/CSS, for post-publication release and dissemination of masked US person idenlity information in disseminated serialized NSA/CSS reporting. This policy applies exclusively to requests from a requesting entity, other than NSA/CSS, for post-publication release and dissemination of nonpublic US person identity information that was masked in a disseminated serialized NSA/CSS report. This policy does not apply in circumstances where a U.S. person has consented to the dissemination of communications to, from, or about the U.S. person. This policy applies to all NSA/CSS personnel and to all U.S. Cryptologic System Government personnel performing an NSA/CSS mission. \ This policy does not affect any minimization procedures established pursuant to the Foreign Intelligence Surveillance Act of 1978 (Reference b), Executive Order 12333 (Reference £), or other provisions of law. This policy does not affect the requirements established in Annex A, "Dissemination of Congressional Identity Information," of Intelligence Community Directive 112, "Congressional Notification" (Reference d). ~A General, U.S. Army Director, NSA/Chief, CSS i,st=-rn Endorsedb~ Chief, Policy, Information, Performance, and Exports NSA/CSS Policy 2-4 is approved for public release.
    [Show full text]
  • Intelligence Legalism and the National Security Agency's Civil Liberties
    112 Harvard National Security Journal / Vol. 6 ARTICLE Intelligence Legalism and the National Security Agency’s Civil Liberties Gap __________________________ Margo Schlanger* * Henry M. Butzel Professor of Law, University of Michigan. I have greatly benefited from conversations with John DeLong, Mort Halperin, Alex Joel, David Kris, Marty Lederman, Nancy Libin, Rick Perlstein, Becky Richards, and several officials who prefer not to be named, all of whom generously spent time with me, discussing the issues in this article, and many of whom also helped again after reading the piece in draft. I would also like to extend thanks to Sam Bagenstos, Rick Lempert, Daphna Renan, Alex Rossmiller, Adrian Vermeule, Steve Vladeck, Marcy Wheeler, Shirin Sinnar and other participants in the 7th Annual National Security Law Workshop, participants at the University of Iowa law faculty workshop, and my colleagues at the University of Michigan Legal Theory Workshop and governance group lunch, who offered me extremely helpful feedback. Jennifer Gitter and Lauren Dayton provided able research assistance. All errors are, of course, my responsibility. Copyright © 2015 by the Presidents and Fellows of Harvard College and Margo Schlanger. 2015 / Intelligence Legalism and the NSA’s Civil Liberties Gaps 113 Abstract Since June 2013, we have seen unprecedented security breaches and disclosures relating to American electronic surveillance. The nearly daily drip, and occasional gush, of once-secret policy and operational information makes it possible to analyze and understand National Security Agency activities, including the organizations and processes inside and outside the NSA that are supposed to safeguard American’s civil liberties as the agency goes about its intelligence gathering business.
    [Show full text]
  • A Public Accountability Defense for National Security Leakers and Whistleblowers
    A Public Accountability Defense For National Security Leakers and Whistleblowers The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Yochai Benkler, A Public Accountability Defense For National Security Leakers and Whistleblowers, 8 Harv. L. & Pol'y Rev. 281 (2014). Published Version http://www3.law.harvard.edu/journals/hlpr/files/2014/08/ HLP203.pdf Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:12786017 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP A Public Accountability Defense for National Security Leakers and Whistleblowers Yochai Benkler* In June 2013 Glenn Greenwald, Laura Poitras, and Barton Gellman be- gan to publish stories in The Guardian and The Washington Post based on arguably the most significant national security leak in American history.1 By leaking a large cache of classified documents to these reporters, Edward Snowden launched the most extensive public reassessment of surveillance practices by the American security establishment since the mid-1970s.2 Within six months, nineteen bills had been introduced in Congress to sub- stantially reform the National Security Agency’s (“NSA”) bulk collection program and its oversight process;3 a federal judge had held that one of the major disclosed programs violated the
    [Show full text]
  • Utah Data Center, As Well As Any Search Results Pages
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 84688A 2 May 2017 JOHN GREENEWALD Dear Mr. Greenewald : This responds to your Freedom of Information Act (FOIA) request of 14 June 2016 for Intellipedia pages on Boundless Information and/or BOUNDLESS INFORMANT and/or Bull Run and/or BULLRUN and/or Room 641A and/ or Stellar Wind and/ or Tailored Access Operations and/ or Utah Data Center, as well as any search results pages. A copy of your request is enclosed. As stated in our previous response, dated 15 June 2016, your request was assigned Case Number 84688. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD.
    [Show full text]
  • Meeting the Privacy Movement
    -----BEGIN PGP MESSAGE----- Charset: utf-8 Version: GnuPG v2 hQIMA5xNM/DISSENT7ieVABAQ//YbpD8i8BFVKQfbMy I3z8R8k/ez3oexH+sGE+tPRIVACYMOVEMENTRvU+lSB MY5dvAkknydTOF7xIEnODLSq42eKbrCToDMboT7puJSlWr W Meeting the Privacy Movement d 76hzgkusgTrdDSXure5U9841B64SwBRzzkkpLra4FjR / D z e F Dissent in the Digital Age 0 M 0 0 m BIPhO84h4cCOUNTERREVOLUTION0xm17idq3cF5zS2 GXACTIVISTSXvV3GEsyU6sFmeFXNcZLP7My40pNc SOCIALMOVEMENTgQbplhvjN8i7cEpAI4tFQUPN0dtFmCu h8ZOhP9B4h5Y681c5jr8fHzGNYRDC5IZCDH5uEZtoEBD8 FHUMANRIGHTSwxZvWEJ16pgOghWYoclPDimFCuIC 7K0dxiQrN93RgXi/OEnfPpR5nRU/Qv7PROTESTaV0scT nwuDpMiAGdO/byfCx6SYiSURVEILLANCEFnE+wGGpKA0rh C9Qtag+2qEpzFKU7vGt4TtJAsRc+5VhNSAq8OMmi8 n+i4W54wyKEPtkGREENWALDk41TM9DN6ES7sHtA OfzszqKTgB9y10Bu+yUYNO2d4XY66/ETgjGX3a7OY/vbIh Ynl+MIZd3ak5PRIVACYbNQICGtZAjPOITRAS6E ID4HpDIGITALAGEBhcsAd2PWKKgHARRISON4hN4mo7 LIlcr0t/U27W7ITTIEpVKrt4ieeesji0KOxWFneFpHpnVcK t4wVxfenshwUpTlP4jWE9vaa/52y0xibz6az8M62rD9F/ XLigGR1jBBJdgKSba38zNLUq9GcP6YInk5YSfgBVsvTzb VhZQ7kUU0IRyHdEDgII4hUyD8BERLINmdo/9bO/4s El249ZOAyOWrWHISTLEBLOWINGrQDriYnDcvfIGBL 0q1hORVro0EBDqlPA6MOHchfN+ck74AY8HACKTIVISMy 8PZJLCBIjAJEdJv88UCZoljx/6BrG+nelwt3gCBx4dTg XqYzvOSNOWDENTEahLZtbpAnrot5APPELBAUMzAW Qn6tpHj1NSrAseJ/+qNC74QuXYXrPh9ClrNYN6DNJGQ +u8ma3xfeE+psaiZvYsCRYPTOGRAPHYwkZFimy R9bjwhRq35Fe1wXEU4PNhzO5muDUsiDwDIGITAL A Loes Derks van de Ven X o J 9 1 H 0 w J e E n 2 3 S i k k 3 W Z 5 s XEGHpGBXz3njK/Gq+JYRPB+8D5xV8wI7lXQoBKDGAs -----END PGP MESSAGE----- Meeting the Privacy Movement Dissent in the Digital Age by Loes Derks van de Ven A thesis presented to the
    [Show full text]
  • News Opinion National Issues Best Countries Cartoons Photos the Report
    Pre-Snowden Whistleblower Thomas Tamm Faces Misconduct Charges, ... http://www.usnews.com/news/articles/2016-01-27/pre-snowden-whistle... News Opinion National Issues Best Countries Cartoons Photos The Report Ken Walsh's Washington Decision 2016 The Run 2016 The Chase Washington Whispers At the Edg Thomas Tamm exposed the Bush administration's warrantless wiretapping program. Fellow Justice Department whistleblower Jesselyn Radack, right, waited a decade for a misconduct complaint against her to be dismissed. By Steven Nelson Jan. 27, 2016, at 2:42 p.m. + More A whistleblower who sparked intense public debate about warrantless surveillance nearly a decade 1 of 6 4/11/2016 10:03 AM Pre-Snowden Whistleblower Thomas Tamm Faces Misconduct Charges, ... http://www.usnews.com/news/articles/2016-01-27/pre-snowden-whistle... before Edward Snowden now faces ethics charges that could result in his disbarment. Thomas Tamm, a former Justice Department attorney, told reporters in 2004 about the Bush administration bypassing standard legal procedure for intercepting Americans’ international phone calls and emails, and publicly outed himself weeks before President Barack Obama took office. Tamm’s tip helped New York Times reporters James Risen and Eric Lichtblau win a Pulitzer Prize in 2006. And under Obama, who had criticized the program, the Justice Department in 2011 announced it would not bring criminal charges against him. But on Tuesday, the D.C. Office of Disciplinary Counsel – which prosecutes disciplinary matters involving members of the D.C. Bar – unveiled ethics charges against Tamm that could result in his disbarment. The charges allege Tamm “failed to refer information in his possession that persons within the Department of Justice were violating their legal obligations to higher authority within the Department” and “revealed to a newspaper reporter confidences or secrets of his client, the Department of Justice.” [RELATED: NSA Water, Electricity Supply Safe as 'Off Now' Push Fizzles] The D.C.
    [Show full text]
  • Ensuring Language Capability in the Intelligence Community What Factors Affect the Best Mix of Military, Civilians, and Contractors?
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Purchase this document TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Defense Research Institute View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation technical report series. Reports may include research findings on a specific topic that is limited in scope; present discussions of the methodology employed in research; provide literature reviews, survey instru- ments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; or deliver preliminary findings. All RAND reports un- dergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.
    [Show full text]
  • A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service (NSA/CSS) 1931-1985
    Description of document: A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service (NSA/CSS) 1931-1985 Requested date: 15-June-2009 Released date: 03-February-2010 Posted date: 15-February-2010 Source of document: National Security Agency Attn: FOIA/PA Office (DJP4) 9800 Savage Road, Suite 6248 Ft. George G. Meade, MD 20755-6248 Fax: 443-479-3612 Online form: Here The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. A REFERENCE GUIDE TO SELECTED HISTORICAL DOCUMENTS RELATING TO THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE 1931-1985 (U) SOURCE DOCUMENTS IN Compiled by: CRYPTOLOGIC HISTORY Gerald K.
    [Show full text]
  • SURVEILLE NSA Paper Based on D2.8 Clean JA V5
    FP7 – SEC- 2011-284725 SURVEILLE Surveillance: Ethical issues, legal limitations, and efficiency Collaborative Project This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no. 284725 SURVEILLE Paper on Mass Surveillance by the National Security Agency (NSA) of the United States of America Extract from SURVEILLE Deliverable D2.8: Update of D2.7 on the basis of input of other partners. Assessment of surveillance technologies and techniques applied in a terrorism prevention scenario. Due date of deliverable: 31.07.2014 Actual submission date: 29.05.2014 Start date of project: 1.2.2012 Duration: 39 months SURVEILLE WorK PacKage number and lead: WP02 Prof. Tom Sorell Author: Michelle Cayford (TU Delft) SURVEILLE: Project co-funded by the European Commission within the Seventh Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Commission Services) Executive summary • SURVEILLE deliverable D2.8 continues the approach pioneered in SURVEILLE deliverable D2.6 for combining technical, legal and ethical assessments for the use of surveillance technology in realistic serious crime scenarios. The new scenario considered is terrorism prevention by means of Internet monitoring, emulating what is known about signals intelligence agencies’ methods of electronic mass surveillance. The technologies featured and assessed are: the use of a cable splitter off a fiber optic backbone; the use of ‘Phantom Viewer’ software; the use of social networking analysis and the use of ‘Finspy’ equipment installed on targeted computers.
    [Show full text]
  • Intelligence Failures in Countering Islamic Terrorism: a Comparative Analysis on the Strategic Surprises of the 9/11 and the Pa
    Department of Political Science Master’s Degree in International Relations - Global Studies Chair of Geopolitical Scenarios and Political Risk Intelligence Failures in Countering Islamic Terrorism: A Comparative Analysis on the Strategic Surprises of the 9/11 and the Paris Attacks and the Exceptionality of the Italian Case SUPERVISOR CANDIDATE Prof. Giuseppe Scognamiglio Antonella Camerino Student ID: 639472 CO-SUPERVISOR Prof. Lorenzo Castellani ACCADEMIC YEAR 2019-2020 TABLE OF CONTENTS ABSTRACT…………………………………………………………………………………………5 INTRODUCTION…………………………………………………………………………………..6 CHAPTER 1: Intelligence: A Theoretical Framework 1.1 – The Intelligence Cycle………………………………………………………………….11 1.2 – Intelligence Failures…………………………………………………………………….19 1.3 – The Strategic Surprises and Surprises Attacks………………………………………….24 1.4 – The Black Swan Theory………………………………………………………………...30 CHAPTER 2: The Case of USA: The Attacks of the 9/11 2.1 – The US Intelligence Community……………………………………………………….35 2.2 – Analysis of a Terrorist Organization: Al-Qaeda………………………………………..43 2.3 – The 9/11 Attacks: Facts, Causes and Consequences……………………………………52 2.4 – The US Involvement in the Middle East: The War on Terror………………………….61 CHAPTER 3: The Case of France: The Paris Attacks of November 13 3.1 – The French Intelligence Community…………………………………………………...73 3.2 – Analysis of a Terrorist Organization: The Islamic State………………………………..80 3.3 – The Paris Attacks of November 13: Facts, Causes and Consequences………………...90 3.4 – The French Involvement in the Middle East: Opération Chammal…………………….98
    [Show full text]