The Shadow Factory Also by James Bamford

Total Page:16

File Type:pdf, Size:1020Kb

The Shadow Factory Also by James Bamford This book has been optimized for viewing at a monitor setting of 1024 x 768 pixels. THE SHADOW FACTORY ALSO BY JAMES BAMFORD A Pretext for War Body of Secrets The Puzzle Palace ■ ■ THE SHADOW FACTORY ■ The Ultra-Secret NSA from9/11 to the Eavesdropping on America JAMES BAMFORD DOUBLEDAY New York London Toronto Sydney Auckland ■ ■ Copyright © 2008 by James Bamford All Rights Reserved Published in the United States by Doubleday, an imprint of The Doubleday Publishing Group, a division of Random House, Inc., New York. www.doubleday.com DOUBLEDAY is a registered trademark and the DD colophon is a trademark of Random House, Inc. Book design by Michael Collica Library of Congress Cataloging-in-Publication Data Bamford, James. The shadow factory : the ultra-secret NSA from 9/11 to the eavesdropping on America / James Bamford. p. cm. Includes bibliographical references and index. 1. United States. National Security Agency—History. 2. Intelligence service—United States. 3. Electronic surveillance—United States. 4. United States—Politics and government—2001– I. Title. UB256.U6B38 2008 327.1273—dc22 2008026448 eISBN: 978-0-385-52839 -9 v1.0 To Mary Ann And to my father, Vincent In memory of my mother, Katherine And to Tom, Paula, and Christina I’m very grateful for their constant support and encouragement. Contents Acknowledgments .......................... xi Introduction ................................. 1 BOOK ONE: ATTACK Sanaa ...................................... 7 Intercept ................................... 12 San Diego ................................. 22 Deaf ...................................... 27 Mesa ...................................... 39 Thinthread ................................. 44 Totowa .................................... 48 Chatter .................................... 55 Cambrils................................... 58 Warning ................................... 63 Fort Lee ................................... 70 vii CONTENTS Discovery .................................. 74 Laurel ..................................... 76 Surprise ................................... 82 Pentagon .................................. 89 BOOK TWO: TARGETS Opportunity ................................ 99 Hunters................................... 105 FISA ..................................... 112 Mission................................... 119 Highlander ................................ 124 Assassination ............................. 135 War ...................................... 143 BOOK THREE: COOPERATION Shamrock................................. 161 Qwest .................................... 169 Cables.................................... 175 Splitter ................................... 188 Industry .................................. 197 Transit ................................... 207 Partners .................................. 212 Wiretappers ............................... 234 viii CONTENTS Technotyranny ............................ 254 Miners ................................... 262 BOOK FOUR: DISCOVERY Fractures ................................. 271 Emergency ................................ 278 Exposure ................................. 287 Extremis.................................. 293 Immunity ................................. 301 BOOK FIVE: FUTURE Exabytes.................................. 311 Trailblazer ................................ 325 Turbulence ................................ 331 Abyss .................................... 341 Notes..................................... 347 Index ..................................... 379 ix Acknowledgments Whenever I write about the NSA, it is like trying to reassemble a puzzle after the pieces have been scrambled. Thus, I am deeply grateful to the many courageous people who helped me fit the pieces together. Although they must be unnamed, they will not go unheard or unthanked. I am also very grateful to Doubleday’s editor-in-chief, Bill Thomas, for suggesting this book and for his help, encouragement, and friendship. Many thanks also to my editor, Kris Puopolo, who helped me put the pieces of the puzzle in their proper places and was always full of good ideas and support. And thanks to Stephanie Bowen for her excellent eye and help with managing the manuscript and for keeping me on schedule. I also greatly appreciate the years of excellent advice and direction pro- vided by Kris Dahl, my agent at International Creative Management. THE SHADOW FACTORY Introduction n northern Georgia near the South Carolina border, a few miles from ILeburda’s Grits N’ Gravy and the Cracker Barrel Old Country Store, one of the most secret facilities in the world is undergoing a major ex- pansion. When completed, it will likely be the largest eavesdropping facility ever created, employing more than four thousand civilian and military “voice interceptors” and other specialists. Run by the ultra-se- cret National Security Agency, it is where the agency eavesdrops on the Middle East and North Africa, thousands of miles away. Inside, behind barbed-wire fences, heavily armed guards, and cipher-locked doors, earphone-clad men and women secretly listen in as al-Qaeda members chat on cell phones along the Afghan border, and to insurgents plan- ning attacks in Iraq. They also target and record American citizens in that region, including businesspeople, journalists, and Red Cross work- ers, as they engage in intimate conversations with their spouses back home and discuss confidential matters and business deals. “A lot of time you could tell they were calling their families,” said one of the NSA intercept operators who listened in on the Americans, “incredibly intimate, personal conversations . Basically all rules were thrown out the window, and they would use any excuse to justify a waiver to spy on Americans.” By 2008, the NSA had become the largest, most costly, and most tech- nologically sophisticated spy organization the world has ever known. It had also become the most intrusive, secretly filtering millions of phone 1 INTRODUCTION calls and e-mails an hour—international and domestic—through equip- ment programmed to watch and listen for hundreds of thousands of names and phone numbers. To sift through it all, the agency has the world’s largest collection of data-eating supercomputers. Its newest, code-named “Black Widow,” is a colossal $17.5 million Cray computer made up of sixteen tall cabinets crammed with thousands of processors. It is able to achieve speeds of hundreds of teraflops—hundreds of trillions of opera- tions a second—and the NSA predicts that it will soon break the petaflop barrier, plowing through phone calls, e-mails, and other data at more than a quadrillion operations a second. In its manic drive for information, the agency requires a city-sized headquarters complex that consumes so much energy that it is now in real danger of running out of power and going dark. It has already run out of space to store all of its data—data in which it is now drowning, ac- cording to the Congressional Research Service. “Whereas some observ- ers once predicted that the NSA was in danger of becoming proverbially deaf due to the spreading use of encrypted communications,” the report said, “it appears that NSA may now be at greater risk of being ‘drowned’ in information.” The report added, “Some intelligence data sources grow at a rate of four petabytes per month now . and the rate of growth is increasing.” In a year at that rate, the NSA’s massive database would hold at least 48 petabytes, the equivalent of nearly one billion four-door filing cabinets full of documents. It would also be equal to about twenty-four trillion pages of text. Among the few who know just how much data flows into the NSA is Eric C. Haseltine. The former head of Disney’s “Imagineering” labs, Haseltine was appointed as the agency’s associate director for research in 2002. Two years later he noted that even the NSA’s enormous com- puter power has trouble keeping up with the flow. “We in the NSA are encountering problems with the flood of information that people [in the outside world] won’t see for a generation or two,” he said. “We’ve been into the future and we’ve seen the problems” of a “tidal wave” of data. He added, “We can either be drowned by it or we can get on our surf- board and surf it and let it propel us. And, of course, that’s what we’re trying to do.” If indeed the data flowing into the NSA is what the outside world will 2 INTRODUCTION see two to four decades from now, the amount of information the agency is ingesting is truly astronomical. In fact, it may be rapidly moving from measuring the data by the petabyte to measuring it by the exabyte, which is 1,000 petabytes. By way of perspective, 200 petabytes is the equivalent of all printed material. Five exabytes (5,000,000,000,000,000,000 bytes), on the other hand, represents enough information to fill 37,000 new Li- braries of Congress and more than all the words ever printed. This is the annual equivalent of a thirty-foot stack of books for every man, woman, and child on the planet. No longer able to store all the intercepted phone calls and e-mail in its secret city, the agency has now built a new data warehouse in San Antonio, Texas. Costing, with renovations, upwards of $130 million, the 470,000-square-foot facility will be almost the size of the Alamodome. Considering how much data can now be squeezed onto a small flash drive, the new NSA building may eventually be able to hold all the information in the world. The principal end product of all that data and all that processing
Recommended publications
  • Foreign Interference with Democratic Institutions
    The Center for Ethics and the Rule of Law (CERL) at the University of Pennsylvania presents: FOREIGN INTERFERENCE WITH DEMOCRATIC INSTITUTIONS Featuring the 2017 Distinguished Haaga Lecture APRIL 18, 2017 Golkin 100, Fitts Auditorium | Penn Law CO-SPONSORED BY: CONFERENCE SCHEDULE TUESDAY, APRIL 18 | FITTS AUDITORIUM Ms. Carrie Cordero, Private practitioner and cybersecurity 1:00 – 2:30 PM expert; former Director of National Security Studies, PANEL 1: RUSSIAN CYBERHACKING Georgetown University Law Center AS AN ACT OF WAR? Mr. Luke Harding, Foreign Correspondent and former Moscow Bureau Chief, The Guardian Moderator: Prof. William Burke-White, Richard Perry Professor of Law and Director, Perry World House, University Dr. Timothy P. Murphy, President, Thomson Reuters Special of Pennsylvania Services; former FBI Deputy Director Col. Gary Corn, Staff Judge Advocate, US Cyber Command This program has been approved for 3.0 ethics CLE credits for Daniel (DJ) Rosenthal, Associate Managing Director, Kroll; Pennsylvania lawyers. CLE credit may be available in other former NSC Director for Counterterrorism and Senior Counsel jurisdictions as well. Attendees seeking CLE credit should at the ODNI and DOJ bring separate payment in the amount of $100.00 ($50.00 public interest/non-profit attorneys) cash or check made payable to Dr. Fred Kagan, Resident Scholar and Director, Critical Threats The Trustees of the University of Pennsylvania. Project, American Enterprise Institute Sean Kanuck, Center for International Security and Cooperation, Stanford University; former U.S. National 4:30 – 6:00 PM Intelligence Officer for Cyber Issues from 2011-2016 The 2017 Distinguished Haaga Lecture: Mr. David Sanger, Chief Washington Correspondent, The New York Times RUSSIAN MEDDLING IN THE 2016 PRESIDENTIAL ELECTION: IMPLICATIONS FOR THE RULE OF LAW 2:30 – 2:45 PM Speaker: General Michael Hayden BREAK Moderator: Prof.
    [Show full text]
  • The Regime Change Consensus: Iraq in American Politics, 1990-2003
    THE REGIME CHANGE CONSENSUS: IRAQ IN AMERICAN POLITICS, 1990-2003 Joseph Stieb A dissertation submitted to the faculty at the University of North Carolina at Chapel Hill in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of History in the College of Arts and Sciences. Chapel Hill 2019 Approved by: Wayne Lee Michael Morgan Benjamin Waterhouse Daniel Bolger Hal Brands ©2019 Joseph David Stieb ALL RIGHTS RESERVED ii ABSTRACT Joseph David Stieb: The Regime Change Consensus: Iraq in American Politics, 1990-2003 (Under the direction of Wayne Lee) This study examines the containment policy that the United States and its allies imposed on Iraq after the 1991 Gulf War and argues for a new understanding of why the United States invaded Iraq in 2003. At the core of this story is a political puzzle: Why did a largely successful policy that mostly stripped Iraq of its unconventional weapons lose support in American politics to the point that the policy itself became less effective? I argue that, within intellectual and policymaking circles, a claim steadily emerged that the only solution to the Iraqi threat was regime change and democratization. While this “regime change consensus” was not part of the original containment policy, a cohort of intellectuals and policymakers assembled political support for the idea that Saddam’s personality and the totalitarian nature of the Baathist regime made Iraq uniquely immune to “management” strategies like containment. The entrenchment of this consensus before 9/11 helps explain why so many politicians, policymakers, and intellectuals rejected containment after 9/11 and embraced regime change and invasion.
    [Show full text]
  • GENERAL BERNARD A. SCHRIEVER AIR FORCE ASSOCIATION LOS ANGELES CHAPTER 147 from the President…
    GENERAL BERNARD A. SCHRIEVER AIR FORCE ASSOCIATION LOS ANGELES CHAPTER 147 From the President…. Dear Members of the AFA General Bernard A. Schriever Los Angeles Chapter: The missions of your Air Force Association are to Educate the public on the importance of Aerospace Power; to Advocate Aerospace Power to the public and to our elected repre- sentatives; and to Support the Air Force and the Air Force family. The Schriever Chapter tends to emphasize the Support mission, through varied forms of philanthropy (AFROTC grants, Enlisted and Company Grade Officer scholarships, donations to the Los Angeles Air Force Spouses’ Club, donations to local high schools competing in AFA’s CyberPatriot initia- tive, and many others), and by annually recognizing the outstanding achievements of the men and women of the Space & Missile Systems Center. This quarter the chapter was very active in both the education and the recognition as- pects of the Support mission, as detailed in several articles below. We honored AFROTC ca- dets at UCLA and Community College of the Air Force (CCAF) graduates at SMC. We pre- sented the Schriever Award to Secretary of the Air Force Michael B. Donley, and a Schriever Fellowship Award to SMC Vice Commander Brig Gen Roger W. Teague, as part of the annual AFA Salute to SMC. In addition, the Chapter Board of Directors elected Marcia Peura to the Board as the new Chapter Secretary, and she is doing a great job. Marcia takes over from Barby Kollenda, who retired from Lockheed Martin and from the Board last year, but volunteered to stay on until we could find a replacement – no small task, as Barby has flawlessly handled a number of disparate tasks for the chapter during her years of service.
    [Show full text]
  • The ASCI Red TOPS Supercomputer
    The ASCI Red TOPS Supercomputer http://www.sandia.gov/ASCI/Red/RedFacts.htm The ASCI Red TOPS Supercomputer Introduction The ASCI Red TOPS Supercomputer is the first step in the ASCI Platforms Strategy, which is aimed at giving researchers the five-order-of-magnitude increase in computing performance over current technology that is required to support "full-physics," "full-system" simulation by early next century. This supercomputer, being installed at Sandia National Laboratories, is a massively parallel, MIMD computer. It is noteworthy for several reasons. It will be the world's first TOPS supercomputer. I/O, memory, compute nodes, and communication are scalable to an extreme degree. Standard parallel interfaces will make it relatively simple to port parallel applications to this system. The system uses two operating systems to make the computer both familiar to the user (UNIX) and non-intrusive for the scalable application (Cougar). And it makes use of Commercial Commodity Off The Shelf (CCOTS) technology to maintain affordability. Hardware The ASCI TOPS system is a distributed memory, MIMD, message-passing supercomputer. All aspects of this system architecture are scalable, including communication bandwidth, main memory, internal disk storage capacity, and I/O. Artist's Concept The TOPS Supercomputer is organized into four partitions: Compute, Service, System, and I/O. The Service Partition provides an integrated, scalable host that supports interactive users, application development, and system administration. The I/O Partition supports a scalable file system and network services. The System Partition supports system Reliability, Availability, and Serviceability (RAS) capabilities. Finally, the Compute Partition contains nodes optimized for floating point performance and is where parallel applications execute.
    [Show full text]
  • UNITED STATES DISTRICT COURT NORTHERN DISTRICT of INDIANA SOUTH BEND DIVISION in Re FEDEX GROUND PACKAGE SYSTEM, INC., EMPLOYMEN
    USDC IN/ND case 3:05-md-00527-RLM-MGG document 3279 filed 03/22/19 page 1 of 354 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF INDIANA SOUTH BEND DIVISION ) Case No. 3:05-MD-527 RLM In re FEDEX GROUND PACKAGE ) (MDL 1700) SYSTEM, INC., EMPLOYMENT ) PRACTICES LITIGATION ) ) ) THIS DOCUMENT RELATES TO: ) ) Carlene Craig, et. al. v. FedEx Case No. 3:05-cv-530 RLM ) Ground Package Systems, Inc., ) ) PROPOSED FINAL APPROVAL ORDER This matter came before the Court for hearing on March 11, 2019, to consider final approval of the proposed ERISA Class Action Settlement reached by and between Plaintiffs Leo Rittenhouse, Jeff Bramlage, Lawrence Liable, Kent Whistler, Mike Moore, Keith Berry, Matthew Cook, Heidi Law, Sylvia O’Brien, Neal Bergkamp, and Dominic Lupo1 (collectively, “the Named Plaintiffs”), on behalf of themselves and the Certified Class, and Defendant FedEx Ground Package System, Inc. (“FXG”) (collectively, “the Parties”), the terms of which Settlement are set forth in the Class Action Settlement Agreement (the “Settlement Agreement”) attached as Exhibit A to the Joint Declaration of Co-Lead Counsel in support of Preliminary Approval of the Kansas Class Action 1 Carlene Craig withdrew as a Named Plaintiff on November 29, 2006. See MDL Doc. No. 409. Named Plaintiffs Ronald Perry and Alan Pacheco are not movants for final approval and filed an objection [MDL Doc. Nos. 3251/3261]. USDC IN/ND case 3:05-md-00527-RLM-MGG document 3279 filed 03/22/19 page 2 of 354 Settlement [MDL Doc. No. 3154-1]. Also before the Court is ERISA Plaintiffs’ Unopposed Motion for Attorney’s Fees and for Payment of Service Awards to the Named Plaintiffs, filed with the Court on October 19, 2018 [MDL Doc.
    [Show full text]
  • 2003 Iraq War: Intelligence Or Political Failure?
    2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? A Thesis submitted to the Faculty of The School of Continuing Studies and of The Graduate School of Arts and Sciences in partial fulfillment of the requirements for the degree of Master of Arts in Liberal Studies By Dione Brunson, B.A. Georgetown University Washington, D.C. April, 2011 DISCLAIMER THE VIEWS EXPRESSED IN THIS ACADEMIC RESEARCH PAPER ARE THOSE OF THE AUTHOR AND DO NOT REFLECT THE OFFICIAL POLICIES OR POSITIONS OF THE U.S. GOVERNMENT, DEPARTMENT OF DEFENSE, OR THE U.S. INTELLIGENCE COMMUNITY. ALL INFORMATION AND SOURCES FOR THIS PAPER WERE DRAWN FROM OPEN SOURCE MATERIALS. ii 2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? Dione Brunson, B.A. MALS Mentor: Ralph Nurnberger, Ph.D. ABSTRACT The bold U.S. decision to invade Iraq in 2003 was anchored in intelligence justifications that would later challenge U.S. credibility. Policymakers exhibited unusual bureaucratic and public dependencies on intelligence analysis, so much so that efforts were made to create supporting information. To better understand the amplification of intelligence, the use of data to justify invading Iraq will be explored alongside events leading up to the U.S.-led invasion in 2003. This paper will examine the use of intelligence to invade Iraq as well as broader implications for politicization. It will not examine the justness or ethics of going to war with Iraq but, conclude with the implications of abusing intelligence. iii ACKNOWLEDGMENTS Thank you God for continued wisdom. Thank you Dr. Nurnberger for your patience. iv DEDICATION This work is dedicated to Mom and Dad for their continued support.
    [Show full text]
  • Directors of Central Intelligence As Leaders of the U.S
    All statements of fact, opinion, or analysis expressed in this book are those of the author. They do not necessarily reflect official positions of the Central Intel- ligence Agency or any other US government entity, past or present. Nothing in the contents should be construed as asserting or implying US government endorsement of the authors’ factual statements and interpretations. The Center for the Study of Intelligence The Center for the Study of Intelligence (CSI) was founded in 1974 in response to Director of Central Intelligence James Schlesinger’s desire to create within CIA an organization that could “think through the functions of intelligence and bring the best intellects available to bear on intelli- gence problems.” The Center, comprising professional historians and experienced practitioners, attempts to document lessons learned from past operations, explore the needs and expectations of intelligence consumers, and stimulate serious debate on current and future intelligence challenges. To support these activities, CSI publishes Studies in Intelligence and books and monographs addressing historical, operational, doctrinal, and theoretical aspects of the intelligence profession. It also administers the CIA Museum and maintains the Agency’s Historical Intelligence Collection. Comments and questions may be addressed to: Center for the Study of Intelligence Central Intelligence Agency Washington, DC 20505 Printed copies of this book are available to requesters outside the US government from: Government Printing Office (GPO) Superintendent of Documents P.O. Box 391954 Pittsburgh, PA 15250-7954 Phone: (202) 512-1800 E-mail: [email protected] ISBN: 1-929667-14-0 The covers: The portraits on the front and back covers are of the 19 directors of central intelligence, beginning with the first, RAdm.
    [Show full text]
  • A Failure of Intelligence: the Echelon Interception System & the Fundamental Right to Privacy in Europe
    Pace International Law Review Volume 14 Issue 2 Fall 2002 Article 7 September 2002 Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe Kevin J. Lawner Follow this and additional works at: https://digitalcommons.pace.edu/pilr Recommended Citation Kevin J. Lawner, Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe, 14 Pace Int'l L. Rev. 435 (2002) Available at: https://digitalcommons.pace.edu/pilr/vol14/iss2/7 This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace International Law Review by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. POST-SEPT. 11TH INTERNATIONAL SURVEILLANCE ACTIVITY - A FAILURE OF INTELLIGENCE: THE ECHELON INTERCEPTION SYSTEM & THE FUNDAMENTAL RIGHT TO PRIVACY IN EUROPE Kevin J. Lawner* I. Introduction ....................................... 436 II. Communications Intelligence & the United Kingdom - United States Security Agreement ..... 443 A. September 11th - A Failure of Intelligence .... 446 B. The Three Warning Flags ..................... 449 III. The Echelon Interception System .................. 452 A. The Menwith Hill and Bad Aibling Interception Stations .......................... 452 B. Echelon: The Abuse of Power .................. 454 IV. Anti-Terror Measures in the Wake of September 11th ............................................... 456 V. Surveillance Activity and the Fundamental Right to Privacy in Europe .............................. 460 A. The United Nations International Covenant on Civil and Political Rights and the Charter of Fundamental Rights of the European Union... 464 B.
    [Show full text]
  • 2017 HPC Annual Report Team Would Like to Acknowledge the Invaluable Assistance Provided by John Noe
    sandia national laboratories 2017 HIGH PERformance computing The 2017 High Performance Computing Annual Report is dedicated to John Noe and Dino Pavlakos. Building a foundational framework Editor in high performance computing Yasmin Dennig Contributing Writers Megan Davidson Sandia National Laboratories has a long history of significant contributions to the high performance computing Mattie Hensley community and industry. Our innovative computer architectures allowed the United States to become the first to break the teraflop barrier—propelling us to the international spotlight. Our advanced simulation and modeling capabilities have been integral in high consequence US operations such as Operation Burnt Frost. Strong partnerships with industry leaders, such as Cray, Inc. and Goodyear, have enabled them to leverage our high performance computing capabilities to gain a tremendous competitive edge in the marketplace. Contributing Editor Laura Sowko As part of our continuing commitment to provide modern computing infrastructure and systems in support of Sandia’s missions, we made a major investment in expanding Building 725 to serve as the new home of high performance computer (HPC) systems at Sandia. Work is expected to be completed in 2018 and will result in a modern facility of approximately 15,000 square feet of computer center space. The facility will be ready to house the newest National Nuclear Security Administration/Advanced Simulation and Computing (NNSA/ASC) prototype Design platform being acquired by Sandia, with delivery in late 2019 or early 2020. This new system will enable continuing Stacey Long advances by Sandia science and engineering staff in the areas of operating system R&D, operation cost effectiveness (power and innovative cooling technologies), user environment, and application code performance.
    [Show full text]
  • I,St=-Rn Endorsedb~ Chief, Policy, Information, Performance, and Exports
    NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY 2-4 Issue Date: IO May 20 I 9 Revised: HANDLING OF REQUESTS FOR RELEASE OF U.S. IDENTITIES PURPOSE AND SCOPE This policy, developed in consultation with the Director of National Intelligence (DNI), the Attorney General, and the Secretary of Defense, implements Intelligence Community Policy Guidance I 07 .1 , "Requests for Identities of U.S. Persons in Disseminated Intelligence Reports" (Reference a), and prescribes the policy, procedures, and responsibilities for responding to a requesting entity, other than NSA/CSS, for post-publication release and dissemination of masked US person idenlity information in disseminated serialized NSA/CSS reporting. This policy applies exclusively to requests from a requesting entity, other than NSA/CSS, for post-publication release and dissemination of nonpublic US person identity information that was masked in a disseminated serialized NSA/CSS report. This policy does not apply in circumstances where a U.S. person has consented to the dissemination of communications to, from, or about the U.S. person. This policy applies to all NSA/CSS personnel and to all U.S. Cryptologic System Government personnel performing an NSA/CSS mission. \ This policy does not affect any minimization procedures established pursuant to the Foreign Intelligence Surveillance Act of 1978 (Reference b), Executive Order 12333 (Reference £), or other provisions of law. This policy does not affect the requirements established in Annex A, "Dissemination of Congressional Identity Information," of Intelligence Community Directive 112, "Congressional Notification" (Reference d). ~A General, U.S. Army Director, NSA/Chief, CSS i,st=-rn Endorsedb~ Chief, Policy, Information, Performance, and Exports NSA/CSS Policy 2-4 is approved for public release.
    [Show full text]
  • Utah Data Center, As Well As Any Search Results Pages
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 84688A 2 May 2017 JOHN GREENEWALD Dear Mr. Greenewald : This responds to your Freedom of Information Act (FOIA) request of 14 June 2016 for Intellipedia pages on Boundless Information and/or BOUNDLESS INFORMANT and/or Bull Run and/or BULLRUN and/or Room 641A and/ or Stellar Wind and/ or Tailored Access Operations and/ or Utah Data Center, as well as any search results pages. A copy of your request is enclosed. As stated in our previous response, dated 15 June 2016, your request was assigned Case Number 84688. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD.
    [Show full text]
  • An Interview with James Bamford
    Investigating the Puzzle Palace: An Interview with James Bamford BONNIE BRENNAN AND KATHERINE GILBERT QUESTION: Do you consider clandestine intelligence gathering a legitimate activity for a modern nation-state? BAMFORD: I think it is very legitimate; I ju.st think that it should be directed externally. It is unrealistic not to have clandestine activities, though to some extent NSA isn't even really engaged in clandestine collection. Thousands of signals are just falling down outside right now, and all they're doing is putting out a dish and collecting them. There's not really anything clandestine about it. A listening post is a large thing with big antennae that can be seen from the road. It's just technical collection gathering, and I don't think there's anything really wrong with that as long as they're concentrating on foreign countries. We assume foreign countries can do the same thing to the United States. The Soviet Union, I'm sure, has a big listening post in Cuba. I don't see anything wrong with that. QUESTION: In his book, The Codebreakers, David Kahn shows that intelligence gathering by nations is as old as civilization. In the nineteenth century, Clausewitz described "intelligence" as the "basis . of our own plans and operations" and posited that "unreliable and transient intelligence results in a flimsy structure that can easily collapse and bury us in its ruins." What, in your opinion, is the role of intelligence today? BAMFORD: The role of intelligence is to provide a government with a third eye to see what is going on in places where it can't otherwise see; it has expanded tremendously from thirty years ago when the concentration was on human intelligence.
    [Show full text]