Secrets in Plain View: Covert Action the U.S. Way
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Congress' Power of the Purse
Congress' Power of the Purse Kate Stitht In view of the significance of Congress' power of the purse, it is surprising that there has been so little scholarly exploration of its contours. In this Arti- cle, Professor Stith draws upon constitutional structure, history, and practice to develop a general theory of Congress' appropriationspower. She concludes that the appropriationsclause of the Constitution imposes an obligation upon Congress as well as a limitation upon the executive branch: The Executive may not raise or spend funds not appropriatedby explicit legislative action, and Congress has a constitutional duty to limit the amount and duration of each grant of spending authority. Professor Stith examinesforms of spending authority that are constitutionally troubling, especially gift authority, through which Congress permits federal agencies to receive and spend private contri- butions withoutfurther legislative review. Other types of "backdoor" spending authority, including statutory entitlements and revolving funds, may also be inconsistent with Congress' duty to exercise control over the size and duration of appropriations.Finally, Professor Stith proposes that nonjudicial institu- tions such as the General Accounting Office play a larger role in enforcing and vindicating Congress' power of the purse. TABLE OF CONTENTS I. THE CONSTITUTIONAL LAW OF APPROPRIATIONS 1346 A. The Constitutional Prerequisitesfor Federal Gov- ernment Activity 1346 B. The Place of Congress' Power To Appropriate in the Structure of the Constitution 1348 C. The Constitutional Function of "Appropriations" 1352 D. The Principlesof the Public Fisc and of Appropria- tions Control 1356 E. The Power to Deny Appropriations 1360 II. APPROPRIATIONS CONTROL: THE LEGISLATIVE FRAME- WORK 1363 t Associate Professor of Law, Yale Law School. -
A Plausibly Deniable Encryption Scheme for Personal Data Storage Andrew Brockmann Harvey Mudd College
Claremont Colleges Scholarship @ Claremont HMC Senior Theses HMC Student Scholarship 2015 A Plausibly Deniable Encryption Scheme for Personal Data Storage Andrew Brockmann Harvey Mudd College Recommended Citation Brockmann, Andrew, "A Plausibly Deniable Encryption Scheme for Personal Data Storage" (2015). HMC Senior Theses. 88. https://scholarship.claremont.edu/hmc_theses/88 This Open Access Senior Thesis is brought to you for free and open access by the HMC Student Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in HMC Senior Theses by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. A Plausibly Deniable Encryption Scheme for Personal Data Storage Andrew Brockmann Talithia D. Williams, Advisor Arthur T. Benjamin, Reader Department of Mathematics May, 2015 Copyright © 2015 Andrew Brockmann. The author grants Harvey Mudd College and the Claremont Colleges Library the nonexclusive right to make this work available for noncommercial, educational pur- poses, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author. Abstract Even if an encryption algorithm is mathematically strong, humans in- evitably make for a weak link in most security protocols. A sufficiently threatening adversary will typically be able to force people to reveal their encrypted data. Methods of deniable encryption seek to mend this vulnerability by al- lowing for decryption to alternate data which is plausible but not sensitive. Existing schemes which allow for deniable encryption are best suited for use by parties who wish to communicate with one another. -
Cultural Intelligence in Covert Operatives
OVERT ACCEPTANCE: CULTURAL INTELLIGENCE IN COVERT OPERATIVES CHIP MICHAEL BUCKLEY A Thesis Submitted to the Faculty of Mercyhurst University In Partial Fulfillment of the Requirements for The Degree of MASTER OF SCIENCE IN APPLIED INTELLIGENCE RIDGE SCHOOL FOR INTELLIGENCE STUDIES AND INFORMATION SCIENCE MERCYHURST UNIVERSITY ERIE, PENNSYLVANIA JANUARY 2015 RIDGE SCHOOL FOR INTELLIGENCE STUDIES AND INFORMATION SCIENCE MERCYHURST UNIVERSITY ERIE, PENNSYLVANIA OVERT ACCEPTANCE: CULTURAL INTELLIGENCE IN COVERT OPERATIVES A Thesis Submitted to the Faculty of Mercyhurst University In Partial Fulfillment of the Requirements for The Degree of MASTER OF SCIENCE IN APPLIED INTELLIGENCE Submitted By: CHIP MICHAEL BUCKLEY Certificate of Approval: ___________________________________ Stephen Zidek, M.A. Assistant Professor The Ridge School of Intelligence Studies and Information Science ___________________________________ James G. Breckenridge, Ph.D. Associate Professor The Ridge School of Intelligence Studies and Information Science ___________________________________ Phillip J. Belfiore, Ph.D. Vice President Office of Academic Affairs January 2015 Copyright © 2015 by Chip Michael Buckley All rights reserved. iii DEDICATION To my father. iv ACKNOWLEDGEMENTS I would like to acknowledge a number of important individuals who have provided an extraordinary amount of support throughout this process. The faculty at Mercyhurst University, particularly Professor Stephen Zidek, provided invaluable guidance when researching and developing this thesis. My friends and classmates also volunteered important ideas and guidance throughout this time. Lastly, my family’s support, patience, and persistent inquiries regarding my progress cannot be overlooked. v ABSTRACT OF THE THESIS Overt Acceptance: Cultural Intelligence in Covert Operatives A Critical Examination By Chip Michael Buckley Master of Science in Applied Intelligence Mercyhurst University, 2014 Professor S. -
The War Powers Resolution: Concepts and Practice
The War Powers Resolution: Concepts and Practice Updated March 8, 2019 Congressional Research Service https://crsreports.congress.gov R42699 The War Powers Resolution: Concepts and Practice Summary This report discusses and assesses the War Powers Resolution and its application since enactment in 1973, providing detailed background on various cases in which it was used, as well as cases in which issues of its applicability were raised. In the post-Cold War world, Presidents have continued to commit U.S. Armed Forces into potential hostilities, sometimes without a specific authorization from Congress. Thus the War Powers Resolution and its purposes continue to be a potential subject of controversy. On June 7, 1995, the House defeated, by a vote of 217-201, an amendment to repeal the central features of the War Powers Resolution that have been deemed unconstitutional by every President since the law’s enactment in 1973. In 1999, after the President committed U.S. military forces to action in Yugoslavia without congressional authorization, Representative Tom Campbell used expedited procedures under the Resolution to force a debate and votes on U.S. military action in Yugoslavia, and later sought, unsuccessfully, through a federal court suit to enforce presidential compliance with the terms of the War Powers Resolution. The War Powers Resolution (P.L. 93-148) was enacted over the veto of President Nixon on November 7, 1973, to provide procedures for Congress and the President to participate in decisions to send U.S. Armed Forces into hostilities. Section 4(a)(1) requires the President to report to Congress any introduction of U.S. -
Mobihydra: Pragmatic and Multi-Level Plausibly Deniable Encryption Storage for Mobile Devices?
MobiHydra: Pragmatic and Multi-Level Plausibly Deniable Encryption Storage for Mobile Devices? Xingjie Yuy;z;\, Bo Chen], Zhan Wangy;z;??, Bing Changy;z;\, Wen Tao Zhuz;y, and Jiwu Jingy;z y State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, CHINA z Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, CHINA \ University of Chinese Academy of Sciences, CHINA ] Department of Computer Science, Stony Brook University, USA Email: [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract. Nowadays, smartphones have started being used as a tool to collect and spread po- litically sensitive or activism information. The exposure of the possession of such sensitive data shall pose a risk in severely threatening the life safety of the device owner. For instance, the data owner may be caught and coerced to give away the encryption keys so that the encryption alone is inadequate to mitigate such risk. In this work, we present MobiHydra, a pragmatic plausibly deniable encryption (PDE) scheme featuring multi-level deniability on mobile devices, to circumvent the coercive attack. MobiHydra is pragmatic in that it remarkably supports hiding opportunistic data without necessarily rebooting the device. In addition, MobiHydra favourably mitigates the so-called booting-time defect, which is a whistle-blower to expose the usage of PDE in previous solutions. We implement a prototype for MobiHydra on Google Nexus S. The evaluation results demonstrate that MobiHydra introduces very low overhead compared with other PDE solutions for mobile devices. -
Congress and the Supersonic Transport, 1960-1971 by John
Congress and the supersonic transport, 1960-1971 by John Marion Bell A thesis submitted in partial fulfillment of the requirements for the degree of MASTER OF ARTS in History Montana State University © Copyright by John Marion Bell (1974) Abstract: Aviation state-of-the-art advances in the 1940's and 1950's paved the way for development of a commercial SST in the 1960's. Military aviation advances were translated directly into subsonic transports and it was felt that the next step in progress would be the SST. Through military programs and basic research by NACA, the United States government aided the development of a commercial SST even before undertaking an active SST program in the 1960's. Foreign governments were also at work on SST's and when the British and French merged their development programs in 1962 the United States was spurred by their competition. President Kennedy announced an active program in June, 1963 a day following Pan Am's order of Anglo-French SST's. There was little opposition to the airplane at first; what little there was was based on the aircraft's unavoidable sonic boom. A design competition was conducted by the FAA to select the best possible American design. Boeing was selected the winner in 1966 on the basis of a radical, swing-wing design. The program then entered a two-prototype development stage. Boeing soon ran into development problems and in 1968 abandoned its swing-wing in favor of a conventional fixed-wing. The airplane's problems were also complicated by the great increase in cost of development as well as a growing opposition based on the possible negative environmental impact of the SST. -
Indian False Flag Operations
Center for Global & Strategic Studies Islamabad INDIAN FALSE FLAG OPERATIONS By Mr. Tauqir – Member Advisory Board CGSS Terminology and Genealogy The term false flag has been used symbolically and it denotes the purposeful misrepresentation of an actor’s objectives or associations. The lineage of this term is drawn from maritime affairs where ships raise a false flag to disguise themselves and hide their original identity and intent. In this milieu, the false flag was usually used by pirates to conceal themselves as civilian or merchant ships and to prevent their targets from escaping away or to stall them while preparing for a battle. In other cases, false flags of ships were raised to blame the attack on someone else. A false flag operation can be defined as follows: “A covert operation designed to deceive; the deception creates the appearance of a particular party, group, or nation being responsible for some activity, disguising the actual source of responsibility.” These operations are purposefully carried out to deceive public about the culprits and perpetrators. This phenomenon has become a normal practice in recent years as rulers often opt for this approach to justify their actions. It is also used for fabrication and fraudulently accuse or allege in order to rationalize the aggression. Similarly, it is a tool of coercion which is often used to provoke or justify a war against adversaries. In addition, false flag operations could be a single event or a series of deceptive incidents materializing a long-term strategy. A primary modern case of such operations was accusation on Iraqi President Saddam Hussain for possessing weapons of mass-destruction ‘WMD’, which were not found after NATO forces, waged a war on Iraq. -
Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities & Covert Action
ARTICLE Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities & Covert Action Andru E. Wall* Abstract Modern warfare requires close integration of military and intelligence forces. The Secretary of Defense possesses authorities under Title 10 and Title 50 and is best suited to lead US government operations against external unconventional and cyber threats. Titles 10 and 50 create mutually supporting, not mutually exclusive, authorities. Operations conducted under military command and control pursuant to a Secretary of Defense-issued execute order are military operations and not intelligence activities. Attempts by congressional overseers to redefine military preparatory operations as intelligence activities are legally and historically unsupportable. Congress should revise its antiquated oversight structure to reflect our integrated and interconnected world. I. Introduction After being hunted for nearly ten years, Osama Bin Laden was shot and killed by U.S. Navy SEALs in the early hours of May 2, 2011. The identity of the elite special operations unit that conducted the raid on bin Laden's compound in Pakistan was not immediately released, as the * Senior Associate with Alston & Bird LLP; former senior legal advisor for U.S. Special Operations Command Central (2007 to 2009). While this article was cleared for publication as required by my security clearance and nondisclosure agreements, the views expressed herein are my own and do not necessarily reflect the position of the U.S. government or Department of Defense. I thank Harvard Law School for its generous support of this paper andJack Goldsmith, Hagan Scotten., Mark Grdovic, Nick Dotti, Chris Costa, Michael Bahar, and Lenn Ferrer for their invaluable comments and suggestions. -
The Boland Amendment and Report, 1983 in Late 1982 the U.S
The Boland Amendment and Report, 1983 In late 1982 the U.S. Congress passed an amendment to a bill that restricted U.S. spending in Nicaragua. The amendment, proposed by Massachusetts Representative, Edward Boland, said that “None of the funds provided in this Act may be used by the Central Intelligence Agency or the Department of Defense to furnish military equipment, military training or advice, or other support for military activities, to any group or individual, not part of a country’s armed forces, for the purposes of overthrowing the Government of Nicaragua or provoking a military exchange between Nicaragua and Honduras.” This report explained Boland’s view of the Nicaraguan situation, and it included a new amendment that extended the restriction. Report of Mr. Boland The Committee’s action on H.R. 2760 [to amend the Intelligence Authorization Act for Fiscal Year 1983 to prohibit United States support for military or paramilitary operations in Nicaragua and to authorize assistance, to be openly provided to governments of countries in Central America, to interdict the supply of military equipment from Nicaragua and Cuba to individuals, groups, organizations or movements seeking to overthrow governments of countries in Central America] comes at a time when U.S. foreign policy towards Central America is at the forefront of discussion in the Congress and throughout the nation. Attention has been focused on events in that troubled region not only because of their daily depiction in news reports but because of the President’s April 27 address to a joint session of the Congress. As the President so forcefully noted, Central America has a strategic importance to the United States, yet some Central America nations friendly to the United States are now under attack. -
The Spectacle of the False-Flag
The Spectacle of the False-Flag THE SPECTACLE OF THE FALSE-FLAG: PARAPOLITICS FROM JFK TO WATERGATE Eric Wilson THE SPECTACLE OF THE FALSE-FLAG: PARAPOLITICS from JFK to WATERGATE Eric Wilson, Monash University 2015 http://creativecommons.org/licenses/by-nc-nd/4.0/ This work is Open Access, which means that you are free to copy, distribute, display, and perform the work as long as you clearly attribute the work to the author, that you do not use this work for commercial gain in any form whatsoever, and that you in no way, alter, transform, or build upon the work outside of its normal use in academic scholarship without express permission of the author and the publisher of this volume. For any reuse or distribution, you must make clear to others the license terms of this work. First published in 2015 by Thought | Crimes an imprint of punctumbooks.com ISBN-13: 978-0988234055 ISBN-10: 098823405X and the full book is available for download via our Open Monograph Press website (a Public Knowledge Project) at: www.thoughtcrimespress.org a project of the Critical Criminology Working Group, publishers of the Open Access Journal: Radical Criminology: journal.radicalcriminology.org Contact: Jeff Shantz (Editor), Dept. of Criminology, KPU 12666 72 Ave. Surrey, BC V3W 2M8 [ + design & open format publishing: pj lilley ] I dedicate this book to my Mother, who watched over me as I slept through the spectacle in Dallas on November 22, 1963 and who was there to celebrate my birthday with me during the spectacle at the Watergate Hotel on June 17, 1972 Contents Editor©s Preface ................................................................ -
Copyrighted Material
bindex.qxd 6/9/06 10:19 AM Page 307 INDEX ABC News, 98 Aspin, Les, 235 Abraham Lincoln, 272 atomic bombs Abrams, Creighton, 147, 148, 155, 158–159 Hiroshima and, 33, 44–45 Abrams, Elliott, 203–204 Korean War and, 42 Abu Ghraib, 277–280 mutual assured destruction (MAD) and, 48 Acheson, Dean, 39 See also nuclear weapons Cuban Missile Crisis and, 84, 87 Korean War and, 35, 36, 39, 41, 44 Baathist regime, 272. See also Iraq Vietnam War and, 131–132 Bacon, Augustus O., 23 Adams, John, 14 Baker, James, 190, 231, 237 Adams, John Quincy, 17 Panama, 223 Adams, Sherman, 55 Yugoslavia and, 237 Adelman, Kenneth, 261 Balaguer, Joaquin, 129 Adenauer, Konrad, 94 Balkans, 237–242, 245 Afghanistan, 287–288 Ball, George, 105 Carter and, 187–189 Cuban Missile Crisis, 78 Clinton and, 243, 244, 245 Vietnam War, 120–121, 124, 132 George H. W. Bush and, 222, 223–224 Barzani, Mustafa, 184 George W. Bush and, 249, 252–256, 257, Batista, Fulgencio, 61–62 269, 280 Battle of New Orleans, 15 Reagan and, 191, 193, 200–201 Bay of Pigs, 64–71, 77, 85, 235 Africa, 233–234, 245. See also individual names Beckwith, Bob, 254 of countries Beecher, William, 149, 159 Aidid, Mohammed Farrah, 234, 236 Begin, Menachem, 193 Allen, Richard, 190 Beirut. See Lebanon Allende Gossens, Salvador, 164–166 Bennett, Tapley, 129 al-Qaeda, 243–245, 249–253 Berger, Sandy, 234, 244, 249 Iraq and, 250–256, 257–269, 274–276 Berlin Wall, 34, 221 prisoners of United States and, 276–280 Biden, Joseph, 248–249 September 11 attacks and, 253–256, 269 Bin Laden, Osama, 227, 243–245, 248–256 Al-Shiraa -
FBI Investigations Into the Civil Rights Movement and the New Left
Columbus State University CSU ePress Theses and Dissertations Student Publications 12-2019 FBI Investigations into the Civil Rights Movement and the New Left Meredith Donovan Follow this and additional works at: https://csuepress.columbusstate.edu/theses_dissertations Part of the History Commons Recommended Citation Donovan, Meredith, "FBI Investigations into the Civil Rights Movement and the New Left" (2019). Theses and Dissertations. 330. https://csuepress.columbusstate.edu/theses_dissertations/330 This Thesis is brought to you for free and open access by the Student Publications at CSU ePress. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of CSU ePress. COLUMBUS STATE UNIVERSITY FBI INVESTIGATIONS INTO THE CIVIL RIGHTS MOVEMENT AND THE NEW LEFT A THESIS SUBMITTED TO THE HONORS COLLEGE IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR HONORS IN THE DEGREE OF BACHELOR OF ARTS DEPARTMENT OF HISTORY COLLEGE OF LETTERS AND SCIENCES BY MEREDITH DONOVAN COLUMBUS, GEORGIA 2019 1 Copyright © 2019 Meredith Donovan All Rights Reserved. 2 FBI INVESTIGATIONS INTO THE CIVIL RIGHTS MOVEMENT AND THE NEW LEFT By Meredith Donovan Committee Chair: Dr. Gary Sprayberry Committee Members: Dr. Sarah Bowman Dr. Ryan Lynch Columbus State University December 2019 3 Abstract This paper examines how the FBI investigated civil rights organizations and social movements from the 1950s through the 1970s. It compares the reasons for the investigations, the investigative methods, and the extent of the investigations. The paper uses FBI files as the basis for the information and to form the argument that the FBI chose its targets based on who posed a significant threat to the status quo.