How to Cover Secret Government Technology and Capabilities in Intelligence Studies Courses

Total Page:16

File Type:pdf, Size:1020Kb

How to Cover Secret Government Technology and Capabilities in Intelligence Studies Courses Journal of Strategic Security Volume 6 Number 5 Volume 6, No. 3, Fall 2013 Supplement: Ninth Annual IAFIE Article 21 Conference: Expanding the Frontiers of Intelligence Education Teaching about ‘Area 51’? How to Cover Secret Government Technology and Capabilities in Intelligence Studies Courses Armin Krishnan The University of Texas at El Paso Follow this and additional works at: https://scholarcommons.usf.edu/jss pp. 187-196 Recommended Citation Krishnan, Armin. "Teaching about ‘Area 51’? How to Cover Secret Government Technology and Capabilities in Intelligence Studies Courses." Journal of Strategic Security 6, no. 3 Suppl. (2013): 187-196. This Papers is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Teaching about ‘Area 51’? How to Cover Secret Government Technology and Capabilities in Intelligence Studies Courses This papers is available in Journal of Strategic Security: https://scholarcommons.usf.edu/jss/vol6/iss5/ 21 Krishnan: Teaching about ‘Area 51’? Teaching about ‘Area 51’? How to Cover Secret Government Technology and Capabilities in Intelligence Studies Courses Armin Krishnan Introduction While there is a wealth of excellent standard literature available specializing on intelligence analysis and how intelligence feeds into foreign policy, which has helped to turn intelligence studies from a fringe subject into a legitimate and serious academic discipline, there are still aspects of intelligence that are notoriously difficult to cover in public university courses, but which are also of enormous importance for understanding intelligence. One problem is presented in the discussion of covert action and its current role in U.S. foreign policy, as covert action is always controversial and not without good reason subjected to a lot of secrecy, which always invites a lot of criticism and speculation. Similar is the situation with respect to secret government technology and certain methods used for the collection and analysis of intelligence. Although there is some good knowledge in the public domain about many aspects of Technical Intelligence (TECHINT) from earlier decades, there is great scarcity with respect to official information on current capabilities for technical collection and analysis. Even excellent primers on U.S. intelligence such as Jeffrey Richelson’s The US Intelligence Community are very sketchy with respect to collection systems that are currently in use by the U.S. government.1 The problem is that the U.S. Government does not – in some cases – even acknowledge the existence of certain collection systems and methods. Nothing epitomizes the extreme secrecy in the field of secret weapons and secret intelligence capabilities more than the Nevada Test Site, known to the public as Area-51 or Dreamland, where some revolutionary intelligence platforms have been developed. In almost sixty years of secret testing and operations conducted on the Nevada Test Site there has not been a single whistleblower revealing current activities, whose credentials can be verified. The super-secret Area 51 may be ironically just the tip of the iceberg of a whole clandestine world of secret government technology development. Several journalists, researchers, and scholars have pointed to existence of a ‘black world’ of secret sites, secret projects, secret programs, and secret technology development that has been mushrooming at a constant pace since the 1950s and which has come to consume at least ten percent of the U.S. defense budget.2 Some estimates are substantially higher.3 It is no longer possible to simply ignore the ‘black world’ of secret U.S. government technology development and usage without arriving at a very incomplete understanding of U.S. intelligence capabilities. Nevertheless, one has to ask the question: is it even possible to teach about Area 51 without drifting too much into ‘X-Files’ territory? 1 Richelson, Jeffrey, The US Intelligence Community (Boulder: Westview Press, 2011). 2 Paglen, Trevor, Blank Spots on the Map: The Dark Geography of the Pentagon’s Secret World (New York: New American Library, 2010), 182. 3 According to a report by the DoD Inspector General, an audit of the Pentagon’s budget for Fiscal Year 1999 indicated that $2.3 trillion dollars in accounting items out of an overall of $6.9 trillion “were not supported by adequate audit trails or sufficient evidence to determine their validity.” Even if most of the $2.3 trillion can be written off due to waste, corruption, and poor accounting practices, one has to wonder how much of the money was used for funding highly classified technology development projects or ‘black’ operations. ‘Audit Report: Report Number D-2000-091’, U.S. Department of Defense Office of the Inspector General (25 February 2000), 8. 187 Produced by The Berkeley Electronic Press, 2013 Journal of Strategic Security, Vol. 6, No. 5 It is the contention of this paper that it is indeed possible to teach about secret government technology in a serious manner and that a serious discussion of a phenomenon such as Area 51 is indeed stimulating and beneficial for students of U.S. intelligence. Since there is not much readily available literature on current capabilities and sometimes deliberate deception on part of the government, one has to be creative in terms of finding relevant information from a wide range of open sources and in terms of putting the material together in a way that makes sure some inevitable speculations have at least a firm grounding in known facts and are based on good analysis. It is also crucial to always communicate to students how reliable the information is and where it comes from. In other words, researching and teaching about secret technology requires a mindset and methodologies based on open source intelligence analysis. The Government Couldn’t Keep a Secret, Right? There is the misperception, which is continuously reinforced and perpetuated by politicians and the media, that nothing leaks as badly as Washington and that there are no real secrets. The government is believed to be generally incompetent to protect its greatest secrets and that all secrets eventually reach the public because of leakers, whistle-blowers, and investigative journalists busying themselves with undermining the very elaborate and very expensive machinery of government secrecy.4 This might be true in the sense that a lot of classified information gets eventually leaked, mostly for political purposes and often by the sitting administration itself, but it is definitely not true when it comes to development and operation of secret technical intelligence collection systems and methods. These are classified ‘above’ Top Secret and are subjected to only minimal Congressional oversight. People are given access to this information only on a need-to-know basis and only after they have been carefully vetted. They have to sign a non-disclosure agreement and would face up to thirty years in prison if they would make unauthorized disclosures of sensitive information. It is no surprise that leaks to the public about highly classified current technical collection systems, operations, and other sensitive intelligence information are extremely rare. Secret government technology development programs are typically so-called Special Access Programs (SAPs) that employ special security measures and have substantially reduced oversight mechanisms.5 The Commission on government secrecy headed by Senator Patrick Moynihan revealed: “Special access programs can concern research, development, and acquisition activities; intelligence (including covert action); or military operations.”6 The Central Intelligence Agency (CIA) calls their ‘deep black’ programs Controlled Access Programs (CAPs). Any information related to sources and methods is classified Top Secret Sensitive Compartmented Information with a codename that identifies the particular compartment (TS SCI codename). Very few people within the U.S. Government and the military-industrial complex, called ‘Super-Users,’ have access to all information on a compartmentalized program. The government will usually not comment on SAPs, although their existence might be known to the 4 The U.S. government spent $11.36 billion dollars on the proper classification, handling, and protection of government secrets in 2011. ‘2011 Cost Report,’ Information Security Oversight Office (20 June 2012): 2, available at: http://www.archives.gov/isoo/reports/2011-cost-report.pdf. 5 Sweetman, Bill, Lockheed Stealth (St. Paul: Zenith Press, 2004), 29. 6 ‘Report of the Commission on Protecting and Reducing Government Secrecy’ (Washington, D.C.: U.S. Congress, 1997), p. XXVIII. https://scholarcommons.usf.edu/jss/vol6/iss5/21 188 DOI: http://dx.doi.org/10.5038/1944-0472.6.3S.19 Krishnan: Teaching about ‘Area 51’? public, as they are identified by their program names in official budgets. However, few specifics about these programs would be released other than their name and general purpose. In addition, there are ‘black’ programs that are not identified in official budgets and which are hidden in other budget items. Based on the discrepancies in the overall Department of Defense (DoD) budget it has been calculated that there was $56 billion dollar black budget in 2011, which financed highly sensitive weapons development programs, as well as intelligence programs.7 These
Recommended publications
  • The Civilian Impact of Drone Strikes
    THE CIVILIAN IMPACT OF DRONES: UNEXAMINED COSTS, UNANSWERED QUESTIONS Acknowledgements This report is the product of a collaboration between the Human Rights Clinic at Columbia Law School and the Center for Civilians in Conflict. At the Columbia Human Rights Clinic, research and authorship includes: Naureen Shah, Acting Director of the Human Rights Clinic and Associate Director of the Counterterrorism and Human Rights Project, Human Rights Institute at Columbia Law School, Rashmi Chopra, J.D. ‘13, Janine Morna, J.D. ‘12, Chantal Grut, L.L.M. ‘12, Emily Howie, L.L.M. ‘12, Daniel Mule, J.D. ‘13, Zoe Hutchinson, L.L.M. ‘12, Max Abbott, J.D. ‘12. Sarah Holewinski, Executive Director of Center for Civilians in Conflict, led staff from the Center in conceptualization of the report, and additional research and writing, including with Golzar Kheiltash, Erin Osterhaus and Lara Berlin. The report was designed by Marla Keenan of Center for Civilians in Conflict. Liz Lucas of Center for Civilians in Conflict led media outreach with Greta Moseson, pro- gram coordinator at the Human Rights Institute at Columbia Law School. The Columbia Human Rights Clinic and the Columbia Human Rights Institute are grateful to the Open Society Foundations and Bullitt Foundation for their financial support of the Institute’s Counterterrorism and Human Rights Project, and to Columbia Law School for its ongoing support. Copyright © 2012 Center for Civilians in Conflict (formerly CIVIC) and Human Rights Clinic at Columbia Law School All rights reserved Printed in the United States of America. Copies of this report are available for download at: www.civiliansinconflict.org Cover: Shakeel Khan lost his home and members of his family to a drone missile in 2010.
    [Show full text]
  • "Area 51: an Uncensored History of America's Top Secret Military Base," Annie Jacobsen (New York: Little, Brown and Company, 2011)
    Journal of Strategic Security Volume 4 Number 3 Volume 4, No. 3: Fall 2011 Article 8 "Area 51: An Uncensored History of America's Top Secret Military Base," Annie Jacobsen (New York: Little, Brown and Company, 2011) Edward M. Roche Henley-Putnam University Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 73-74 Recommended Citation Roche, Edward M.. ""Area 51: An Uncensored History of America's Top Secret Military Base," Annie Jacobsen (New York: Little, Brown and Company, 2011)." Journal of Strategic Security 4, no. 3 (2011) : 73-74. DOI: http://dx.doi.org/10.5038/1944-0472.4.3.7 Available at: https://scholarcommons.usf.edu/jss/vol4/iss3/8 This Book Review is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. "Area 51: An Uncensored History of America's Top Secret Military Base," Annie Jacobsen (New York: Little, Brown and Company, 2011) This book review is available in Journal of Strategic Security: https://scholarcommons.usf.edu/jss/ vol4/iss3/8 Roche: "Area 51: An Uncensored History of America's Top Secret Military Area 51: An Uncensored History of America's Top Secret Military Base. By Annie Jacobsen. New York: Little, Brown and Company, 2011. ISBN: 978-0-316-13294-7. Photographs.
    [Show full text]
  • Extraterrestrial Life Craft Instructions
    What’s Fact and Fiction @ Area 51? Area 51 is a secret United States Air Force military base located at Groom Lake in Southern Nevada and was built in 1955. This facility has been the focus of many conspiracy theories involving extraterrestrial life (alien lifeforms), though the official information confirms the base as being a flight-testing facility. The official name for Area 51 is the Nevada Test and Training Range. The name, Area 51, came from its geo- graphical location on a map. Aerial photo of Area 51 Gate at Area 51 Some people believe that Area 51 is a site where government officials have performed experiments with extrater- restrials and their spacecrafts. Others believe that the moon landing in 1969 was fake and was filmed right here on Earth at Area 51. Over the years the CIA, Air Force, and aerospace company Lockheed Martin, have all used Area 51 as a staging ground for test flights of experimental aircraft. According to documents declassified in 2007, in the 1950s and 1960s Area 51 was used as a site for top-secret Cold War-era program known as Oxcart. The purpose of Oxcart’s program was to develop a spy plane that would be undetectable in the air and could be used for gathering information on the Soviet Union. This spy-place called the Archangel-12, was eventually developed at Area 51. The A -12 could travel speeds of more than 2,000 miles an hour and take clear pictures of objects on the ground from high altitudes. These spy planes developed at Area 51 may resemble people’s idea of what alien spacecrafts could look like, which helps explain why so many people reported UFO sightings in the skies above Nevada over the years.
    [Show full text]
  • National Security and Statutory Interpretation
    SMU Law Review Volume 53 Issue 1 Article 9 2000 Through a Looking Glass Darkly: National Security and Statutory Interpretation Jonathan Turley Follow this and additional works at: https://scholar.smu.edu/smulr Recommended Citation Jonathan Turley, Through a Looking Glass Darkly: National Security and Statutory Interpretation, 53 SMU L. REV. 205 (2000) https://scholar.smu.edu/smulr/vol53/iss1/9 This Article is brought to you for free and open access by the Law Journals at SMU Scholar. It has been accepted for inclusion in SMU Law Review by an authorized administrator of SMU Scholar. For more information, please visit http://digitalrepository.smu.edu. THROUGH A LOOKING GLASS DARKLY: NATIONAL SECURITY AND STATUTORY INTERPRETATION Jonathan Turley* TABLE OF CONTENTS I. INTRODUCTION ........................................ 206 II. AREA 51: A CASE STUDY OF THE GRAVITATIONAL EFFECT OF THE COMMON LAW ON STATUTORY INTERPRETATION IN THE NATIONAL SECURITY AREA ......................... 210 A. FACTUAL BACKGROUND .............................. 210 B. RELEVANT LEGAL ARGUMENTS AND JUDICIAL R ULINGS .............................................. 214 C. THE GRAVITATIONAL EFFECT OF THE COMMON LAW PRIVILEGE ON THE ANALYSIS IN KASZA AND FRosT ................................................. 219 III. THE INTERPLAY OF STATUTORY INTERPRETATION AND THE COMMON LAW IN THE AREA 51 LITIGATION ............................ 221 A. THEORIES OF STATUTORY INTERPRETATION IN THE COMPANY OF THE COMMON LAW ..................... 222 B. PREEMPTION AND JUDICIAL CHOICE: THE USE OF COMMON LAW AS AN OUTCOME-DETERMINATIVE ELEMENT IN THE FROST CASE ........................ 228 C. THE ADOPTION OF AN ABSOLUTE STATE SECRETS PRIVILEGE IN THE AREA 51 LITIGATION .............. 231 IV. THE LEGISPRUDENCE OF NATIONAL SECURITY AND THE COMMON LAW ............................. 237 A. THE DIALOGIC EFFECT OF THE COMMON LAW IN THE AREA OF STATUTORY INTERPRETATION ..............
    [Show full text]
  • Wh Owat Ches the Wat Chmen
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • Vilja Veta: Konspirationsteorier
    ARBETSMATERIAL FÖR ELEVEN TOMAS DÖMSTEDT Vilja veta: Konspirationsteorier ORDLISTA minoritet (sida 11, rad 5) liten grupp opålitlig (sida 19, rad 2) går inte att lita på tsar (sida 21, rad 1) titel för tidigare ledare i Ryssland förfalskning (sida 21, rad 9) inte äkta diktatur (sida 23, rad 12) land där det inte finns demokrati eller frihet sammansvärjning (sida 25, rad 8) samarbete med syfte att begå brott Finns det andra ord som är nya för dig? Skriv dem, slå upp dem och skriv förklaringar. Arbeta med ordlistan 1. Gå tillbaka till boken. Läs meningarna där orden i ordlistan finns. Förklara med egna ord vad meningarna betyder. 2. Skriv en egen mening med varje ord i ordlistan. 3. Förklara följande ord från boken så att någon som inte har läst den kan förstå: konspiration konspirationsteori syndabock antisemitism biologiska vapen manifest – lättläst för vuxna • www.nyponochviljaforlag.se 1 TOMAS DÖMSTEDT Vilja veta: Konspirationsteorier GRAMMATIK Verb Verb är ord som beskriver vad någon gör, t.ex. ”läser”, ”skriver”, ”leker”. Stryk under verben i följande meningar. I vissa meningar finns det flera verb. 1. De som tror på en konspirationsteori, tror ofta på fler än en teori. 2. Den franska revolutionen 1789 var ett folkligt uppror. 3. De styr världen i hemlighet. 4. Raketen störtade och han dog. 5. Bermudatriangeln kallas även Dödens triangel eller Atlantens kyrkogård. 6. Myten om en judisk världskonspiration lever fortfarande kvar. 7. År 1986 mördades Olof Palme. 8. Två flygplan flög in i World Trade Center. Adjektiv Adjektiv är ord som beskriver människor, djur och saker, till exempel ”liten”, ”glad” och ”lång”.
    [Show full text]
  • ASTR 380 Ufos and Alien Visits
    ASTR 380 UFOs and Alien Visits ASTR 380 UFOs and Alien Visits Official Course Evaluation On-line System open: Nov 27 – Dec 12 www.courseevalum.umd.edu/ Please participate!!! Extra-credit opportunity: 1 page typed single spaced report on a recent news item: • article from Nov or Dec in newspaper, magazine, or internet on science of relevance to this class • ½ page summary of article, ½ page on relevance to class and Life elsewhere • Due no later than Dec 11!!!! ASTR 380 UFOs and Alien Visits First – to state it clearly…. I am aware of no scientifically verified data which support the hypothesis that we are being visited by extraterrestrial beings or have been visited in the past, anywhere. I have not seen and/or heard any strong evidence which would lead me to suspect that extraterrestrials exist on or visit the Earth. All of the astronomers that I know personally, perhaps hundreds, have no personal evidence for the presence of extraterrestrials. ASTR 380 UFOs and Alien Visits All of that said, let’s look that the evidence and claims that exist and try to understand likelihood of UFOs and Alien visitors….. Perception and Human context – lessons from the sea Human ingenuity – brings surprising results Nature’s ingenuity – the unexplained does exist UFO’s, Area 51, and Roswell ASTR 380 UFOs and Alien Visits Sea Serpents: Factor or fiction? ASTR 380 UFOs and Alien Visits Sea Serpents: Factor or fiction? Reports of sightings for 100s of years from many sources. Many sightings in the 1800’s, last major sightings in the early 1900’s….
    [Show full text]
  • Porting Transmedia Storytelling to Journalism
    University of Denver Digital Commons @ DU Electronic Theses and Dissertations Graduate Studies 1-1-2011 Porting Transmedia Storytelling to Journalism Kevin Timothy Moloney University of Denver Follow this and additional works at: https://digitalcommons.du.edu/etd Part of the Digital Humanities Commons, and the Journalism Studies Commons Recommended Citation Moloney, Kevin Timothy, "Porting Transmedia Storytelling to Journalism" (2011). Electronic Theses and Dissertations. 440. https://digitalcommons.du.edu/etd/440 This Thesis is brought to you for free and open access by the Graduate Studies at Digital Commons @ DU. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ DU. For more information, please contact [email protected],[email protected]. PORTING TRANSMEDIA STORYTELLING TO JOURNALISM __________ A Thesis Presented to the Faculty of Social Sciences University of Denver __________ In Partial Fulfillment of the Requirements for the Degree Master of Arts __________ by Kevin T. Moloney August 2011 Advisor: Dr. Adrienne Russell © Copyright Kevin T. Moloney, 2011 All Rights Reserved Author: Kevin T. Moloney Title: PORTING TRANSMEDIA STORYTELLING TO JOURNALISM Advisor: Dr. Adrienne Russell Degree Date: August 2011 ABSTRACT This thesis examines how the methods of transmedia storytelling emerging in the entertainment industry might be used in a journalism context. Journalism is facing many crises, not the least of which is a loss of readership and perceived relevance to its public. Presented with an ever-expanding array of media with which to interact, the public is more difficult to attract to a socially relevant issue or a politically important story.
    [Show full text]
  • NOMINEES for the 32Nd ANNUAL NEWS & DOCUMENTARY EMMY
    NOMINEES FOR THE 32 nd ANNUAL NEWS & DOCUMENTARY EMMY ® AWARDS ANNOUNCED BY THE NATIONAL ACADEMY OF TELEVISION ARTS & SCIENCES Winners to be announced on September 26th at Frederick P. Rose Hall, Home of Jazz at Lincoln Center Larry King to Receive Lifetime Achievement Award New York, N.Y. – July 18, 2011 (revised 8.24.11) – Nominations for the 32nd Annual News and Documentary Emmy ® Awards were announced today by the National Academy of Television Arts & Sciences (NATAS). The News & Documentary Emmy® Awards will be presented on Monday, September 26 at a ceremony at Frederick P. Rose Hall, Home of Jazz at Lincoln Center, located in the Time Warner Center in New York City. The event will be attended by more than 1,000 television and news media industry executives, news and documentary producers and journalists. Emmy ® Awards will be presented in 42 categories, including Breaking News, Investigative Reporting, Outstanding Interview, and Best Documentary, among others. This year’s prestigious Lifetime Achievement Award will be given to broadcasting legend and cable news icon Larry King. “Larry King is one of the most notable figures in the history of cable news, and the National Academy of Television Arts and Sciences is delighted to present him with this year’s lifetime achievement award,” said Malachy Wienges, Chairman, NATAS. “Over the course of his career Larry King has interviewed an enormous number of public figures on a remarkable range of topics. In his 25 years at CNN he helped build an audience for cable news and hosted more than a few history making broadcasts.
    [Show full text]
  • Secrecy & Government Bulletin, Issue No. 26, August-September 1993
    Meeting the Challenge of Government Secrecy Groom Lake airbase." The mountain, known as White Sides, was somehow overlooked by the military when it Excessive government secrecy seems to be seized some 85,000 acres of public lands in the area in spawning, in dialectical fashion, an increasingly aggressive 1984. The continued accessibility of White Sides "is public interest sector to challenge it. monitored by a loosely knit secret society known as the Lacking confidence that classification authority is White Sides Defense Committee. It is they who have being exercised in good faith, more and more individual researched the legalities, mapped the trails and transported citizens are cultivating their own government sources, the lawn chairs to the summit that the security forces circulating unauthorized and accidental disclosures of inevitably steal. n classified information, and tapping foreign sources of U.S. The Viewer's Guide includes detailed geographical information. data, a catalog of unusual visual phenomena together with One of the more unusual products of the emerging conventional and "exotic" explanations, and flight schedules network of open government entrepreneurs is a recent for the peculiar fleet of "Janet Airways" 737s that bring volume entitled "Area 51 Viewer's Guide" by Glenn workers from Las Vegas to the area every weekday Campbell. morning at dawn. Along with tips for negotiating close Area 51 is the unofficial name of an encounters with the Sheriff and the unidentified security unacknowledged military facility near Groom Lake at the forces, there are startling anecdotes throughout, like the Nevada Test Site. The classified activities there have tale of the fellow "who attached a video camera to a inspired much of the contemporary mythology surrounding radio-controlled model race car and sent it down the UFOs as well as some of the reports of an alleged Groom Lake Road." The bibliographic references, heavy hypersonic reconnaissance aircraft ("Aurora").
    [Show full text]
  • Questioning the National Security Agency's Metadata Program
    I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY Secret without Reason and Costly without Accomplishment: Questioning the National Security Agency’s Metadata Program JOHN MUELLER & MARK G. STEWART* I. INTRODUCTION When Edward Snowden’s revelations emerged in June 2013 about the extent to which the National Security Agency was secretly gathering communications data as part of the country’s massive 9/11- induced effort to catch terrorists, the administration of Barack Obama set in motion a program to pursue him to the ends of the earth in order to have him prosecuted to the full extent of the law for illegally exposing state secrets. However, the President also said that the discussions about the programs these revelations triggered have actually been a good thing: “I welcome this debate. And I think it’s healthy for our democracy. I think it’s a sign of maturity because probably five years ago, six years ago, we might not have been having this debate.”1 There may be something a bit patronizing in the implication that the programs have been secret because we were not yet mature enough to debate them when they were put into place. Setting that aside, however, a debate is surely to be welcomed—indeed, much overdue. It should be conducted not only about the National Security Agency’s (NSA) amazingly extensive data-gathering programs to * John Mueller is a professor of political science at Ohio State University and a Senior Fellow at the Cato Insitute. Mark G. Stewart is a professor of engineering at the University of Newcastle, Australia.
    [Show full text]
  • CIA), Oct 1997-Jan 1999
    Description of document: FOIA Request Log for the Central Intelligence Agency (CIA), Oct 1997-Jan 1999 Requested date: 2012 Released date: 2012 Posted date: 08-October-2018 Source of document: FOIA Request Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: 703-613-3007 FOIA Records Request Online The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. 1998 Case Log Creation Date Case Number Case Subject 07-0ct-97 F-1997-02319 FOIA REQUEST VIETNAM CONFLICT ERA 1961 07-0ct-97 F-1997-02320 FOIA REQUEST PROFESSOR ZELLIG S. HARRIS FOIA REQUEST FOR MEETING MINUTES OF THE PUBLIC DISCLOSURE COORDINATING COMMITTEE 07-0ct-97 F-1997-02321 (PDCC) 07-0ct-97 F-1997-02322 FOIA REQUEST RE OSS REPORTS AND PAPERS BETWEEN ALLEN DULLES AND MARY BANCROFT 07-0ct-97 F-1997-02323 FOIA REQUEST CIA FOIA GUIDES AND INDEX TO CIA INFORMATION SYSTEMS 07-0ct-97 F-1997-02324 FOIA REQUEST FOR INFO ON SELF 07-0ct-97 F-1997-02325 FOIA REQUEST ON RAOUL WALLENBERG 07-0ct-97 F-1997-02326 FOIA REQUEST RE RAYMOND L.
    [Show full text]