Foreign Intelligence Surveillance Act of 1978

Total Page:16

File Type:pdf, Size:1020Kb

Foreign Intelligence Surveillance Act of 1978 FOREIGN INTELLIGENCE SURVEILLANCE ACT OF 1978 HEARINGS BEFORE THE SUBCOMMITTEE ON INTELLIGENCE AND THE RIGHTS OF AMERICANS OF THE SELECT COMMITTEE ON INTELLIGENCE OF THE UNITED STATES SENATE NINETY-FIFTH CONGRESS SECOND SESSION ON S. 1566 FOREIGN INTELLIGENCE SURVEILLANCE ACT O1 1978 JTLY 19, 21, 1977 AND FEBRUARY 8, 24, 27, 1978 Printed for the use of the Select Committee on Intelligence U.S. GOVERNMENT PRINTING OFFICE 94-628 WASHINGTON: 1978 For sale by the Superintendent of Documents, U.S. Government Printing Office Washington, D.C. 20402 Stock Number 052-070-04477-2 SENATE SELECT COMMITTEE ON INTELLIGENCE (Established by S. Res. 400, 94th Cong., 2d sess.) DANIEL K. INOUYE, Hawaii, Chairman BARRY GOLDWATER, Arizona, Vice Chairman BIRCH BAYE, Indiana CLIFFORD P. CASE, New Jersey ADLAI E. STEVENSON, Illinois JA GMEN, Utah WILLIAM D. HATHAWAY, Maine CHARLES McC. MATHIAS, Sn., Maryland WALTER D. HUDDLESTON, Kentucky JAMES B. PEARSON, Kansas JOSEPH R. BIDEN, J., Delaware JOHN H. CHAFES, Rhode Island ROBERT MORGAN, North Carolina RICHARD G. LUGAR, Indiana GARY HART, Colorado MALCOLM WALLOP, Wyoming DANIEL PATRICK MOYNIHAN, New York ROBERT C. BYRD, West Virginia, Ew Officio Member HOWARD H. BAKER, JR., Tennessee, Ex Officio Member WILLIAM 0. MILLER, Staff Director EARL D.EIsHNHOWER, Minority Staff Director AUDREY H. HATCR, Chief Clerk SUBCOsMITTE ON INTELLIGENCE AND THE ]RIGHTS OF AMERICANS BIRCH BAYH, Indiana, Chiran SAKE GARN, Utah, Vice Chairman ROBERT MORGAN, North Carolina CLIFFORD P. CASE, New Jersey DANIEL PATRICK MOYNIHAN, New York JOHN H. CHAFEE, Rhode Island CONTENTS HEARING DAYS Page Tuesday, July 19, 1977 1----. Thursday, July 21, 1977---------------------------------------------- 45 Wednesday, February 8, 1978 ----------------------------------------- 87 Friday, February 24, 1978 ------------------------------------------- 185 Monday, February 27, 1978 ------------------------------------------- 11 LIST OF WITNESSES TUESDAY, JULY 19, 1977 Testimony of Griffin B. Bell, Attorney General of the United States; accompanied by John M. Harmon, Assistant Attorney General,- Office of Legal Counsel; Frederick D. Baron, Special Assistant to the Attorney General; and William Funk, Office of Legal Counsel ----------------- 11 - .THURSDAY, JULY 21, 1977 Testimony of Adm. Stansfield Turner. Director of Central Intelligence: accompanied by Anthony Lapham, General Counsel: Adm. Donald M. Showers, Special Assistant, Intelligence Community Staff, and George L. .Gary, Legislative Counsel ------------------------------------------- 46 Testimony of Ms. Deanne C. Siemer, General Counsel, Department of De- fense; accompanied by Adim. Bob Ininan, Director, National Security Agency;- and Rowland Morrow, Director, Counter-Intelligence, Depart- ment of Defense - --- ----- 58 Testimony of Harold Saunders, Director of Intelligence and Research, Department of State ---------------------------------------------- 04 Testimony of Herbert J. Hansell, Legal Adviser, Department of State ---- (5 WEDNESDAY, FEBRUARY 8, 1978 Testimony of John Shattuck, director, Washington office, American Civil Liberties Union; Jerry J. Berman, legislative counsel, American Civil Liberties Union; and Morton Halperin, Center for National Security Studies ---------------------------------------------------------- 110 Testimony of Steven B. Rosenfeld on behalf of the Committee on Federal Legislation, the Association of the Bar of the City of New York-------- 132 Testimony of Mr. David L. Watters, Washington Representative, Ameri- can Privacy Foundation ------------------------------------------- 178 APPENDIXES Appendix A. Letter from Attorney General, Griffin B. Bell, to Senator Robert Morgan, Sept. 21, 1977--------------------------------------- 231. Appendix B. Letter from Attorney General, Griffin B. Bell, to Senator Birch Bayh. Feb. 28, 1978------------------------------------------ 232 Appendix C. Fordham Law Review -- -- -- -- -- 238 Appendix D. Excessive use of intrusive techniques (findings, Church committee, final report, book II) ------------------------------------ 261 Appendix E. Political abuse of intelligence information, (findings, Church committee final report, book II) ------------------------------------- 288 IV MATERIAL FOR THE RECORD Prepared statement of Senator Joseph R. Biden, Jr., and additional views Page on S. 3197 ---------------------------------------------------- 6 Prepared statement of Hon. Griffin B. Bell, Attorney General; before the Senate Judiciary Committee, Subcommittee on Criminal Laws and Pro- cedures --------------------------------------------------- 12 Letter from Griffin B. Bell, Attorney General, to Senator Robert Morgan, Sept. 2, 1977 ------------------------------------------------ 27 Prepared Statement of Adm. Stanfield Turner, Director of Central Intel- ligence on S. 1566 -------------------------------------------- 46 Statement of Adm. Stanfield Turner, Director of Central Intelligence at hearings before the Subcommittee on Criminal Laws and Procedures of the Judiciary Committee, on Foreign Intelligence Surveillance Act of 1977 ------ 47 Prepared statement of Harold Brown, Secretary of Defense -------------- 58 Prepared statement of Deanne C. Siemer, General Counsel, Depart- ment of Defense --------------------------------------------- - 61 Preparted statement of Harold Saunders, Director of Intelligence and Research, Department of State ---------------------------------- 65 Prepared statement of Herbert J. Hansell, legal advisor, Department of State ---------------------------------------------------------- 66 Prepared statement of Prof. Christopher H. Pyle, Mount Holyoke College-. 87 Prepared statement of Walter D. Huddleston, U.S. Senator from the State of Kentucky ------------------------------------------- 109 Prepared statement of John H. F. Shattuck, director, Washington office' and Jerry J. Berman, legislative counsel, American Civil Liberties Union ----------------------------------------------------- 110 Prepared statement of Steven B. Rosenfeld on behalf of the Committee on Federal Legislation, the Association of the Bar of the City of New York- 132 Letter to Senator Daniel Inouye from George M. Hasen, chairman, Commit- mittee on Civil Rights, Jan. 24, 1978 ------ ------------ Prepared statement of David L. Watters, Washington representative, American Privacy Foundation ---------------------------------- 148 Markup hearings on S. 1566-Foreign Intelligence Surveillance Act of 1978 --------------------------------------------------------- 185 S. 1566 FOREIGN INTELLIGENCE SURVEILLANCE ACT OF 1978 TUESDAY, JULY 19, 1977 U.S. SENATE, SOn-COMMITTEE ON IN'TELLIGENCE AN) THE RICHTS OF AMERICANS 01 rmi: SELEiCT COMMITITEE ON INTELLIGENCE. W4ashington, D.C. The subcommittee met, pursuant to notice, at 10:01 a.m., in room 6226, Dirksen Senate Office Building, Senator Birch Bayh (chairman of the subcommittee) presiding. Present: Senators Bavh (presiding), Inouyc, Hathaway, Hud- dleston. Morgan, Hart, Garn, and Chafee. Also present: William G. Miller, staff director; Audrey Hatry, chief clerk of the committee. Senator BAYI. We will convene our hearings. Our full comimittee chairman is en route, and pending his arrival, perhaps I would ask the Attorney General's indulgence for a brief opening statement to try to put the foundation on what we are doing and why we are here, and I will ask my colleague from North Carolina and other colleagues if they care to also have any opening comments. The Subcommittee on Intelligence and the Rights of Americans of the Senate Select Committee on Intelligence is today beginning hear- ings on S. 1566, the Foreign Intelligence Surveillance Act of 1978. Our first witness is the distinguished Attorney General Griffin Bell, and Mr. Attorney General, as busy as you are, we appreciate that, you and your top staff people would take time to be with us here. I know from the discussions we have had, really from our first meeting, of your intense interest inl resolving this problem, and I think what you have done while Attorney General means that the words you spoke during your confirmation hearings were words of substance and not words of rhetoric. Those of us who knew you had no doubt, and hopefully some of the doubting Thomases have had their doubts removed. The hearings will continue on Thursday, July 21, when we will hear from the Director of Central Intelligence and representatives of the Departments of State and Defense. An additional hearing is scheduled for Monday, August 1,* to receive testimony from outside witnesses and representatives of interested groups. All the members of the full committee have been invited to participate in these hearings. *Tlhis hearing was cancelled and took place Wednesday, February 8, 1978. Because some aspects of foreign intelligence surveillance will re- quire the discussion of classified information, the subcommittee in- tends to take further testimony from administration witnesses in executive session. These will include representatives of the Depart- ment of State, Department of Defense, Justice Department, the FBI, the CIA, and the National Security Agency. The subcommittee is taking up the bill before the Judiciary Com- mittee has reported it because of the importance of completing our hearings by the August recess. I will say to my colleagues of the com- mittee I have discussed this with the chairman of the Judiciary Com- mittee and both of the ranking members of the subcommittee that is considering this, and they are glad that we are moving as rapidly as
Recommended publications
  • Allen W. Dulles and the CIA
    THE GILDED AGE Allen W. Dulles and the CIA Allen W. Dulles spent his tenure as the Director of Central Intelligence (DCI) entrenched in secret power struggles that would ensure his ultimate power over the foreign and domestic aff airs for the United States. Th roughout his childhood, Dulles learned to use political power in order to get ahead, and to use secrecy to make unilateral deci- sions. Aft er analyzing examples of his treatment of various foreign aff airs disasters, as well as his manipulation of American media and politicians, Dulles is exposed as a man whose legacy lives in the CIA, as a legendary fi gure who is in fact much more of a craft ed legend than a man of truth. By Sada O. Stewart ‘16 Princeton University of the CIA’s own making, the product of the publicity and the political propaganda Allen Dulles manufactured in the 1950s.”4 How, though, did Dulles craft a fl awless, genius im- age for the CIA? What methods did Dulles use to manipulate the press, the public, and even the other branches of govern- ment to bring forth an agency with “a great reputation and a terrible record?”5 Dulles made the CIA seem like an elite agency full of top agents resulting in high risk, high reward missions—how is this reconciled with the reality of the CIA under Dulles’ reign? INTELLIGENCE IN YOUTH To begin, it is vital to identify the signifi cance of developing and running an intelligence agency in an open democratic system.6 Sun Tzu, author of Th e Art of War, insists the best A Bas-relief of Allen Dulles at the Original Headquarters of (only) way to fi ght a war is to know the enemy.
    [Show full text]
  • GENERAL BERNARD A. SCHRIEVER AIR FORCE ASSOCIATION LOS ANGELES CHAPTER 147 from the President…
    GENERAL BERNARD A. SCHRIEVER AIR FORCE ASSOCIATION LOS ANGELES CHAPTER 147 From the President…. Dear Members of the AFA General Bernard A. Schriever Los Angeles Chapter: The missions of your Air Force Association are to Educate the public on the importance of Aerospace Power; to Advocate Aerospace Power to the public and to our elected repre- sentatives; and to Support the Air Force and the Air Force family. The Schriever Chapter tends to emphasize the Support mission, through varied forms of philanthropy (AFROTC grants, Enlisted and Company Grade Officer scholarships, donations to the Los Angeles Air Force Spouses’ Club, donations to local high schools competing in AFA’s CyberPatriot initia- tive, and many others), and by annually recognizing the outstanding achievements of the men and women of the Space & Missile Systems Center. This quarter the chapter was very active in both the education and the recognition as- pects of the Support mission, as detailed in several articles below. We honored AFROTC ca- dets at UCLA and Community College of the Air Force (CCAF) graduates at SMC. We pre- sented the Schriever Award to Secretary of the Air Force Michael B. Donley, and a Schriever Fellowship Award to SMC Vice Commander Brig Gen Roger W. Teague, as part of the annual AFA Salute to SMC. In addition, the Chapter Board of Directors elected Marcia Peura to the Board as the new Chapter Secretary, and she is doing a great job. Marcia takes over from Barby Kollenda, who retired from Lockheed Martin and from the Board last year, but volunteered to stay on until we could find a replacement – no small task, as Barby has flawlessly handled a number of disparate tasks for the chapter during her years of service.
    [Show full text]
  • The NAMTA Journal
    The NAMTA Journal Back To The Future Volume 45. Number 1 May 2021 Molly OʼShaughnessy Jacqui Miller Kimberlee Belcher-Badal Ph.D. Robyn MilosGregory MacDonald Jennifer ShieldsJacquie Maughan Lena WikramaratneAudrey Sillick Gerard Leonard Kathleen Allen Jim RobbinsDeborah Bricker Dr. Maria Montessori Mario M. Montessori A.M. Joosten Mary Black Verschuur Ph.D. John McNamara David Kahn TABLE OF CONTENTS BACK TO THE FUTURE:WHY MONTESSORI STILL MATTERS …………..………….…….7 Molly O’Shaughnessy THE RETURN TO SCIENTIFIC PEDAGOGY: EMBRACING OUR ROOTS AND RESPONSIBILITIES……………………………………………………………………….33 Jacqui Miller and Kimberlee Belcher-Badal Ph.D. IN REMEMBRANCE………………………………..……………..……………………...53 Deborah Bricker TRIBUTE TO ANNETTE HAINES…………………..……………..……………………....56 Robyn Milos TRIBUTE TO KAY BAKER………………………..……………..…………………….... 59 Gregory MacDonald TRIBUTE TO JOEN BETTMANN………………..………………..………………………..62 Jennifer Shields GUIDED BY NATURE…………….…………..………….……..………………………..66 Jacquie Maughan THE CHILD IN THE WORLD OF NATURE…….………..…………………………..69 Lena Wikramaratne SOWING THE SEEDS OF SCIENCE:OUR GIFT TO THE FUTURE…………………...78 Audrey Sillick EXPERIENCES IN NATURE:RESOLUTE SECOND-PLANE DIRECTIONS……….……...88 TOWARD ERDKINDER Gerard Leonard and Kathleen Allen 2 The NAMTA Journal • Vol. 44, No. 1 • Winter 2020 ECOPSYCHOLOGY:HOW IMMERSION IN NATURE AFFECTS YOUR HEALTH……….107 TOWARD ERDKINDER Jim Robbins SILENCE AND LISTENING ……………………..………………...……..………….…….115 Gerard Leonard ABOUT THE IMPORTANCE AND THE NATURE OF THE SILENCE GAME…………………………………..………………...………………….. 117
    [Show full text]
  • Center for Cryptologic History Publications Lili33-P.L
    I) 1 > 1 -F.L. gt-?P D@@Z& 3021101 REF ID:. Center for Cryptologic History Brochures Use this form to order a copy of any of these publications. [All brochures are unclassified] Solving the Enigma: History of the Cryptanalytic Bombe Traces the history of the development of the cryptanalytic Bombe during WWII. It discusses the history of the Bombe from the time the Poles solved the Enigma, through the British involvement in developing the machine, the Navy contract with National Cash Register Corp. to build an American version, and, finally, the Allied successes against German U-boats in the North Atlantic. The Start of the Digital Revolution: SIGSALY - Secure Digital Voice Communications in World War I1 A brief overview of the revolutionary effort to provide secure voice communications for high-level government officials. Army Security Agency Aerial Reconnaissance: Mission and Sacrifice. Describes the use of Army aircraft for DIF and ELlNT collection, primarily during the Vietnam War. Sharing the Burden: Women in Cryptology during World War 11. A brief look at the contributions and sacrifices made by women as civilian and military cryptologists during WWII. American Cryptology: Two Centuries of Tradition A synopsis of the role of cryptology in the American Revolution, Civil War, interwar period, and World Wars, and concluding with the establishment of the National Security Agency. The Cipher Disk ppproved for Release by NSA on 08-1 7-2006, FOlA Case # - - d.2848 -- -- - - -- - - -- - - -- - - Invented in Italy sometime before 1470, the cipher disk represented a breakthrough in ease of encipherment and decipherment. This basic invention survived to be used until several years after the First World War.
    [Show full text]
  • NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC.
    [Show full text]
  • 2003 Iraq War: Intelligence Or Political Failure?
    2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? A Thesis submitted to the Faculty of The School of Continuing Studies and of The Graduate School of Arts and Sciences in partial fulfillment of the requirements for the degree of Master of Arts in Liberal Studies By Dione Brunson, B.A. Georgetown University Washington, D.C. April, 2011 DISCLAIMER THE VIEWS EXPRESSED IN THIS ACADEMIC RESEARCH PAPER ARE THOSE OF THE AUTHOR AND DO NOT REFLECT THE OFFICIAL POLICIES OR POSITIONS OF THE U.S. GOVERNMENT, DEPARTMENT OF DEFENSE, OR THE U.S. INTELLIGENCE COMMUNITY. ALL INFORMATION AND SOURCES FOR THIS PAPER WERE DRAWN FROM OPEN SOURCE MATERIALS. ii 2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? Dione Brunson, B.A. MALS Mentor: Ralph Nurnberger, Ph.D. ABSTRACT The bold U.S. decision to invade Iraq in 2003 was anchored in intelligence justifications that would later challenge U.S. credibility. Policymakers exhibited unusual bureaucratic and public dependencies on intelligence analysis, so much so that efforts were made to create supporting information. To better understand the amplification of intelligence, the use of data to justify invading Iraq will be explored alongside events leading up to the U.S.-led invasion in 2003. This paper will examine the use of intelligence to invade Iraq as well as broader implications for politicization. It will not examine the justness or ethics of going to war with Iraq but, conclude with the implications of abusing intelligence. iii ACKNOWLEDGMENTS Thank you God for continued wisdom. Thank you Dr. Nurnberger for your patience. iv DEDICATION This work is dedicated to Mom and Dad for their continued support.
    [Show full text]
  • Conversation Number 39-1 Portion of a Telephone Conversation Between
    Conversation Number 39-1 Portion of a telephone conversation between the President and Henry A. Kissinger. This portion was recorded on May 24, 1973 at an unknown time between 1:27 and 1:29 p.m. [This conversation is cross-referenced with conversation 440-35.] The National Archives and Records Administration prepared the following log of this conversation. Watergate -White House response -White Paper -National security Conversation Number 39-4 Portion of a telephone conversation between the President and Hugh Scott. This portion was recorded on May 24, 1973 between 1:36 and 1:38 p.m. [This conversation is cross-referenced with conversation 440-38.] The National Archives and Records Administration prepared the following log of this conversation. Watergate -Scott's actions, May 23 -Ronald L. Ziegler Scott's schedule Watergate -White House response -National security -Effect on United States foreign policy -Scott's possible statement -Scott's statement, May 23 Conversation Number 39-5 Portion of a telephone conversation between the President and Leslie C. Arends. This portion was recorded on May 24, 1973 between 1:39 and 1:40 p.m. [This conversation is cross- referenced with conversation 440-39.] The National Archives and Records Administration prepared the following log of this conversation. Watergate -Republican congressmen's morale -White House response -White Paper -National security -Effect on United States foreign policy Conversation Number 39-16 Portions of a telephone conversation between the President and Alexander M. Haig, Jr. These portions were recorded on May 25, 1973 at an unknown time between 12:58 and 1:25 a.m.
    [Show full text]
  • 9 Purple 18/2
    THE CONCORD REVIEW 223 A VERY PURPLE-XING CODE Michael Cohen Groups cannot work together without communication between them. In wartime, it is critical that correspondence between the groups, or nations in the case of World War II, be concealed from the eyes of the enemy. This necessity leads nations to develop codes to hide their messages’ meanings from unwanted recipients. Among the many codes used in World War II, none has achieved a higher level of fame than Japan’s Purple code, or rather the code that Japan’s Purple machine produced. The breaking of this code helped the Allied forces to defeat their enemies in World War II in the Pacific by providing them with critical information. The code was more intricate than any other coding system invented before modern computers. Using codebreaking strategy from previous war codes, the U.S. was able to crack the Purple code. Unfortunately, the U.S. could not use its newfound knowl- edge to prevent the attack at Pearl Harbor. It took a Herculean feat of American intellect to break Purple. It was dramatically intro- duced to Congress in the Congressional hearing into the Pearl Harbor disaster.1 In the ensuing years, it was discovered that the deciphering of the Purple Code affected the course of the Pacific war in more ways than one. For instance, it turned out that before the Americans had dropped nuclear bombs on Japan, Purple Michael Cohen is a Senior at the Commonwealth School in Boston, Massachusetts, where he wrote this paper for Tom Harsanyi’s United States History course in the 2006/2007 academic year.
    [Show full text]
  • Intelligence Legalism and the National Security Agency's Civil Liberties
    112 Harvard National Security Journal / Vol. 6 ARTICLE Intelligence Legalism and the National Security Agency’s Civil Liberties Gap __________________________ Margo Schlanger* * Henry M. Butzel Professor of Law, University of Michigan. I have greatly benefited from conversations with John DeLong, Mort Halperin, Alex Joel, David Kris, Marty Lederman, Nancy Libin, Rick Perlstein, Becky Richards, and several officials who prefer not to be named, all of whom generously spent time with me, discussing the issues in this article, and many of whom also helped again after reading the piece in draft. I would also like to extend thanks to Sam Bagenstos, Rick Lempert, Daphna Renan, Alex Rossmiller, Adrian Vermeule, Steve Vladeck, Marcy Wheeler, Shirin Sinnar and other participants in the 7th Annual National Security Law Workshop, participants at the University of Iowa law faculty workshop, and my colleagues at the University of Michigan Legal Theory Workshop and governance group lunch, who offered me extremely helpful feedback. Jennifer Gitter and Lauren Dayton provided able research assistance. All errors are, of course, my responsibility. Copyright © 2015 by the Presidents and Fellows of Harvard College and Margo Schlanger. 2015 / Intelligence Legalism and the NSA’s Civil Liberties Gaps 113 Abstract Since June 2013, we have seen unprecedented security breaches and disclosures relating to American electronic surveillance. The nearly daily drip, and occasional gush, of once-secret policy and operational information makes it possible to analyze and understand National Security Agency activities, including the organizations and processes inside and outside the NSA that are supposed to safeguard American’s civil liberties as the agency goes about its intelligence gathering business.
    [Show full text]
  • Gary Powers Slide
    95th ERAU Prescott Aviation History Presentation THE U-2 INCIDENT: A SON'S SEARCH FOR THE Spy Pilot TRUTH Francis Gary Powers Jr. is the son of Francis Gary and Claudia “Sue” Powers. Gary holds a Bachelor of Arts Degree in Philosophy from California State University, Los Angeles, and a Master’s Degree in Public Administration / Certification in Non-profit Management from George Mason University (GMU), Fairfax, Virginia. He will graduate this year with his Master’s Degree in U.S. History from Adams State University, Alamosa, CO. Gary is the Founder and Chairman Emeritus of The Cold War Museum, a 501(c) (3) charity located at Vint Hill, VA 45 minutes west of Washington, DC. He founded the museum in 1996 to honor Cold War veterans, preserve Cold War history, and educate future generations about this time period. As Chairman of the Presidential Advisory Committee for the Cold War Theme Study he works with the National Park Service and leading Cold War experts to identify historic Cold War sites for commemorating, interpreting, and preservation. Recently, he consulted for a JOIN US AS WE HEAR FRANCIS GARY Steven Spielberg Cold War thriller, Bridge of Spies, about James Donovan who brokered the 1962 spy exchange POWERS, JR. DISCUSS SPIELBERG’S MOVIE between KGB spy Rudolph Abel and CIA U-2 pilot Francis Gary Powers, Sr. BRIDGE OF SPIES, THE CONTROVERSERY THAT SURROUNDED THE U-2 INCIDENT, AND WHAT IT WAS LIKE TO BE HELD IN SOVIET Gary is the author of Letters from a Soviet Prison (2017) and Spy Pilot (2019) CAPTIVITY DURING THE COLD WAR NOV.
    [Show full text]
  • Daniel Ellsberg
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 101038A 10 July 2017 JOHN GREENEWALD Dear Mr. Greenewald: This is our final response to your Freedom of Information Act (FOIA) request of 6 March 2017 for Intellipedia entries on "PENTAGON PAPERS" and/ or "Daniel Ells berg" and/ or "Daniel Sheehan" as well as any search results pages. A copy of your request is enclosed. As stated in our initial response to you, dated 7 March 20 17, your request was assigned Case Number 101038. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the provisions of the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD.
    [Show full text]
  • Xerox University Microfilms
    INFORMATION TO USERS This material was produced from a microfilm copy of the original document. While the most advanced technological means to photograph and reproduce this document have been used, the quality is heavily dependent upon the quality of the original submitted. The following explanation of techniques is provided to help you understand markings or patterns which may appear on this reproduction. 1.The sign or "target" for pages apparently lacking from the document photographed is "Missing Page(s)". If it was possible to obtain the missing page(s) or section, they are spliced into the film along with adjacent pages. This may have necessitated cutting thru an image and duplicating adjacent pages to insure you complete continuity. 2. When an image on the film is obliterated with a large round black mark, it is an indication that the photographer suspected that the copy may have moved during exposure and thus cause a blurred image. You will find a good image of the page in die adjacent frame. 3. When a map, drawing or chart, etc., was part of the material being photographed the photographer followed a definite method in "sectioning" the material. It is customary to begin photoing at die upper left hand corner of a large sheet and to continue photoing from left to right in equal sections with a small overlap. If necessary, sectioning is continued again — beginning below the first row and continuing on until complete. 4. The majority of users indicate that the textual content is of greatest value, however, a somewhat higher quality reproduction could be made from "photographs" if essential to the understanding of the dissertation.
    [Show full text]