National Security Agency/Central Security Service

Total Page:16

File Type:pdf, Size:1020Kb

National Security Agency/Central Security Service Description of document: National Security Agency/Central Security Service (NSA/CSS) United States Cryptologic History, Special Series Crisis Collection Volume 2, The Suez Crisis: A Brief Comint History, 1988 Interagency Security Classification Appeals Panel (ISCAP) appeal 2013 ISCAP release date: 05-March-2018 Posted date: 14-May-2018 Source of document: Mandatory Declassification Review Request National Security Agency NSC/CSS MDR Appeal Authority DJ5 National Security Agency 9800 Savage Road STE 6881 Fort George G. Meade, MD 20755-6881 The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. Interagency Security Classification Appeals Panel EXECUTIVE SECRETARY MEMBERS c/o Infonnation Security Oversight Office 700 Pennsylvania Avenue, N .W., Room 100 Mark A. Bradley, DEPARTMENT OF DEFENSE Director Garry P. Reid Washington, D.C. 20408 INFORMATION SECURITY DEPARTMENT OF JUSTICE Telephone: (202) 357-5250 OVERSIGHT OFFICE Lionel Kennedy DEPARTMENT OF STATE Fax: (202) 357-5907 Eric F. Stein E-mail: [email protected] OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE Patricia M. Gaviria NATIONAL ARCHIVES AND RECORDS ADMINISTRATION David Mengel NATIONAL SECURITY COUNCIL John P. Fitzpatrick, Chair March 5, 2018 Reference: ISCAP Appeal No. 2013-117 NSA MDR No. 68546/Appeal 3756 Please be advised that the Interagency Security Classification Appeals Panel (ISCAP) has concluded its consideration of the mandatory declassification review appeal number 2013-117 filed by you and that the 60-day period during which an agency head may appeal an ISCAP decision to the President has expired. Enclosed is a copy of the document and a chart that outlines the ISCAP decision. With the exception of any information that is otherwise authorized and warranted for withholding under applicable law, we are releasing all information declassified by the ISCAP to you. If you have questions about this appeal, please contact William C. Carpenter at (202) 357-5250. Sincerely, f'fn ~A. p,,Jly MARK A. BRADLEY Executive Secretary Enclosures Cc: Mr. Steven E. Thompson; Chief, Strategy, Plans and Policy; National Security Agency special series TOP SECRET crisis collection .. volume 2 united states cryptologic history The Suez Crisis: A Bri.ef Comint History (U) DECLASSIFIED UNDER AUTHORITY OF THE INTERAGENCY SECURITY CLASSIFICATION APPEALS PANEL, E.O. 13526, SECTION 5.3(b)(3) ISCAP APPEAL NO. 2013-117, document no. 1 DECLASSIFICATION DATE: March 05, 2018 THIS DOCUMENT CONTAINS CODEWORD MATERIAL NOT RELEASABLE TO FOREIGN NATIONALS Classified By NSAJCSSM 123-2 Declassif-tOn: Originating Agency's Determination Required national security agency central security service TOP SECRET a Contents o( this publication should not be reproduced, or further disseminated outside the U.S. Intelligence Community without the pennisaion of the Director. NSA/CSS. Inquiries about reproduction and dissemination should be direct.eel to the Office of Cryptologic Arebives and History, T64. "f8P SECRET UMBRA UNITED STATES CRYPTOLOGIC HISTORY Special Series Crisis Collection Volumie2 The Suez Crisis: A Brief Comint History (U) Withheld from public release under the National Security Act of 1959, 50 U.S.C. 3605 (P.L. 86-36) OFFICE OF ARCHIVES AND HISTORY NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE 1988 TOP SECRET UMBRA NOT RELEASABLE TO FOREIGN NATJONALS a UNCLASSIFIED Table of Contents Page Foreword -------.. -----'----------.. ---------·---------------------------- 'V Background ------------------------------------------------------------------------- L The Rise of Nasser --------------------------------------------- :3 A Search for Weapons ------------------­ 4 The Soviet Factor - ------------------------------- 8 Soviet Surprise and Vacillation ------------------ 11 Nasser's Answer to Superpower Ambivalence 11 Israel Grows Anxious ----- ----------- -----------------­ 12 British-French Fears - Real and Imagined ----------------------------------------------- 12 Eisenhower as Peacemaker ----------------------------------- 1:-1 NSA Spots a Plot ---------------------------------------------- 16 The Plot Thickens -----------------------------------------­ 17 Contradiction ---------------------------------------- 19 Attack ----·------------------- ______________ _ 20 Not with a Bang, But a Wimper ---------------------------­ 28 Suez: A Sobering Reflection for Politics and Intelligence ------------------ 24 Shift in Perspective -- ----------------------------------------------------­ 24 NSA's Performance ---------------------------------------------- ·------------------. --- 28 A Diligent, Delicate Endeavor --------------------------------­ ----------------- 29 Lessons Learned, Lessons Ignored -------------------------------------------- 31 Notes --------------- ---------------------------------------------- 33 iii UNCLASSIFIED T6P SECRET UMBRA Withheld from public release under the Foreword National Security Act of 1959, 50 U.S.C. ( 3605 (P.L. 86-36) ~-NF) The Suez Crisis is another addition to the Special Series Crisis Collection published by the NSA History and Publications Division. The Suez crisis of 1956 is an interesting study of U.S. intelligence, especially its Sigint aspect, during a "brushfire" situation. The crisis prei;ented United States policymakers with a unique intelligence dilemma. Two U.S. allies, Britain and France, opposed American policy objectives, Working with Israel, they conspired to take the Suez Canal and preserve their influence in the area. This. study, by I I provides remarkable insights into Anglo­ American relations, U.S. relations with Egypt, France, and [srael, and American concerns over the· Soviet Union and its reaction to the crisis; The study is based c,n a review of over three thousand intercepted messages. ~-NF) Ms.! !traces the crisis from its historical roots with the construction of the Suez Canal in 1869 through the rise of Nasser to negotiations over arms and aid in constructing the Aswan Dam, to Nasser's nationalization of the Suez Canal Company, to British-French-Israeli plots, to the actual invasion. She clearly shows that "the attack • occurred without our knqwledge and came as a complete surprise to 4s" - despite President Eisenhower's public statements to the contrary. U.S. intelligence, especially Sigint, provided key clues to the coming offensive: U.S. Comint closely followed the allied invasion and closely monitored Soviet reaction. ! !study also reveals that despite British-United States estrangement, the United States was dependent on British collection efforts on most Middle East targets and that the close working relationship between the Anglo poseurs in the Sigint area was never seriously threatened. In fact, during the height of the crisis U.S. and British elements continued to exchange the most sensitive information. I !study is an important contribution to our understanding of the Second Party relationship and to the use of Sigir;it in a brushfire situation. Henry F. Schorreck NSA Hist.orian v TOP SECRET UMBRA NOT RELEASABLE TO FOREIGN NATIONALS l'6P 51:CRl:'f UMBRA • The Suez Crisis: A Brief Comint History Withheld from public release under the National Security Act of 1959, 50 U.S.C. 3605 (P.L. 86-36) (U) The Suez crisis of 1956, which- erupted only days before the S011iet in11asion of Hungar;y on 4 November, was the first major test of the National Security Agency (NSA) during a short-term, "brU8h/iren crisis. The war for Suez also presented th~ United States with. a uniqtU political and intelligence dilemma: two close U.S. allies, Britain and France, opposed American policy objectives. The Suez crisis raised many provocative questions about wh€n and how m1.1Ch the United Stat.es knew about British, French, and Israeli plan.a for the invaswn of Egypt and how U.S. officials reacted to these.plans. Jn addition, the Suez war provided a fascinating case study of the role of Communications Intelligence (Comin.t) in tlu! U.S. decision-making process. Finally, the battle for Suez served as a model for e~mining the effect of political dissension and conflict on the intimat.e Anglo-American. intelligence relation.ship. How this strange and troubling crisis developed, what role Comint played in U.S. planning and policy, and how the S1.Uz conflict a/fecte!/, Anglo-American relations are the issues this poper addresses. f,f{.CCO) Before and dwing the Suez crisis, NSA analyzed more than three thousand dipltmwlic and se11en hundred military messages from Near and Middle Eastern nations as well as from other countries worldwide.1 Even coMidered
Recommended publications
  • Annual Report and Accounts 2018-19
    National Crime Agency Annual Report and Accounts 2018-19 HC 2397 National Crime Agency Annual Report and Accounts 2018-19 Annual Report presented to Parliament pursuant to paragraph 8(2) of Schedule 2 to the Crime and Courts Act 2013. Accounts presented to the House of Commons pursuant to Section 6(4) of the Government Resources and Accounts Act 2000. Accounts presented to the House of Lords by Command of Her Majesty. Ordered by the House of Commons to be printed on 22 July 2019. HC 2397 © Crown copyright 2019 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence/version/3. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at www.gov.uk/official-documents. Any enquiries regarding this publication should be sent to National Crime Agency, Command Suite, Unit 1, Spring Gardens, Tinworth Street, London, SE11 5EN. ISBN 978-1-5286-1296-8 CCS0519221654 07/19 Printed on paper containing 75% recycled fibre content minimum. Printed in the UK by the APS Group on behalf of the Controller of Her Majesty’s Stationery Office. Contents Foreword by the Home Secretary 7 Part Two – Accountability Report Part One – Performance Report Corporate Governance Report 43 Directors’ Report 43 Statement by the Director General 9 Statement of Accounting Officer’s Who we are and what we do 10 responsibilities 44 How
    [Show full text]
  • COI QUERY Disclaimer
    COI QUERY Country of Origin/Topic Lebanon Question(s) 1. Information on entry/exit requirements and procedure for Palestinians with passports 2. Information on entry/exit requirements and procedure for Palestinians without passports Date of completion 20 February 2020 Query Code Q4-2020 Contributing EU+ COI units (if applicable) Disclaimer This response to a COI query has been elaborated according to the Common EU Guidelines for Processing COI and EASO COI Report Methodology. The information provided in this response has been researched, evaluated and processed with utmost care within a limited time frame. All sources used are referenced. A quality review has been performed in line with the above mentioned methodology. This document does not claim to be exhaustive neither conclusive as to the merit of any particular claim to international protection. If a certain event, person or organisation is not mentioned in the report, this does not mean that the event has not taken place or that the person or organisation does not exist. Terminology used should not be regarded as indicative of a particular legal position. The information in the response does not necessarily reflect the opinion of EASO and makes no political statement whatsoever. The target audience is caseworkers, COI researchers, policy makers, and decision making authorities. The answer was finalised on the 20 February 2020. Any event taking place after this date is not included in this answer. 1 COI QUERY RESPONSE 1. Information on entry/exit requirements and procedure for Palestinians
    [Show full text]
  • Re Joinder Submitted by the Republic of Uganda
    INTERNATIONAL COURT OF JUSTICE CASE CONCERNING ARMED ACTIVITIES ON THE TERRITORY OF THE CONGO DEMOCRATIC REPUBLIC OF THE CONGO v. UGANDA REJOINDER SUBMITTED BY THE REPUBLIC OF UGANDA VOLUME 1 6 DECEMBER 2002 TABLE OF CONTENTS Page INTRODUCTION .................................................................... 1 CHAPTER 1 : THE PERSISTENT ANOMALIES IN THE REPLY CONCERNING MATTERS OF PROCEDURE AND EVIDENCE ............................................... 10 A. The Continuing Confusion Relating To Liability (Merits) And Quantum (Compensation) ...................... 10 B. Uganda Reaffirms Her Position That The Court Lacks Coinpetence To Deal With The Events In Kisangani In June 2000 ................................................ 1 1 C. The Courl:'~Finding On The Third Counter-Claim ..... 13 D. The Alleged Admissions By Uganda ........................... 15 E. The Appropriate Standard Of Proof ............................. 15 CHAPTER II: REAFFIRMATION OF UGANDA'S NECESSITY TO ACT IN SELF- DEFENCE ................................................. 2 1 A. The DRC's Admissions Regarding The Threat To Uganda's Security Posed By The ADF ........................ 27 B. The DRC's Admissions Regarding The Threat To Uganda's Security Posed By Sudan ............................. 35 C. The DRC's Admissions Regarding Her Consent To The Presetnce Of Ugandan Troops In Congolese Territory To Address The Threats To Uganda's Security.. ......................................................................4 1 D. The DRC's Failure To Establish That Uganda Intervened
    [Show full text]
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • Mass Surveillance
    Thematic factsheet1 Update: July 2018 MASS SURVEILLANCE The highly complex forms of terrorism require States to take effective measures to defend themselves, including mass monitoring of communications. Unlike “targeted” surveillance (covert collection of conversations, telecommunications and metadata by technical means – “bugging”), “strategic” surveillance (or mass surveillance) does not necessarily start with a suspicion against a particular person or persons. It has a proactive element, aimed at identifying a danger rather than investigating a known threat. Herein lay both the value it can have for security operations, and the risks it can pose for individual rights. Nevertheless, Member States do not have unlimited powers in this area. Mass surveillance of citizens is tolerable under the Convention only if it is strictly necessary for safeguarding democratic institutions. Taking into account considerable potential to infringe fundamental rights to privacy and to freedom of expression enshrined by the Convention, Member States must ensure that the development of surveillance methods resulting in mass data collection is accompanied by the simultaneous development of legal safeguards securing respect for citizens’ human rights. According to the case-law of the European Court of Human Rights, it would be counter to governments’ efforts to keep terrorism at bay if the terrorist threat were substituted with a perceived threat of unfettered executive power intruding into citizens’ private lives. It is of the utmost importance that the domestic legislation authorizing far-reaching surveillance techniques and prerogatives provides for adequate and sufficient safeguards in order to minimize the risks for the freedom of expression and the right to privacy which the “indiscriminate capturing of vast amounts of communications” enables.
    [Show full text]
  • Suez 1956 24 Planning the Intervention 26 During the Intervention 35 After the Intervention 43 Musketeer Learning 55
    Learning from the History of British Interventions in the Middle East 55842_Kettle.indd842_Kettle.indd i 006/09/186/09/18 111:371:37 AAMM 55842_Kettle.indd842_Kettle.indd iiii 006/09/186/09/18 111:371:37 AAMM Learning from the History of British Interventions in the Middle East Louise Kettle 55842_Kettle.indd842_Kettle.indd iiiiii 006/09/186/09/18 111:371:37 AAMM Edinburgh University Press is one of the leading university presses in the UK. We publish academic books and journals in our selected subject areas across the humanities and social sciences, combining cutting-edge scholarship with high editorial and production values to produce academic works of lasting importance. For more information visit our website: edinburghuniversitypress.com © Louise Kettle, 2018 Edinburgh University Press Ltd The Tun – Holyrood Road, 12(2f) Jackson’s Entry, Edinburgh EH8 8PJ Typeset in 11/1 3 Adobe Sabon by IDSUK (DataConnection) Ltd, and printed and bound in Great Britain. A CIP record for this book is available from the British Library ISBN 978 1 4744 3795 0 (hardback) ISBN 978 1 4744 3797 4 (webready PDF) ISBN 978 1 4744 3798 1 (epub) The right of Louise Kettle to be identifi ed as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988, and the Copyright and Related Rights Regulations 2003 (SI No. 2498). 55842_Kettle.indd842_Kettle.indd iivv 006/09/186/09/18 111:371:37 AAMM Contents Acknowledgements vii 1. Learning from History 1 Learning from History in Whitehall 3 Politicians Learning from History 8 Learning from the History of Military Interventions 9 How Do We Learn? 13 What is Learning from History? 15 Who Learns from History? 16 The Learning Process 18 Learning from the History of British Interventions in the Middle East 21 2.
    [Show full text]
  • Offensive Capabilities
    GCHQ and UK Mass Surveillance Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and its allies, including the UK’s GCHQ.i The global surveillance infrastructure and hacking tools described in the previous chapters are not only used for obtaining information to be fed into intelligence reports and tracking terrorists. The agencies are also developing cyber-warfare capabilities, with the NSA taking the lead within the US armed forces. This militarisation of the internet saw U.S. intelligence services carried out 231 offensive cyber-operations in 2011ii. The UK's National Strategic Defence and Security Review from 2010 made hostile attacks upon UK cyberspace a major priorityiii. It is fair to assume that many countries are following suit and building cyber-warfare capabilities. Der Spiegel terms the development of these aggressive hacking tools as Digital Weapons. In their view D weapons which should join the ABC (Atomic, Biological and Chemical) weapons of the 20th century because of their indiscriminate nature. Here lies a fundamental problem. The modern world with connected global communications networks means that non-state actors such as civilians and businesses are now affected by the agencies’ activities much more frequently than before. The internet is used by everyone – cyberspace is mainly a civilian space – and the opportunity for collateral damage is huge. The papers leaked to Der Spiegel appear to show that signal agencies have little regard for the security and wellbeing of anyone who gets caught in the path of their operations.
    [Show full text]
  • I,St=-Rn Endorsedb~ Chief, Policy, Information, Performance, and Exports
    NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY 2-4 Issue Date: IO May 20 I 9 Revised: HANDLING OF REQUESTS FOR RELEASE OF U.S. IDENTITIES PURPOSE AND SCOPE This policy, developed in consultation with the Director of National Intelligence (DNI), the Attorney General, and the Secretary of Defense, implements Intelligence Community Policy Guidance I 07 .1 , "Requests for Identities of U.S. Persons in Disseminated Intelligence Reports" (Reference a), and prescribes the policy, procedures, and responsibilities for responding to a requesting entity, other than NSA/CSS, for post-publication release and dissemination of masked US person idenlity information in disseminated serialized NSA/CSS reporting. This policy applies exclusively to requests from a requesting entity, other than NSA/CSS, for post-publication release and dissemination of nonpublic US person identity information that was masked in a disseminated serialized NSA/CSS report. This policy does not apply in circumstances where a U.S. person has consented to the dissemination of communications to, from, or about the U.S. person. This policy applies to all NSA/CSS personnel and to all U.S. Cryptologic System Government personnel performing an NSA/CSS mission. \ This policy does not affect any minimization procedures established pursuant to the Foreign Intelligence Surveillance Act of 1978 (Reference b), Executive Order 12333 (Reference £), or other provisions of law. This policy does not affect the requirements established in Annex A, "Dissemination of Congressional Identity Information," of Intelligence Community Directive 112, "Congressional Notification" (Reference d). ~A General, U.S. Army Director, NSA/Chief, CSS i,st=-rn Endorsedb~ Chief, Policy, Information, Performance, and Exports NSA/CSS Policy 2-4 is approved for public release.
    [Show full text]
  • War and Diplomacy: the Suez Crisis
    1 Professor Pnina Lahav, Boston University School of Law C.) Please do not use, quote or distribute without author’s permission War and Diplomacy: The Suez Crisis 1. Introduction Stephen M. Griffin, Long Wars and the Constitution, and Mariah Zeisberg’s War Powers, are two remarkable books that certainly deserve an entire symposium devoted to them. These books complement each other in the same way that the war powers, some vested in Congress and others in the President, are in correspondence with each other. Griffin’s book revolves around the history of the war powers since 1945, and in this sense is more empirical. Its thesis is that the cold war and Truman’s subsequent decision to launch the war in Korea destabilized American constitutionalism. In the following decades the United States has found itself confronting an endless string of constitutional crises related to the deployment of troops abroad, and the quest for a formula to resolve the constitutional puzzles is as strong as ever. Zeisberg’s book, which took advantage of the fact that Griffin’s book preceded it, is more normative, even though it should be emphasized that Griffin also offers important normative insights. Both books are anchored in democratic theory in that they emphasize the cardinal significance of inter-branch deliberation. Both endorse the notion that the implicit assumption underlying the text of the Constitution is that while the war powers are divided between the legislative and executive branches, these institutions are expected to deliberate internally as well as externally when confronting the critical matter of war.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • Utah Data Center, As Well As Any Search Results Pages
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 84688A 2 May 2017 JOHN GREENEWALD Dear Mr. Greenewald : This responds to your Freedom of Information Act (FOIA) request of 14 June 2016 for Intellipedia pages on Boundless Information and/or BOUNDLESS INFORMANT and/or Bull Run and/or BULLRUN and/or Room 641A and/ or Stellar Wind and/ or Tailored Access Operations and/ or Utah Data Center, as well as any search results pages. A copy of your request is enclosed. As stated in our previous response, dated 15 June 2016, your request was assigned Case Number 84688. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD.
    [Show full text]
  • Improving Counterterrorism and Law Enforcement Cooperation Between the United States and the Arab Gulf States
    Improving Counterterrorism and Law Enforcement Cooperation between the United States and the Arab Gulf States Thomas Warrick and Joze Pelayo Scowcroft Middle East Security Initiative The Atlantic Council’s Scowcroft Middle East Security Initiative honors the legacy of Brent Scowcroft and his tireless efforts to build a new security architecture for the region. Our work in this area addresses the full range of security threats and challenges including the danger of interstate warfare, the role of terrorist groups and other nonstate actors, and the underlying security threats facing countries in the region. Through all of the Council’s Middle East programming, we work with allies and partners in Europe and the wider Middle East to protect US interests, build peace and security, and unlock the human potential of the region. You can read more about our programs at www.atlanticcouncil.org/ programs/middle-east-programs/. Task Force on Mideast Counterterrorism – Law Enforcement Cooperation ■ Javed Ali, Towsley Policymaker in Residence, Gerald R. Ford School of Public Policy, University of Michigan ■ Kirsten Fontenrose, Director, Scowcroft Middle East Security Initiative, Atlantic Council ■ Daniel L. Glaser, Principal, Financial Integrity Network ■ Bernard Hudson, Nonresident Fellow, Belfer Center for Science and International Affairs ■ Michael McGarrity, Vice President Global Risk Services, Global Guardian ■ Pamela G. Quanrud, Former Director, C-ISIL Coalition, US Department of State ■ Todd Rosenblum, Nonresident Senior Fellow, Scowcroft Center
    [Show full text]