CIA's Relationship with Congress, 1946–2004 L. Britt Snider

Total Page:16

File Type:pdf, Size:1020Kb

CIA's Relationship with Congress, 1946–2004 L. Britt Snider THE AGENCY AND THE HILL: CIA’s Relationship with Congress, 1946–2004 L. Britt Snider The Center for the Study of Intelligence CSI was founded in 1974 in response to Director of Central Intelli- gence James Schlesinger’s desire to create within CIA an organiza- tion that could “think through the functions of intelligence and bring the best intellects available to bear on intelligence problems.” The center, comprising professional historians and experienced practitio- ners, attempts to document lessons learned from past operations, explore the needs and expectations of intelligence consumers, and stimulate serious debate on current and future intelligence chal- lenges. To support these activities, CSI publishes Studies in Intelligence and books and monographs addressing historical, operational, doctri- nal, and theoretical aspects of the intelligence profession. It also administers the CIA Museum and maintains the Agency’s Historical Intelligence Collection. Comments and questions may be addressed to: Center for the Study of Intelligence Central Intelligence Agency Washington, DC 20505 Printed copies of this book are available to requesters outside the US government from: Government Printing Office (GPO) Superintendent of Documents PO Box 391954 Pittsburgh, PA 15250-7954 Phone (202) 512-1800 E-mail: [email protected] ISBN: 978-1-929667-17-8 GPO Stock#: 04101500257-1 All statements of fact, opinion, or analysis expressed in this book are those of the author. They do not necessarily reflect official posi- tions of the Central Intelligence Agency or any other US government entity, past or present. Nothing in the contents should be construed as asserting or implying US government endorsement of the author’s factual statements and interpretations. THE AGENCY AND THE HILL The Center for the Study of Intelligence Central Intelligence Agency Washington, DC 20505 Library of Congress Cataloguing-in-Publications Data Snider, L. Britt The Agency and the Hill:CIA’s Relationship with Congress, 1946–2004/ L. Britt Snider Includes bibliographic references, index. ISBN 978-1-929667-17-8 (pbk.:alk paper) 1. Intelligence—United States. 2. Congress. 3. Intelligence history. 4. Intelligence oversight. 5. Intelligence organization. 6. Intelligence management. 7. Intelligence policy. Typeset in Times. Printed by Imaging and Publication Support, CIA. THE AGENCY AND THE HILL: CIA’s Relationship with Congress, 1946–2004 L Britt Snider Center for the Study of Intelligence Central Intelligence Agency Washington, DC 2008 CONTENTS Preface . .xiii PART I: WHAT THE RELATIONSHIP WAS LIKE Chapter 1: THE NATURE OF THE RELATIONSHIP, 1946–76 . 3 The Central Intelligence Group (1946–47) . 3 The Early Oversight Arrangements: 1947–56 . 5 The Mansfield Resolutions: 1953–55 . 11 Debate in the Senate: 1956 . 14 Subsequent Developments: 1956–59 . 17 The Issue of GAO Audits: 1959–62 . 20 Shootdown of the U-2: 1960 . 21 The Bay of Pigs: 1961 . 21 The Remainder of the 1960s: A Period of Quiescence . 23 McCone’s Early Interaction with the Congress . 23 CIA Interaction with the Congress: 1963–66 . 25 The SFRC Asserts Its Right to Oversee the CIA: 1966 . 26 1971: A Pivotal Year . 27 Congressional Inquiries into Watergate: 1973–74 . 28 Congressional Inquiries into the CIA Activities in Chile: 1973–74 . 31 Allegations of Domestic Spying and Other Abuses: 1974–75 . 33 The Church Committee: 1975–76 . 35 The Nedzi/Pike Committees: 1975–76 . 37 AUTHOR’S COMMENTARY . 39 The Early Congressional Arrangements: 1947–76 . 39 The Joint Committee “Panacea” . 42 The Personalities, Attitudes, and Circumstances of the Early DCIs . 43 CHAPTER 2: THE RELATIONSHIP: 1976–2004 . 51 The Senate Select Committee on Intelligence: 1976 . 51 The House Permanent Select Committee on Intelligence: 1977 . 53 v CONTENTS 1977–80: The Committees Prove Themselves . 56 The Intelligence Oversight Act of 1980 . 59 The Mining of the Nicaraguan Harbors and the Casey Accords: 1984 . 60 Term Limits as an Issue for the SSCI: 1984 . 61 GAO Again: 1984 . 62 Continued Wrangling over Covert Action Notification: 1985–86 . 62 Tightening Control over Intelligence Funding: 1986 . 63 Investigating the Iran-contra Affair: 1986–87 . 64 Changes to Congressional Oversight Prompted by Iran-contra: 1987–91 . 66 GAO Audits Resurface: 1987–88 . 68 The Creation of a Statutory Inspector General for the CIA: 1989 . 68 Statutory Recognition of the Agency’s Support of Congress: 1992 . 69 Formalization of Notification Procedures: The Guatemala Inquiries, 1995 . 70 Procedures for “Whistleblowers” Who Wished to Contact Congress: 1998 . 71 The Joint Inquiry into the 9/11 Attacks: 2001–2003 . 73 Criticism from the 9/11 Commission and an End to Term Limits: 2004 . 74 AUTHOR’S COMMENTARY . 75 What Changed When the Select Committees Were Created 75 The Joint Committee Solution . 76 Term Limits for Members of the Select Committees . 77 The Impact of Personalities, Attitudes, and Circumstances . 78 CHAPTER 3: INTELLIGENCE-SHARING AND OTHER INTERACTION . 93 The Early Period: 1947–75 . 94 After the Creation of the Select Committees: 1976-2004 . 114 AUTHOR’S COMMENTARY . 120 Significance of the Incidental Interaction with Congress 120 Why Congress Needs Intelligence Support . 121 The Impact of Intelligence-Sharing with the Congress . 122 vi CONTENTS CHAPTER 4: ORGANIZATIONAL ARRANGEMENTS AT THE CIA . 125 One-Man Operations . 125 An Expanded Office of Legislative Counsel: 1976–81 . 127 Casey and Congress: 1981–86 . 128 Responding to Iran-Contra: 1986–90 . 130 Strengthening Ties to the Hill after the Guatemala Episode: 1995 . 130 The Office of Congressional Affairs: 1988–2004 . 131 AUTHOR’S COMMENTARY . 132 The Agency’s Arrangements for Dealing with the Congress . 132 PART II: WHAT THE RELATIONSHIP PRODUCED CHAPTER 5: LEGISLATION . 137 The Agency’s Original Charter: Section 202 of the National Security Act of 1947 . 137 The CIA Act of 1949 . 141 Additional Legislation: 1949–64 . 143 The Foreign Intelligence Surveillance Act of 1978 . 143 The Classified Information Procedures Act of 1980 . 145 The Intelligence Identities Protection Act of 1982 . 145 Exemption from the Freedom of Information Act for CIA: 1984 . 146 The CIA Inspector General Act of 1989 . 147 The Intelligence Reorganization Act of 1992 . 149 Naming of the Headquarters Compound: 1998 . 150 The Intelligence Reform and Terrorism Prevention Act of 2004 . 151 AUTHOR’S COMMENTARY . 153 Legislating Missions and Authorities for the CIA . 153 The President and Intelligence Legislation . 155 What Never Made It Through the Congressional Mill . 157 CHAPTER 6: PROGRAM AND BUDGET . 159 The Transition from CIG to CIA: 1946–47 . 159 Covert Action: Funding a New Mission for the Agency . 161 vii CONTENTS Interaction in the Early Years: 1948–52 . 162 Interaction during the Eisenhower Years: 1953–60 . 165 The Agency Headquarters Building: 1951–56 . 170 Developments in the 1960s and Early 1970s . 172 Consideration of the Budget Process by the Church and Pike Committees . 177 Budget Oversight by the Select Committees on Intelligence: 1977–81 . 179 Interaction During the Reagan Administration: 1981–89 . 182 The End of the Cold War and Its Effect on the Budget: 1989–95 . 184 Return to Relative Stability and Modest Increases: 1995–2000 . 186 The Impact of the 9/11 Attacks: 2001–2004 . 187 AUTHOR’S COMMENTARY . 187 Exercising Power of the Purse . 187 Hiding within the Defense Budget . 188 The Quality of Budget Oversight . 189 The Impact of Budget Oversight . 190 CHAPTER 7: OVERSIGHT OF ANALYSIS . 193 The Early Years: 1947–74 . 193 The Church and Pike Committees . 199 Early Interaction with the Select Committees: 1976–80 . 201 Later Interaction Regarding Analytical Issues: 1980–90 . 204 The Iraqi Invasion of Kuwait and the Persian Gulf War: 1990–91 . 207 The Gates Confirmation Hearings: 1991 . 210 Interaction with the Select Committees 1991– 2000 . 212 AUTHOR’S COMMENTARY . 220 The Nature of the Interaction over Analysis . 220 The Implications of Sharing Intelligence for Oversight . 222 viii CONTENTS CHAPTER 8: OVERSIGHT OF COLLECTION . 223 Early Congressional Awareness of Espionage Operations: 1947–60 . 223 Early Technical Collection: The U-2 and CORONA Programs . 227 The Cuban Missile Crisis: 1962–63 . 230 Contact with Respect to the Nosenko Case: 1967 . 231 Helms and the Leaders of the CIA Subcommittees: 1966–73 . 232 The Church Committee’s Investigation of CIA Domestic Activities: 1975–76 . 233 The Church Committee’s Look at Liaison Relationships: 1976 . 235 The Pike Committee’s Treatment of Operational Issues: 1975–76 . 236 Early Involvement of the SSCI in Operational Matters: 1976–80 . 236 Early HPSCI Involvement in Operational Matters: 1977–80 . 238 Executive Order 12333 and Limits on Domestic Activities: 1981 . 239 SSCI Inquiry into “Death Squads” in El Salvador: 1984 . 240 HPSCI Inquiry into Cuban Operations: 1987 . 241 HPSCI Inquiry into the Agency’s Relationship with Manuel Noriega: 1988 . 241 The SSCI’s Consideration of Arms Control Treaties: 1987–92 . 241 The SSCI’s Reviews of CIA Support to Military Operations: 1990–91 . ..
Recommended publications
  • Directors of Central Intelligence As Leaders of the U.S
    All statements of fact, opinion, or analysis expressed in this book are those of the author. They do not necessarily reflect official positions of the Central Intel- ligence Agency or any other US government entity, past or present. Nothing in the contents should be construed as asserting or implying US government endorsement of the authors’ factual statements and interpretations. The Center for the Study of Intelligence The Center for the Study of Intelligence (CSI) was founded in 1974 in response to Director of Central Intelligence James Schlesinger’s desire to create within CIA an organization that could “think through the functions of intelligence and bring the best intellects available to bear on intelli- gence problems.” The Center, comprising professional historians and experienced practitioners, attempts to document lessons learned from past operations, explore the needs and expectations of intelligence consumers, and stimulate serious debate on current and future intelligence challenges. To support these activities, CSI publishes Studies in Intelligence and books and monographs addressing historical, operational, doctrinal, and theoretical aspects of the intelligence profession. It also administers the CIA Museum and maintains the Agency’s Historical Intelligence Collection. Comments and questions may be addressed to: Center for the Study of Intelligence Central Intelligence Agency Washington, DC 20505 Printed copies of this book are available to requesters outside the US government from: Government Printing Office (GPO) Superintendent of Documents P.O. Box 391954 Pittsburgh, PA 15250-7954 Phone: (202) 512-1800 E-mail: [email protected] ISBN: 1-929667-14-0 The covers: The portraits on the front and back covers are of the 19 directors of central intelligence, beginning with the first, RAdm.
    [Show full text]
  • Executive Order 12036 1-11. The
    Executive~ Order 12036 Proposed Executive Order Reason for Change 1-11. The Department of Defense. 1.11 The Department of Defense. The Secretary of The Secretary of Defense Defense shall: shall: 1-1101. Collect national (a) Collect national Technical change. foreign intelligence and be foreign intelligence and be responsive to collection tasking responsive to collection tasking by the NITC. by the Director of Central · Intelligence; I I 1-1102. Collect, produce (b) Collect, produce and Technical change. and disseminate foreign military disseminate military and and military-related intelligence military-related foreign intelli­ information, including scien- · gence and counterintelligence as tific, technical, political, required for execution of the geographic and economic. informa­ Secretary's responsibilities; tion as required for execution of the Secretary's responsibilities; 1-1103. Conduct programs (c) Conduct programs and and missions necessary to fulfill missions necessary to fulfill national and tactical foreign national, departmental and intelligence requirements; tactical foreign intelligence requirements; 43 E~ecutive Order 12036 Proposed ~x e c~ t ive Orae r Reason for Change (1.11 Continued) 1-1104. Conduct counter­ (d) Conduct counter­ Unnecessary language intelligence activities in intelligence activities in eliminated. support of Department of Defense support of Department of Defense components outside the United components outside the United States in coordination with the States in coordination with the CIA, and within the United States CIA, and within the United States in coordination with the FBI in coordination with the FBI, pursuant to procedures agreed pursuant to procedures agreed upon by the Secretary of Defense upon by the Secretary of Defense and the Attorney General, and and the Attorney General; produce and disseminate counter­ intelligence studies and reports; 1-1105.
    [Show full text]
  • USA -V- Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • Barrett Brown Is Anonymous
    Case 3:12-cr-00317-L Document 90 Filed 09/04/13 Page 1 of 13 PageID 458 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF TEXAS DALLAS DIVISION ________________________________ UNITED STATES OF AMERICA § § No: 3:12-CR-317-L v. § No: 3:12-CR-413-L § No: 3:13-CR-030-L BARRETT LANCASTER BROWN § MEMORANDUM IN SUPPORT OF DEFENDANT’S OPPOSITION TO GOVERNMENT’S REQUEST FOR A GAG ORDER BARRETT LANCASTER BROWN, through his counsel, respectfully submits this memorandum to set the framework for oral argument on September 4, 2013, and to enter exhibits that Mr. Brown believes are relevant to the courts determination.1 STATEMENT OF FACTS A. Barrett Brown Barrett Lancaster Brown is a thirty-two year old American satirist, author and journalist. His work has appeared in Vanity Fair, the Guardian, Huffington Post, True/Slant, the Skeptical Inquirer and many other outlets. See Summary Chart of Select Publications by Barrett Brown, Exh. A. He is the co-author of a satirical book on creationism entitled Flock of Dodos: Behind Modern Creationism, Intelligent Design and the Easter Bunny. As described by Alan Dershowitz, Felix Frankfurter Professor of Law at Harvard Law School, “Flock of Dodos is in the great tradition of debunkers with a sense of humor, from Thomas Paine to Mark Twain.” See Flock of Dodos (book cover), Exh. B. Indeed, Mr. Brown’s use of sarcasm, humor and 1 Mr. Brown enters these exhibits, mainly consisting of articles and commentary, for limited purpose of assisting the Court’s determination in this matter, and not for the truth of the matter asserted by the statements therein.
    [Show full text]
  • Julian Assange Judgment
    JUDICIARY OF ENGLAND AND WALES District Judge (Magistrates’ Court) Vanessa Baraitser In the Westminster Magistrates’ Court Between: THE GOVERNMENT OF THE UNITED STATES OF AMERICA Requesting State -v- JULIAN PAUL ASSANGE Requested Person INDEX Page A. Introduction 2 a. The Request 2 b. Procedural History (US) 3 c. Procedural History (UK) 4 B. The Conduct 5 a. Second Superseding Indictment 5 b. Alleged Conduct 9 c. The Evidence 15 C. Issues Raised 15 D. The US-UK Treaty 16 E. Initial Stages of the Extradition Hearing 25 a. Section 78(2) 25 b. Section 78(4) 26 I. Section 78(4)(a) 26 II. Section 78(4)(b) 26 i. Section 137(3)(a): The Conduct 27 ii. Section 137(3)(b): Dual Criminality 27 1 The first strand (count 2) 33 The second strand (counts 3-14,1,18) and Article 10 34 The third strand (counts 15-17, 1) and Article 10 43 The right to truth/ Necessity 50 iii. Section 137(3)(c): maximum sentence requirement 53 F. Bars to Extradition 53 a. Section 81 (Extraneous Considerations) 53 I. Section 81(a) 55 II. Section 81(b) 69 b. Section 82 (Passage of Time) 71 G. Human Rights 76 a. Article 6 84 b. Article 7 82 c. Article 10 88 H. Health – Section 91 92 a. Prison Conditions 93 I. Pre-Trial 93 II. Post-Trial 98 b. Psychiatric Evidence 101 I. The defence medical evidence 101 II. The US medical evidence 105 III. Findings on the medical evidence 108 c. The Turner Criteria 111 I.
    [Show full text]
  • Congressional Oversight of Intelligence: Background and Selected Options for Further Reform
    Congressional Oversight of Intelligence: Background and Selected Options for Further Reform December 4, 2018 Congressional Research Service https://crsreports.congress.gov R45421 SUMMARY R45421 Congressional Oversight of Intelligence: December 4, 2018 Background and Selected Options for Further Michael E. DeVine Reform Analyst in Intelligence and National Security Prior to the establishment of the Senate Select Committee on Intelligence (SSCI) and the House Permanent Select Committee on Intelligence (HPSCI) in 1976 and 1977, respectively, Congress did not take much interest in conducting oversight of the Intelligence Community (IC). The Subcommittees on the Central Intelligence Agency (CIA) of the congressional Armed Services Committees had nominal oversight responsibility, though Congress generally trusted that IC could more or less regulate itself, conduct activities that complied with the law, were ethical, and shared a common understanding of national security priorities. Media reports in the 1970s of the CIA’s domestic surveillance of Americans opposed to the war in Vietnam, in addition to the agency’s activities relating to national elections in Chile, prompted Congress to change its approach. In 1975, Congress established two select committees to investigate intelligence activities, chaired by Senator Frank Church in the Senate (the “Church Committee”), and Representative Otis Pike in the House (the “Pike Committee”). Following their creation, the Church and Pike committees’ hearings revealed the possible extent of the abuse of authority by the IC and the potential need for permanent committee oversight focused solely on the IC and intelligence activities. SSCI and HPSCI oversight contributed substantially to Congress’s work to legislate improvements to intelligence organization, programs, and processes and it enabled a more structured, routine relationship with intelligence agencies.
    [Show full text]
  • The CIA Mandate and the War on Terror
    The CIA Mandate and the War on Terror Grant T. Harrist I. INTRODUCTION The American intelligence infrastructure is in the midst of its most radical overhaul since the formation of the modem intelligence community following World War II. The Intelligence Reform and Terrorism Prevention Act of 2004,1 the political compromise resulting from the nation's post-September 11 intelligence soul searching, has fundamentally transformed the U.S. intelligence bureaucracy. Yet the policy debate to date has paid insufficient attention to whether the fifty-eight-year-old mandate of the Central Intelligence Agency (CIA) requires amendment in light of the contemporary fight against terrorism. A primary impetus for reform of the U.S. intelligence infrastructure was the breakdown of critical distinctions upon which the division of labor among national security agencies is based. The current national security context and the war on terrorism have blurred the line between intelligence and law enforcement, and it has become hackneyed to note that terrorist plots do not observe the foreign and domestic divisions that exist in the jurisdictional duties of U.S. agencies. Still an important area of analysis has so far escaped any serious public debate or legislative attention: Do the limits of CIA authority outlined in the National Security Act of 19472 meet the needs of the modem national security environment? Policymakers should revisit the CIA's statutory mandate in light of the current struggle against terrorism in order to clarify the limits of CIA authority. t J.D. expected 2005, Yale Law School; M.P.A. expected 2005, Woodrow Wilson School of Public and International Affairs, Princeton University.
    [Show full text]
  • Cia-Wikileaks-Task-Force.Pdf
    TOP SECRET//HCS-O-P/SI//ORCON/NOFORN/FISA 17 October 2017 WikiLeaks Task Force Final Report TOP SECRET//HCS-O-P/SI//ORCON/NOFORN/FISA 17 October 2017 Memo To: Director, Central Intelligence Agency Deputy Director, Central Intelligence Agency Chief Operating Officer, Central Intelligence Agency From: WikiLeaks Task Force, Subject: WikiLeaks Task Force Final Report Executive Summary WikiLeaks’ announcement on 7 March that it possessed cyber tools from CIA’s Center for Cyber Intelligence (CCI), dubbed “Vault 7,” marked the largest data loss in CIA history. In its initial public disclosure, WikiLeaks provided the names and brief descriptions of multiple tools that CIA developed for cyber operations. Since 7 March, WikiLeaks has published more comprehensive descriptions of 35 tools, including internal CIA documents associated with each tool. — We assess that in spring 2016 a CIA employee stole at least 180 gigabytes to as much as 34 terabytes of information. This is roughly equivalent to 11.6 million to 2.2 billion pages in Microsoft Word. This data loss includes cyber tools that resided on the Center for Cyber Intelligence (CCI) software development network (DevLAN). We cannot determine the precise scope of the loss because, like other mission systemsa at that time, DevLAN did not require user activity monitoring or other safeguards that exist on our enterprise system. — — To date, WikiLeaks has released user and training guides and limited source code from two parts of DevLAN: Stash, a source code repository, and Confluence, a collaboration and communication platform. All of the documents reveal, to varying degrees, CIA’s tradecraft in cyber operations.
    [Show full text]
  • U.S. Intelligence Reform a Bureaucratic Politics Approach
    University of Central Florida STARS Electronic Theses and Dissertations, 2004-2019 2010 U.S. Intelligence Reform A Bureaucratic Politics Approach Bonnie M. Schickler University of Central Florida Part of the Political Science Commons Find similar works at: https://stars.library.ucf.edu/etd University of Central Florida Libraries http://library.ucf.edu This Masters Thesis (Open Access) is brought to you for free and open access by STARS. It has been accepted for inclusion in Electronic Theses and Dissertations, 2004-2019 by an authorized administrator of STARS. For more information, please contact [email protected]. STARS Citation Schickler, Bonnie M., "U.S. Intelligence Reform A Bureaucratic Politics Approach" (2010). Electronic Theses and Dissertations, 2004-2019. 1669. https://stars.library.ucf.edu/etd/1669 U.S. INTELLIGENCE REFORM: A BUREAUCRATIC POLITICS APPROACH by BONNIE M. SCHICKLER B.A. University of Central Florida, 2008 A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts in the Department of Political Science in the College of Science at the University of Central Florida Orlando, Florida Fall Term 2010 © 2010 Bonnie Schickler ii ABSTRACT This study investigates the current bureaucratic struggles that exist within the U.S. intelligence community as a result of the Intelligence Reform and Terrorism Prevention Act (IRTPA) of 2004. The first part of this research examines the history of intelligence reform in the United States beginning with the National Security Act of 1947. The second part provides an in- depth discussion of the 2004 legislation as well as an examination of the main bureaucratic conflicts that have arisen between the Director of National Intelligence (DNI) and the rest of the U.S.
    [Show full text]
  • Who Watches the Watchmen? the Conflict Between National Security and Freedom of the Press
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • NSA's MORECOWBELL
    NSA's MORECOWBELL: Knell for DNS Christian Grothoff Matthias Wachs Monika Ermert Jacob Appelbaum Inria TU Munich Heise Verlag Tor Project 1 Introduction On the net, close to everything starts with a request to the Domain Name System (DNS), a core Internet protocol to allow users to access Internet services by names, such as www.example.com, instead of using numeric IP addresses, like 2001:DB8:4145::4242. Developed in the \Internet good old times" the contemporary DNS is like a large network activity chart for the visually impaired. Consequently, it now attracts not only all sorts of commercially-motivated surveillance, but, as new documents of the NSA spy program MORECOWBELL confirm, also the National Security Agency. Given the design weaknesses of DNS, this begs the question if DNS be secured and saved, or if it has to be replaced | at least for some use cases. In the last two years, there has been a flurry of activity to address security and privacy in DNS at the Internet Engineering Task Force (IETF), the body that documents the DNS standards. The Internet Architecture Board, peer body of the IETF, just called on the engineers to use encryption everywhere, possibly including DNS. [4] A recent draft [6] by the IETF on DNS privacy starts by acknowledging that the DNS \... is one of the most important infrastructure components of the Internet and one of the most often ignored or misunderstood. Almost every activity on the Internet starts with a DNS query (and often several). Its use has many privacy implications ..." Despite seemingly quick consensus on this assessment, the IETF is not expecting that existing industry solutions will change the situation anytime soon: \It seems today that the possibility of massive encryption of DNS traffic is very remote." [5] From a surveillance perspective, DNS currently treats all information in the DNS database as public data.
    [Show full text]
  • Bansemer: Intelligence Reform: a Question of Balance
    Brig Gen Kenneth Newton Walker Kenneth Walker enlisted at Denver, Colorado, on 15 December 1917. He took flying training at Mather Field, California, getting his commission and wings in November 1918. After a tour in the Philippines, he returned to Langley Field, Virginia, in February 1925 with a subsequent assignment in December 1928 to attend the Air Corps Tactical School. Retained on the faculty as a bombardment in- structor, Walker became the epitome of the strategic thinkers at the school and coined the revolutionary airpower “creed of the bomber”: “A well-planned, well-organized and well-flown air force attack will constitute an offensive that cannot be stopped.” Following attendance at the Command and General Staff School at Fort Leavenworth, Kansas, in 1933 and promotion to major, he served for three years at Hamilton Field, California, and another three years at Luke Field, Ford Island, and Wheeler Field, Hawaii. Walker returned to the United States in January 1941 as assistant chief of the Plans Division for the chief of the Air Corps in Washington, DC. He was promoted to lieutenant colonel in July 1941 and colonel in March 1942. During this time, when he worked in the Operations Division of the War Department General Staff, he coauthored the air-campaign strategy known as Air War Plans Division—Plan 1, the plan for organizing, equipping, deploying, and employing the Army Air Forces to defeat Germany and Japan should the United States become embroiled in war. The authors completed this monu- mental undertaking in less than one month, just before Japan attacked Pearl Harbor—and the United States was, in fact, at war.
    [Show full text]