NSA Hacks China, NSA Leaker Snowden Claims - CNN.Com

Total Page:16

File Type:pdf, Size:1020Kb

NSA Hacks China, NSA Leaker Snowden Claims - CNN.Com 6/12/13 NSA hacks China, NSA leaker Snowden claims - CNN.com You've selected the U.S. Edition. Would you like to make this your default edition? Yes | No Close SET EDITION: U.S. INTERNATIONAL MÉXICO ARABIC Sign up Log in TV: CNN CNNi CNN en Español HLN Home TV & Video CNN Trends U.S. World Politics Justice Entertainment Tech Health Living Travel Opinion iReport Money Sports NSA hacks China, NSA leaker Snowden SHARE THIS Print claims Email By Jethro Mullen and Michael Pearson, CNN More sharing Recommend 1.6k updated 4:05 PM EDT, Wed June 12, 2013 Former intelligence worker Edward Snowden revealed himself as the source of documents outlining a massive effort by the NSA to track cell phone calls and monitor the e- mail and Internet traffic of virtually all Americans. Snowden, 29, fled to Hong Kong after copying the last set of documents. He says he just wanted the public to know what the government was doing. "Even if you're not doing anything wrong you're being watched and recorded," he said. The Justice Department has begun a preliminary investigation into what it called "the unauthorized disclosure of Part of complete cov erage on classified information by an Data mining & privacy individual with authorized access." HIDE CAPTION Notable leakers and whistle-blowers Who is Edward Snowden? updated 9:32 AM EDT, Mon June 10, 2013 He's a high school dropout << < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 > >> w ho w orked his w ay into the most secretive computers in U.S. intelligence as a defense STORY HIGHLIGHTS Hong Kong (CNN) -- U.S. intelligence agents have been hacking contractor -- only to blow computer networks around the world for years, apparently targeting those secrets w ide open by U.S. hacks computers in China, spilling details of classified NSA leaker Edw ard Snow den fat data pipes that push immense amounts of data around the surveillance programs. tells paper Internet, NSA leaker Edward Snowden claimed Wednesday to the Snow den claims U.S. intelligence South China Morning Post newspaper. taps into major Internet lines Opinion Why NSA spying scares the world South China Morning Post says it Among some 61,000 reported targets of the National Security updated 2:54 PM EDT, Wed June 12, 2013 has seen documents but been Agency, Snowden said, are thousands of computers in China -- unable to verify claims In 2011, I w as on a panel, which U.S. officials have increasingly criticized as the source of organized by the security Snow den revealed details of company RSA, w ith tw o retired secret U.S. surveillance thousands of attacks on U.S. military and commercial networks. National Security Agency programs China has denied such attacks. directors, Michael Hayden and Kenneth Minihan. During the course of our debate, I raised The Morning Post said it had seen documents but was unable to concerns, as the only non- verify allegations of U.S. hacking of networks in Hong Kong and American on the panel, that mainland China since 2009. their plans and preferences for having the NSA secure cyberspace for the rest of us Snowden told the paper that some of the targets included the w ere not exactly reassuring. Chinese University of Hong Kong, public officials and students. The To this, Minihan replied that I should not describe myself as documents also "point to hacking activity by the NSA against "Canadian" but rather "North mainland targets," the newspaper reported. American." In the Morning Post interview -- published one week after the British NSA snooping triggers lawsuits newspaper The Guardian revealed the first leaks attributed to updated 9:09 AM EDT, Wed June 12, 2013 Snowden -- he claimed the agency he once worked for as a Initial legal challenges to the government's sw eeping contractor typically targets high-bandwith data lines that connect electronic surveillance Internet nodes located around the world. programs began to emerge w ith one couple alleging they w ere singled out for monitoring "We hack network backbones -- like huge Internet routers, basically because they criticized the www.cnn.com/2013/06/12/politics/nsa-leak/index.html?hpt=hp_t2 1/10 6/12/13 NSA hacks China, NSA leaker Snowden claims - CNN.com -- that give us access to the communications of hundreds U.S. military. of thousands of computers without having to hack every single one," the newspaper quoted him as saying. NSA leaker's girlfriend says she's 'lost at sea' A "backbone" is part of the inner workings of a computer updated 7:53 AM EDT, Wed June 12, 2013 network that links together different parts of that network. The girlfriend of self-avow ed Manhunt under w ay for NSA leaker National Security Agency It is used to deliver data from one part of the network to leaker Edw ard Snow den w rote another and, as such, could expose data from multiple that she w as "adrift in a sea of computers if hacked. chaos" after he spilled government secrets and decamped to Hong Kong. 'Trying to bully' Tough questions about secret Snowden, 29, worked for the Booz Allen Hamilton surveillance programs computer consulting firm until Monday when he was fired Ron Paul on Snow den: It's a heroic effort updated 9:13 AM EDT, Wed June 12, 2013 after documents he provided to journalists revealed the House members from both existence of secret programs to collect records of political parties raised domestic telephone calls in the United States and the concerns and tough questions for administration officials w ho Internet activity of overseas residents. briefed the entire chamber on the government's recently revealed top secret While he has not been charged, the FBI is conducting an surveillance programs. investigation into the leaks, and he has told The Guardian Snow den's life before leak that he expects the United States will try to prosecute him. Privacy? Forget it, we're all celebrities Snowden told the Morning Post that he felt U.S. officials online now updated 3:10 PM EDT, Wed June 12, 2013 were pressuring his family and also accused them of The controversy over National "trying to bully" Hong Kong into extraditing him to prevent Security Agency data mining the release of more damaging information. has spaw ned columns featuring ominous references to Orw ell and Kafka, He vowed to resist extradition efforts if it comes to that, reassurances from politicians Obama open to NSA changes saying he "would rather stay and fight the United States and jokes (made on the Internet, of course) about the government in the courts, because I have faith in Hong government peeking through Kong's rule of law." the blinds. "My intention is to ask the courts and people of Hong Kong to Intercepts called critical in terror decide my fate," the South China Morning Post quoted Snowden as investigations saying. "I have been given no reason to doubt your system.'' updated 10:24 AM EDT, Tue June 11, 2013 As arguments rage about the proper balance betw een civil But Hong Kong lawmaker Regina Ip, a former secretary of security liberties and national security, a for the territory, said Tuesday that while any extradition process survey of recent terror cases could take months, Snowden isn't necessarily beyond the reach of show s that intercepted communications have often the United States. provided investigators w ith vital clues. "If he thought there was a legal vacuum in Hong Kong which renders him safe from U.S. jurisdiction, that is unlikely to be the case," she Julian Assange: 'Go to Latin America' said. updated 7:46 AM EDT, Tue June 11, 2013 Julian Assange, the founder of The newspaper said Snowden has been hiding in undisclosed WikiLeaks, know s something about secrets and w hat locations inside the semi-autonomous Chinese territory since happens w hen they're checking out of his hotel room Monday -- a day after he revealed his exposed. identity in an interview with The Guardian. Phone tracking acceptable? Snowden told the Morning Post he is not trying to evade U.S. Fifty-six percent consider the authorities. government's tracking of phone records an "acceptable w ay" "People who think I made a mistake in picking Hong Kong as a to investigate terrorism, according to the new national location misunderstand my intentions," the newspaper quoted him survey released Monday by as saying. "I am not here to hide from justice; I am here to reveal the Pew Research Center. criminality." Opinion: Your biggest secrets are up On the defensive for grabs updated 10:51 AM EDT, Tue June 11, 2013 The revelations have renewed debate over surveillance in the The great irony of the United States and overseas in the name of fighting terrorism, with government spying controversy is that even supporters saying the programs revealed by Snowden are legal and America's state-of-the-art spy have helped stop terror plots. Civil liberties advocates, however, call agency could not keep secret the fact that it might be spying the measures dangerous and unacceptable intrusions. on our secrets. Such criticisms have put President Barack Obama and his allies on the issue -- both Democrats and Republicans -- on the defensive NSA leaker ignites global debate: hero or traitor? www.cnn.com/2013/06/12/politics/nsa-leak/index.html?hpt=hp_t2 2/10 6/12/13 NSA hacks China, NSA leaker Snowden claims - CNN.com against mounting criticisms from a similarly bipartisan group of critics updated 2:14 PM EDT, Mon June 10, 2013 A 29-year-old w ho admitted demanding changes to rein in the programs.
Recommended publications
  • Mein Nachbar
    Das deutsche Nachrichten-Magazin Leitartikel Partner und Gegner zugleich Warum der SPIEGEL weitere geheime Dokumente über die NSA-Affäre enthüllt as Verhältnis Deutschlands zu den USA in Zeiten der Die Bundesregierung hat die Selbstherrlichkeit der Welt- NSA-Affäre gleicht dem Ritt auf einer Schiffschaukel: macht lange hingenommen. Sie hat manches geahnt, vieles DAus luftigen Höhen geht es atemberaubend in die verdrängt und einiges über die Allgegenwart der NSA gewusst, Tiefe. Im Sommer vergangenen Jahres, als die ersten Snowden- weil der Bundesnachrichtendienst bei den Operationen mit- Enthüllungen bekannt wurden, erklärte die Regierung Merkel mischt. Dass der BND mit der NSA intensiv kooperiert, nicht die Affäre schon für beendet, bevor sie ihre Wucht entfaltete. nur bei der Terrorbekämpfung, sondern auch bei der unter- Im Herbst aber, als bekannt wurde, das private Handy der schiedslosen Massenüberwachung globaler Kommunikations- Bundeskanzlerin sei überwacht worden, erreichte das Ver- ströme, belegen die neuen Snowden-Dokumente. Die Deut- hältnis einen Tiefpunkt. Nun war von Konsequenzen die Rede, schen sind Partner und Gegner zugleich. von einem anderen Umgang unter Verbündeten. Die Bundeskanzlerin hat einen Amtseid auf das Grund- Dann reiste die Kanzlerin nach Washington, und wieder gesetz geschworen. Spionage gegen Deutschland ist nach kehrte Friede ein. Seither würden Transatlantiker wie Sicher- dem Strafgesetz verboten. Die Grundrechte der Bürger sind heitsbehörden am liebsten zum normalen Geschäft übergehen, also keine flexible Größe, abhängig davon, wie es um das Ver- bei dem die Aufgaben verteilt hältnis Deutschlands zu den sind: Die NSA ist der omnipo- USA gerade bestellt sein mag. tente Weltgeheimdienst, die Entweder haben die ameri- Deutschen sind der verständ- kanische und die deutsche nisvolle, hilfreiche Bündnis- Regierung miteinander ab - partner.
    [Show full text]
  • Penetrate, Exploit, Disrupt, Destroy: the Rise of Computer Network Operations As a Major Military Innovation
    PENETRATE, EXPLOIT, DISRUPT, DESTROY: THE RISE OF COMPUTER NETWORK OPERATIONS AS A MAJOR MILITARY INNOVATION by Craig J. Wiener A Dissertation Submitted to the Graduate Faculty of George Mason University in Partial Fulfillment of The Requirements for the Degree of Doctor of Philosophy Biodefense Committee: _______________________________________ Gregory Koblentz, Chair _______________________________________ A. Trevor Thrall _______________________________________ Stuart Malawer _______________________________________ Gregory Koblentz, Program Director _______________________________________ Mark J. Rozell, Dean Date: __________________________________ Fall Semester 2016 George Mason University Fairfax, VA Penetrate, Exploit, Disrupt, Destroy: The Rise of Computer Network Operations as a Major Military Innovation A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at George Mason University By Craig J. Wiener Master of Science George Mason University, 2010 Bachelor of Arts New York University 1992 Director: Gregory Koblentz, Associate Professor Schar School of Policy and Government Fall Semester 2016 George Mason University Fairfax, VA Copyright 2016 Craig J. Wiener All Rights Reserved ii DISCLAIMER Any errors herein are solely those of the author. Additionally, the views expressed herein are those of the author. iii DEDICATION To Betty: I wish you were here. iv ACKNOWLEDGEMENTS I have a tremendous number of people to thank who have helped me throughout my Master of Science and PhD studies, leading to the submission of my dissertation. It literally took a village, and although I cannot thank everyone here, please know the depth of my gratitude is significant and ongoing. I would like to thank the faculty and staff of the George Mason School of Policy, Government and International Affairs, and the Graduate School of Public and International Affairs for giving me an opportunity to pursue my studies in national security.
    [Show full text]
  • Cyber Center for Education & Innovation
    VISION FOR THE NEW CYBER CENTER FOR EDUCATION & INNOVATION Home of the National Cryptologic Museum A PUBLIC-PRIVATE PARTNERSHIP WITH UNPARALLELED CYBER DEFENSE EXPERTISE. PLEASE JOIN US AND GET INVOLVED! The Cyber Center and our participation, volunteer Yleadership and support are urgently Museum Master needed to help us conceptualize, Plan includes: capitalize and construct the new Cyber Center for Education & Innovation, n A new state-of-the-art Home of the National Cryptologic Museum. Join us now! Museum To discuss your interest in supporting our efforts to create n The Conference Center this vital new resource, please contact: n Vigilance Air Park MGEN Roderick J. Isler, USA (Ret) n Classroom facilities Vice President, Cyber Center for Education & Innovation, New Museum Project Campaign n World class research National Cryptologic Museum Foundation and rare books library P.O. Box 1563 Millersville, MD 21108 n A comprehensive site and Office: 443-292-0091 land use concept Cell: 301-785-0896 Continued strong private and [email protected] public leadership is needed to realize this challenging vision. 1 CCEI-NCM Parking 498 Spaces 2 CCEI-NCM 3 Museum and Conference Center Drop-off 4 Service Road/ Loading Dock 5 Existing Museum 6 National Vigilance Park 7 Security Check Point 8 Colony Seven Road 9 Current NSA Parking (N1) 10 Current NSA Parking (N10) 11 Future VCP-1 12 86 foot Security Set Back 13 Entrance Signage PROPOSED SITE PLAN HELP US BUILD AND COMPLETE THIS NEW NATIONAL TREASURE. THE CYBER CENTER FOR EDUCATION & INNOVATION, HOME OF THE NATIONAL CRYPTOLOGIC MUSEUM is envisioned to be an integrated multi-purpose facility serving public and private stakeholders.
    [Show full text]
  • Airpower Journal, Published Quarterly, Is the Professional Journal of the United States Air Force
    Wínter 1994 JOURNAL rrM . Lü 1 Secretary of the Air Force Dr Sheila E. Widnall Air Force Chief of Staff Gen Ronald R. Fogleman Commander, Air Education and Training Command Gen Henry Viccellio, Jr. Commander, Air University Lt Gen Jay W. Kelley Commander, College of Aerospace Doctrine, Research, and Education Col Leroy Barnidge, Jr. Editor Col Thomas M. Kearney Associate Editor Maj John M. Poti Professional Staff Hugh Richardson, Contributing Editor Marvin W. Bassett, Contributing Editor Steven C. Garst, Director ofArt and Production Daniel M. Armstrong, Illustrator L. Susan Fair, Illustrator Thomas L. Howell, Prepress Production Manager The Airpower Journal, published quarterly, is the professional journal of the United States Air Force. It is designed to serve as an open forum for the presentation and stimulation of innovative think- ing on military doctrine, strategy, tactics, force structure, readiness, and other matters of national defense. The views and opinions expressed or im- plied in the Journal are those of the authors and should not be construed as carrying the official sanction of the Department of Defense, the Air Force, Air Education and Training Command, Air University, or other agencies or departments of the US government. Articles in this edition may be reproduced in whole or in part without permission. If they are reproduced, the Airpower Journal requests a cour- tesy line. JOURNAL Wlnter 1994. Vol. Vlll. No. 4 AJRP 101 Editorial 2 Desert Storm: The First Inform ation W ar? Col Edward Mann, USAF 4 M ilitary Ethics Col Richaxd Szafranski, USAF Dr James H. Toner lst Lt William D. Casebeer, USAF 15 N onlethal Concepts: Im plications for Air Force Intelligence Capt Edward F.
    [Show full text]
  • Historical Dictionary of International Intelligence Second Edition
    The historical dictionaries present essential information on a broad range of subjects, including American and world history, art, business, cities, countries, cultures, customs, film, global conflicts, international relations, literature, music, philosophy, religion, sports, and theater. Written by experts, all contain highly informative introductory essays on the topic and detailed chronologies that, in some cases, cover vast historical time periods but still manage to heavily feature more recent events. Brief A–Z entries describe the main people, events, politics, social issues, institutions, and policies that make the topic unique, and entries are cross- referenced for ease of browsing. Extensive bibliographies are divided into several general subject areas, providing excellent access points for students, researchers, and anyone wanting to know more. Additionally, maps, pho- tographs, and appendixes of supplemental information aid high school and college students doing term papers or introductory research projects. In short, the historical dictionaries are the perfect starting point for anyone looking to research in these fields. HISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE Jon Woronoff, Series Editor Israeli Intelligence, by Ephraim Kahana, 2006. Russian and Soviet Intelligence, by Robert W. Pringle, 2006. Cold War Counterintelligence, by Nigel West, 2007. World War II Intelligence, by Nigel West, 2008. Sexspionage, by Nigel West, 2009. Air Intelligence, by Glenmore S. Trenear-Harvey, 2009. Middle Eastern Intelligence, by Ephraim Kahana and Muhammad Suwaed, 2009. German Intelligence, by Jefferson Adams, 2009. Ian Fleming’s World of Intelligence: Fact and Fiction, by Nigel West, 2009. Naval Intelligence, by Nigel West, 2010. Atomic Espionage, by Glenmore S. Trenear-Harvey, 2011. Chinese Intelligence, by I. C.
    [Show full text]
  • THE VULNERABLE Our Military Problems and How to Fix Them
    AMERICA THE VULNERABLE Our Military Problems And How To Fix Them EDITED BY JOHN F. LEHMAN AND HARVEY SICHERMAN FOREIGN POLICY RESEARCH INSTITUTE PHILADELPHIA Dedication On a sad note, Colonel Harry G. Summers Jr., U.S. Army (ret.), who penned the article dealing with operations, procurement, and the defense industrial base and sat as a panelist for our second conference, passed away on November 14, 1999. Colonel Summers, a veteran of the Korean and Vietnam Wars, was the recipient of two Legions of Merit, the Silver Star, three Bronze Stars, two Purple Hearts, two Air Medals, and two awards of the Combat Infantryman’s Badge, and also authored numerous books, articles, and columns. He was, in short, the quintessential soldier- scholar. We dedicate this volume to his memory. TABLE OF CONTENTS Preface vii John H. Ball America the Vulnerable 1 John F. Lehman and Harvey Sicherman Roles and Missions 12 Donald Kagan Superpowers Don’t Do Windows 27 John Hillen The U.S. Presumption of Quick, Costless Wars 48 Andrew P. N. Erdmann Operations, Procurement, and Industrial Base 73 Harry G. Summers Jr. Civil-Military Relations 84 Eliot A. Cohen The U.S. Military Must Find Its Voice 96 Sam C. Sarkesian An Uninformed Debate on Military Culture 115 Don M. Snider Does Military Culture Matter? 134 Williamson Murray Must U.S. Military Culture Reform? 152 John Hillen The Case for National Missile Defense 171 Keith B. Payne v AMERICA THE VULNERABLE Rethinking Bio-Chemical Dangers 182 Henry Sokolski PREFACE Bad Medicine for Biological Terror 196 Andrew J. Bacevich Asymmetrical Adversaries 215 In 1996, the Foreign Policy Research Institute convened a Defense Winn Schwartau Task Force composed of distinguished scholars and practitioners The Risks of a Networked Military 225 to examine the increasingly important debates over U.S.
    [Show full text]
  • NSA-FOIACASELOG-2016.Pdf
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 100503A 4 April 2017 JOHN GREENEWALD Dear Mr. Greenewald: This responds to your Freedom of Information Act (FOIA) request dated 1 January 2017 which was received by this office on 2 January 2017, for "a copy of the FOIA case log for calendar year 2016." For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. Since processing fees were minimal, no fees were assessed. Your request has been processed under the FOIA, and the logs for calendar year 2016 are enclosed, along with a FOIA Case Dispositions reference sheet that explains the final case dispositions. Please be advised that the logs do not contain the number of pages released. They contain a final disposition if the case was closed at the time the logs were created. If there is no final disposition, the case was still pending at the time the logs were created. Certain information has been deleted from the enclosures.
    [Show full text]
  • State Intervention in Cross-Border Mergers and Acquisitions
    Balancing Power without Weapons Why do states block some foreign direct investment on national security grounds even when it originates from within their own security com- munity? Government intervention into foreign takeovers of domestic companies is on the rise, and many observers find it surprising that states engage in such behavior not only against their strategic and mil- itary competitors, but also against their closest allies. Ashley Thomas Lenihan argues that such puzzling behavior can be explained by recog- nizing that states use intervention into cross-border mergers and acqui- sitions as a tool of statecraft to internally balance the economic and military power of other states through non-military means. This book tests this theory using quantitative and qualitative analysis of transac- tions in the United States, Russia, China, and fifteen European Union states. It deepens our understanding of why states intervene in foreign takeovers, the relationship between interdependence and conflict, the limits of globalization, and how states are balancing power in new ways. ashley thomas lenihan is a fellow at the Centre for Inter- national Studies at the London School of Economics and Political Science, and a term member of the Council on Foreign Relations. Her research focuses on the relationship between state power and foreign direct investment from an international relations perspective. Balancing Power without Weapons State Intervention into Cross-Border Mergers and Acquisitions Ashley Thomas Lenihan London School of Economics and Political Science University Printing House, Cambridge CB2 8BS, United Kingdom One Liberty Plaza, 20th Floor, New York, NY 10006, USA 477 Williamstown Road, Port Melbourne, VIC 3207, Australia 314–321, 3rd Floor, Plot 3, Splendor Forum, Jasola District Centre, New Delhi - 110025, India 79 Anson Road, #06-04/06, Singapore 079906 Cambridge University Press is part of the University of Cambridge.
    [Show full text]
  • Amdocs and the NSA =Go to NFU Pages
    NewsFollowUp NewsFollowUp.com search Franklin Scandal Omaha Obama sitemap home Amdocs Amdocs and the NSA =go to NFU pages News for the 99% ...................................Refresh F5...archive home 50th Anniversary of JFK assassination "Event of a Lifetime" at the Fess Parker Double Tree Inn. JFKSantaBarbara. Mossad, 9/11 Israeli Art Students Amdocs employee bailed out an 'Israeli art student' Gerald Shea, Memorandum to 9/11 Commission NFU MOST ACTIVE PA MP3 file of Fox News, Israeli Art Students, Amdocs Story Go to Alphabetic list Academic Freedom FOX NEWS CARL CAMERON FOUR-PART Conference REPORT: Fox News Series On Israeli Spying In Obama Death List Rothschild Timeline Bush / Clinton Body Count Narus / NSA / Boeing -- John O'neil , FBI agent killed on 9/11 Warrantless data mining ? in the WTC was investigating the Israeli Art Students, Amdocs Amdocs complicity Flight 77, Pentagon, 9/11? Amdocs / Narus / NSA 9/11 WTC art students Amdocs links DEA wire tap Fox News / Carl Cameron, Amdocs DEA / Amdocs links Whitehouse Telephone System Israeli art students / Amdocs Senate Select Committee on Intelligence Corporate Espionage John O'Neil, FBI, Israeli art students Israeli art students, 9/11 DEA, Amdocs, Israeli art students Fox News / Carl Cameron Report Amdocs and the NSA PROGRESSIVE REFERENCE CONSERVATIVE* AfroCubaWeb Israel Actions in the Americas Amdocs search: Narus AntiWar News: AMDOCS Dov Baharav, CEO Ron Moskovitz , CFO Antiwar pdf file art students, Israeli spies. Suspicious Rense 2001 All US Phone Call Records Michael Blum , Division Pres of Financial Services activities involving Israeli art students at DEA And Billing Done In Israel - Part 2 Carl Thomas G.
    [Show full text]
  • The Changing Face of the NCMF
    The Link BULLETIN OF THE NATIONAL CRYPTOLOGIC MUSEUM FOUNDATION, INC. VOLUMES 9, NO. 3 - , NO. 2, COMPOSITE Summer 2008 THe CHANGING FAce of THe NCMF Events of the past year have moved too quickly for the slow pace of publication of The Link. Issues intended for publication covering Fall 2006 and Winter 2006-2007 have, accordingly, been “pulled back” from the printer and – to adopt the term recently applied to military action in Iraq – we are “surging” by consolidating about a year and a half of content into a single composite issue. That requires a great deal of compression and omission, even to “hit the highlights.” We apologize in advance for the omitted coverage. In return, we plan next to introduce a new look, with color photographs, as the beginning of some further experiments to improve our communication with you, our members and readers. We thank our ambidextrous colleague, John Garcia, and his associates and corporate sponsors for the interim issuance of the occasional “NCMF Newsletter,” mailed to you. Our webmaster, Bob Bowie, Bill Saadi, our website coordinator, and others are pondering changes in the NCMF web site. Thanks also go to occasional Link contributors Ray Schmidt, David Hamer, “cub reporter” Mary Faletto, Kirsten Eland, Jim Boone, Prof. Mark Sommer, and others whose by-lines have appeared. They represent the vanguard of what we hope will be a plethora of “new” (and familiar) names as we invite others of you to remember (as we reminded you in Volume 1, Number 1 ten years ago) that, by our old definition, a “link” should go both ways.
    [Show full text]
  • Presidential Transition 2001: NSA Briefs a New Administration" Reviewed for Declassification
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com 1111111111111111111111111111111111 UNCLASSIFIED 1111111111111111111111 Request 10: 0000954449 TRANSMITTAL OF MATERIAL Type: OMAL 1111111111111111111111 Submitted- 20190130 TO FROM (RETURN ADDRESS) MR. JOHN GREENEWALD, JR. DEPARTMENT OF DEFENSE This transmittal may NOT be downgraded upon removal of the 27305 W. LIVE OAK ROAD NATIONAL SECURITY AGENCY enclosure(s). SUITE #1203 9800 SAVAGE ROAD This transmittal may NOT be declassified upon removal of the CASTAIC, CA 91384 FORT MEADE MARYLAND 20755-6000 enclosurejs). PHN#: (800)456-2228 ATTN : RAMSEY,VICKI LYNN WRAPPED COMSEC SUBMITTED SUITE: 6881 lRlu Os Do DYES IRl NO 20190130 SHIPPING MODE PACKAGE CT USPS - First Class 1 of 1 LN# UNCLASSIFIED TITLEIDESCRIPTION OF ITEM QTY TOT COST MFG SERIAL# BARCODE CLASS. OF ITEM 1 SERIAL: MDR-103569, DATED 28 JANUARY L 0 UNCLASSIFIED 2019 SERIAL: MDR-103570, DATED 29 JANUARY 2019 DESIG ACCT TYPE PAS STATEMENT APPROVAL CPODIR NO NA Not Applicable SPECIAL HANDLING INSTRUCTIONS (UNCLASSIFIED) ~ REQUESTED BY ORG PHONE RAMSEY,VICKI LYNN (VLRAMSE) SI\flf1; 1?i1MiJlb P133 (301)688-7785 UNCLASSIFIED v U. DO NOT STAMP RECEIPT PORTION WITH CLASSIFICATION f---------- ­ - -----------------­ - -­ -----­ RECEIPT 1111111111111111111111111111111111 (Please sign and return immediately. Avoid tracer action) 1111111111111111111111 ReauestlO: 0000954449 Tvee: OMAL RETURN TO FROM Receipt is hereby acknowledged for the material or documents listed under DEPARTMENT OF DEFENSE MR .
    [Show full text]
  • Presidential Transition 2001: NSA Briefs a New Administration
    2004 TOP Sl!CR:E'ft/COMINT/tX1 eclassified and approved for release by NSA and CIA on 04-16-2013 ursuantto E.O. 13526. MDR-68585 .' ·'' DOCID: 4045841 TOP SECR!T/fCOMINT//X1 (U) Presidential Transition 2001: NSA Briefs a New Administration David A. Hatch (U) INTRODUCTION gence. She or he may also require briefings on the capabilities of the various intelligence organiza­ (U) The American electoral process retains tions. It was (and is) important that a new presi­ many vestiges reflecting its eighteenth century dent learn what the intelligence community will origins. In the age of supersonic transport and e­ be able to do for her or him - and what it will not. mail, U.S. citizens select their national leadership on a timetable derived from the speed of carriages (U) Two senior CIA officials who were and town criers. involved with more than one presidential transi­ tion commented drolly, "Our experience with a (U) The most contentious vestige in the number of administrations was that they started process is the electoral college, a scheme which with the expectation that intelligence could solve allots votes to each state on the basis of popula­ every problem, or that it could not do anything tion; the actual determinant of a presidential right, and then moved to the opposite view. Then election is not the nation's popular vote, but the they settled down and vacillated from one votes of the electoral college. extreme to the other."1 (U) In addition to a lengthy period of pre-elec­ (U) The officials of a new administration get tion campaigning, the process is marked by a two "bombarded" with information - a lot of it and and one-half month gap between election day and quickly presented.
    [Show full text]