A Review of Intelligence Oversight Failure: NSA Programs That Affected Americans

Total Page:16

File Type:pdf, Size:1020Kb

A Review of Intelligence Oversight Failure: NSA Programs That Affected Americans A Review of Intelligence Oversight Failure: NSA Programs that Affected Americans by Major Dave Owen The views and opinions expressed here are those of the as the State Department or the Central Intelligence author and do not necessarily refl ect the offi cial policy Agency (CIA).3 or position of any agency of the U.S. Government. President Truman created NSA in 1952 to remedy Introduction this situation. He issued a classifi ed memorandum After World War II, the National Security Agency to do this, and followed it up with National Security (NSA) established and directed three programs that Council Intelligence Directive 9. This classifi ed di- deliberately targeted American citizens’ private com- rective explicitly stated that the NSA would be the munications. Despite ethical and legal concerns, “executive agent” for foreign communications intel- these programs continued through the early 1970s. ligence for the entire government.4 However, this di- This intelligence oversight failure, once it was iden- rective did not establish any limitations within the tifi ed, resulted in a thorough U.S. Senate investi- foreign SIGINT mission. Even as late as the 1970s, gation. Out of this investigation came the 1976 according to the NSA’s general counsel, “no ex- document “NSA Surveillance Affecting Americans,” isting statutes control, limit, or defi ne the signals which led to legal restrictions on the agency and ro- intelligence activities of the NSA.”5 Since foreign in- bust intelligence oversight processes to ensure that telligence can be derived from American citizens’ it continued to adhere to these restrictions.1 This private communications, and since domestic issues article will summarize the programs that led to this can affect foreign policy (requiring ‘foreign intelli- situation, review the legal decisions that affected gence’ support for these domestic issues), this situ- these programs, and discuss the impact that is still ation resulted in minimal control of NSA activities. felt within the NSA today. Additionally, since both the memorandum and di- rective which led to its creation were classifi ed, the Background NSA was generally unknown to the public. The NSA rose after World War II in order to cen- As a result, the agency existed in an environment tralize and manage U.S. cryptologic efforts. Prior to of unquestioned SIGINT authority, minimal intelli- and throughout the war, these efforts were mostly gence oversight, and no statutory limitations. This spread among the military services, and were poorly environment was exacerbated by a marked appre- coordinated, controlled, and understood. In fact, ciation for SIGINT capabilities, especially due to the the success of Japan’s attack on Pearl Harbor was “demonstrated wartime value of breaking enemy largely due to this confusing cryptologic situation, codes, particularly of the Japanese.”6 These fac- as the U.S. had clear warnings through Signals tors resulted in a situation which could easily have Intelligence (SIGINT) but failed to act.2 In 1949, the led to the NSA exploiting American citizens’ private Department of Defense (DoD) attempted to rem- communications. However, one additional factor edy this situation by creating the Armed Forces made this possibility a certainty, and also shaped Security Agency (AFSA). Under the command of the the SIGINT culture so that exploiting American citi- Joint Chiefs of Staff, this agency combined the sep- zens’ communications seemed to be a normal part arate efforts underway in each service. However, of operations: Project SHAMROCK. the AFSA was ineffective, as continued inter-service rivalries, coupled with poor coordination basically Project SHAMROCK (1945 to 1975) maintained the situation of divided, independent Project SHAMROCK began in August 1945, shortly cryptologic efforts. Additionally, as an agency of the before the end of World War II and over seven years Joint Chiefs of Staff, AFSA was not responsive to prior to the establishment of the NSA.7 This time the SIGINT needs of elements outside of DoD, such frame is important to note when considering the October - December 2012 33 culture of the SIGINT enterprise. By the time NSA 1976, the NSA continued to claim that “the Fourth was established, Project SHAMROCK was a long- Amendment does not apply to the NSA’s intercep- standing, well-accepted program. tion of Americans’ international communications 11 Project SHAMROCK originally started as an effort for foreign intelligence purposes.” to improve wartime intelligence activities and was Though Project SHAMROCK undoubtedly col- continued after the war due to its intelligence value. lected and analyzed American citizens’ private com- It consisted of access to telegraph communications munications on a large scale, this effort still focused that transited networks owned by several U.S. com- on foreign intelligence. The project was created as panies which then provided daily microfi lm copies an effort to improve the foreign communications in- of all traffi c. Though this traffi c included foreign telligence mission, and that purpose continued to communications, it also included a vast amount of be the primary reason for its existence. communications from or to American citizens. Project SHAMROCK was just one of three ma- The companies involved in Project SHAMROCK jor programs that infringed on Americans’ privacy. questioned the legality of these activities, especially The other two programs more directly pursued the in peacetime. In fact, they only agreed to support private communications of American citizens. The it “provided they received the personal assurance fi rst of these two remaining programs was Project of the Attorney General of the U.S.”8 Additionally, MINARET. representatives of the companies met with the Secretary of Defense in 1947 to discuss their con- Project MINARET (1960 to 1973) tinued participation. The Secretary of Defense as- Project MINARET was essentially the NSA’s watch sured them that Project SHAMROCK was “in the list. It used existing SIGINT accesses (to include in- highest interests of national security” and that both formation from Project SHAMROCK), and searched the Attorney General and the President approved.9 for terms, names, and references associated with The companies again brought up this issue in 1949, certain American citizens. with similar results. However, though the compa- Though Project MINARET offi cially started in nies did fear that Project SHAMROCK was illegal, 1969, the watch list itself existed at least as early as they “never sought assurances that that the NSA 1960.12 Originally, this list had nothing to do with was limiting its use to the messages of the foreign American citizens. According to the 1975 testimony targets.”10 of a senior NSA offi cial, “the term ‘watch list’ had to At its peak, Project SHAMROCK collected approxi- do with a list of names of people, places or events mately 150,000 messages per month. NSA gener- that a customer would ask us to have our analysts ated reports based on this collection to customers keep in mind as they scan large volumes of mate- 13 including the DoD, the CIA, the Federal Bureau rial.” However, starting in 1967, the NSA started adding selectors associated with American citizens of Investigation (FBI), the Secret Service, and the to the watch list, establishing a ‘civil disturbance’ Bureau of Narcotics and Dangerous Drugs (a pre- watch list. This was due to requests from the White cursor of the Drug Enforcement Administration). House, the FBI, and the Attorney General.14 These The inclusion of the FBI and the Bureau of Narcotics requests included: and Dangerous Drugs is especially noteworthy, as their mission included mostly domestic targets. “Indications that foreign governments… are controlling or attempting to control or infl uence The Director of the NSA terminated Project the activities of U.S. ‘peace’ groups and ‘Black SHAMROCK in 1975 amongst increasing Power’ organizations.” Congressional concerns that this collection was in violation of the Fourth Amendment which guards “Determining whether or not there is evidence of against unreasonable searches and seizures un- any foreign action to develop or control these anti- less authorized by a warrant. A previous Supreme Vietnam and other domestic demonstrations.” Court decision (Katz v. the United States, 1967) “Identities of individuals and organizations identifi ed private communications as protected by in the U.S. in contact with agents of foreign Fourth Amendment rights. However, even as late as governments.”15 34 Military Intelligence The Secret Service also requested support through In 1969, due to the growth of the ‘civil disturbance’ the ‘civil disturbance’ watch list program, submit- watch list and concerns over the security controls, ting “names of individuals and organizations ac- NSA established Project MINARET. This project tive in the antiwar and civil rights movements.”16 contained the entire program, and increased the Finally, the CIA asked for “The activities of U.S. in- security requirements. Prior to Project MINARET, dividuals involved in either civil disorders, radical only intercepts where both communicants were student or youth activities, racial militant activities, American citizens were held to the tighter security radical antiwar activities, draft evasion/deserter practices detailed in the preceding paragraph. With support activities … where such individuals have the establishment of Project MINARET, all commu- some foreign connection.”17 nications “to, from, or mentioning U.S. citizens” were held to this higher security standard. After receiving these requests, the Director of the NSA sent a cable to the Director of Central Intel- After the NSA established Project MINARET, the ligence and every member of the U.S. Intelligence FBI sent the agency two memoranda in an effort Board. In this cable the Director informed them that to ensure that this activity continued. In these the the NSA was “concentrating additional and continu- Director of the FBI stated “this Bureau has a con- ing effort to obtain SIGINT” in support of these re- tinuing interest in receiving intelligence information quests.18 Though there is no record that the U.S.
Recommended publications
  • Table of Contents Acknowledgements
    The Data Privacy/National Security Balancing Paradigm as Applied In The U.S.A. and Europe: Achieving an Acceptable Balance Paul Raphael Murray, B.A. H.Dip in Ed. LL.B. LL.M Ph.D. (NUI) Submitted for the Degree of Doctor in Philosophy at Trinity College, Dublin School of Law August 2017 Declaration and Online Access I declare that this thesis has not been submitted as an exercise for a degree at this or any other university and it is entirely my own work. I agree to deposit this thesis in the University’s open access institutional repository or allow the library to do so on my behalf, subject to Irish Copyright Legislation and Trinity College Library conditions of use and acknowledgement. Paul Raphael Murray Acknowledgements I would like to record my thanks to my Supervisor, Professor Neville Cox, School of Law, and Dean of Graduate Studies, Trinity College, Dublin, for his help and guidance. i ii Abstract The Data Privacy/National Security Balancing Paradigm as Applied In The U.S.A. and Europe: Achieving an Acceptable Balance Paul Raphael Murray The overall research question addressed in this thesis is the data privacy/national security balancing paradigm, and the contrasting ways in which this operates in Europe and the U.S. Within this framework, the influences causing the balance to shift in one direction or another are examined: for example, the terrorist attacks on two U.S. cities in 2001 and in various countries in Europe in the opening decade of the new millennium, and the revelations by Edward Snowden in 2013 of the details of U.S.
    [Show full text]
  • The NSA Is on the Line -- All of Them
    The NSA is on the line -- all of them An intelligence expert predicts we'll soon learn that cellphone and Internet companies also cooperated with the National Security Agency to eavesdrop on us. By Kim Zetter, Salon.com May. 15, 2006 | When intelligence historian those safeguards had little effect in preventing Matthew Aid read the USA Today story last at least three telecommunications companies Thursday about how the National Security from repeating history. Agency was collecting millions of phone call records from AT&T, Bell South and Verizon for Aid, who co-edited a book in 2001 on signals a widespread domestic surveillance program intelligence during the Cold War, spent a designed to root out possible terrorist activity in decade conducting more than 300 interviews the United States, he had to wonder whether with former and current NSA employees for his the date on the newspaper wasn't 1976 instead new history of the agency, the first volume of of 2006. which will be published next year. Jeffrey Richelson, a senior fellow at the National Aid, a visiting fellow at George Washington Security Archive, calls Aid the top authority on University's National Security Archive, who has the NSA, alongside author James Bamford. just completed the first book of a three-volume history of the NSA, knew the nation's Aid spoke with Salon about how the NSA has bicentennial marked the year when secrets learned to maneuver around Congress and the surrounding another NSA domestic Department of Justice to get what it wants. He surveillance program, code-named Project compared the agency's current data mining to Shamrock, were exposed.
    [Show full text]
  • A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service (NSA/CSS) 1931-1985
    Description of document: A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service (NSA/CSS) 1931-1985 Requested date: 15-June-2009 Released date: 03-February-2010 Posted date: 15-February-2010 Source of document: National Security Agency Attn: FOIA/PA Office (DJP4) 9800 Savage Road, Suite 6248 Ft. George G. Meade, MD 20755-6248 Fax: 443-479-3612 Online form: Here The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. A REFERENCE GUIDE TO SELECTED HISTORICAL DOCUMENTS RELATING TO THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE 1931-1985 (U) SOURCE DOCUMENTS IN Compiled by: CRYPTOLOGIC HISTORY Gerald K.
    [Show full text]
  • CQR Government Surveillance
    Published by CQ Press, an Imprint of SAGE Publications, Inc. www.cqresearcher.com Government Surveillance Is government spying on Americans excessive? ow tightly the government should keep tabs on citizens has long been fiercely debated. But con - cern about surveillance intensified in June after H National Security Agency computer specialist Edward Snowden revealed classified details of agency electronic snooping programs. Civil liberties advocates, lawmakers and others Demonstrators in Berlin, Germany, protest on July 27 also have cited growing unease with other surveillance measures, against the sweeping U.S. electronic surveillance operations revealed in June by National Security including the use of unmanned “drone” aircraft and tiny video Agency computer specialist Edward Snowden (shown on placard). Many Germans were outraged at reports that the super-secret spy agency had collected data cameras. Congress, along with state and local governments, is ex - on German citizens, including emails. pected to take up a variety of bills this fall to protect privacy and increase transparency about government activities. But the Obama I THIS REPORT N administration maintains that internal safeguards — including a THE ISSUES ....................719 S federal civil liberties oversight board created in 2004 — have pre - BACKGROUND ................725 I vented the federal government from becoming “Big Brother.” CHRONOLOGY ................727 D CURRENT SITUATION ........730 E CQ Researcher • Aug. 30, 2013 • www.cqresearcher.com AT ISSUE ........................733 Volume 23, Number 30 • Pages 717-740 OUTLOOK ......................734 RECIPIENT OF SOCIETY OF PROFESSIONAL JOURNALISTS AWARD FOR BIBLIOGRAPHY ................738 EXCELLENCE N AMERICAN BAR ASSOCIATION SILVER GAVEL AWARD THE NEXT STEP ..............739 GOVERNMENT SURVEILLANCE Aug. 30, 2013 THE ISSUES OUTLOOK Volume 23, Number 30 • Is government surveil - More Cameras MANAGING EDITOR: Thomas J.
    [Show full text]
  • How Much Is Too Much?
    LINCOLN MEMORIAL UNIVERSITY LAW REVIEW __________________________________ VOLUME 3 FALL 2015 _____________________________________ THE NSA’S EAVESDROPPING OPERATIONS AFTER THE SNOWDEN REVELATIONS: HOW MUCH IS TOO MUCH? JANUARY 2015 SYMPOSIUM TRANSCRIPT James Bamford MR. JACOB BAGGETT: I have the pleasure of introducing Mr. James Bamford as our first speaker. Mr. Bamford is an award-winning journalist in the field of national security. The New York Times calls him the nation's premier journalist on the subject of the NSA. And his most recent book, "The Shadow Factory", which is on sale outside by Union Avenue Books, was named by the Washington Post as one of the best books of the year. And he's here to discuss the transformation of the NSA since September 11th. Please welcome Mr. Bamford. (Applause) MR. JAMES BAMFORD: Thanks very much. It's really great being here. I want to thank Matt Lyon and Melanie Reid, Jacob Baggett, and Lauren Mullins for taking really great care of me. It's really great being here. The fact that this university is named after NSA AFTER SNOWDEN 116 President Lincoln is really quite an honor for me because I've always admired one of the things he's said. And that is the quote he has up here. I think if he had been President about a dozen years ago, we might not have gotten into the war in Iraq. If you read his quote there, "[k]ings had always been involving and impoverishing their people in wars, pretending generally, if not always, that the good of the people was the object."1 He was very much against attacking countries without getting congressional approval.
    [Show full text]
  • An Inadequate Limitation?
    GOVERNMENT DISCRETION IN THE AGE OF BULK DATA COLLECTION: AN INADEQUATE LIMITATION? JULIAN SANCHEZ* There are about 3,500 wiretap orders issued every year, at the federal and state levels combined for all criminal investigations.1 When one company, such as Facebook, has on the order of tens of thousands of accounts flagged for content interception under foreign intelligence orders,2 the appropriate benchmark is not “millions,” but what we do in other contexts. Even that number is incomplete because much of the gov- ernment’s collection of Internet content is not happening through PRISM.3 There is also the other component of section 7024—the “upstream” collection off the Internet backbone,5 as well as overseas collection under the authority of Executive Order 12,333.6 This is not part of FISA, which only covers col- * Senior Fellow, Cato Institute. This essay was adapted from remarks given at the 2014 Federalist Society Annual Student Symposium at the University of Florida in Gainesville, Florida. 1. ADMIN. OFFICE OF THE U.S. COURTS, WIRETAP REPORT 2013 (2014), available at http://www.uscourts.gov/Statistics/WiretapReports/wiretap-report-2013.aspx [http://perma.cc/ASG5-7T6G]. 2. See Global Government Requests Reports, FACEBOOK, https://www.facebook.com /about/government_requests [http://perma.cc/595L-XTV6] (last visited July 28, 2014) (reporting government data requests by country from the first six months of 2013, ending on June 30). 3. Stephen Braun et. al, PRISM Is Just Part of a Much Larger, Scarier Government Surveillance Program, BUSINESS INSIDER (Jun. 15, 2013, 9:54 AM), http:// www.businessinsider.com/prism-is-just-the-start-of-nsa-spying-2013-6 [http://perma.cc/5BH8-AE82] (noting that PRISM is “a relatively small part of a much more expansive and intrusive eavesdropping effort”).
    [Show full text]
  • Total Terror Plots*
    NSA DATA COLLECTION PROGRAM: THE CHALLENGE OF ASSESING EFFECTIVENESS Item Type text; Electronic Thesis Authors DEIBEL, CHARLES LOUIS, II Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 28/09/2021 10:48:12 Item License http://rightsstatements.org/vocab/InC/1.0/ Link to Item http://hdl.handle.net/10150/613829 NSA DATA COLLECTION PROGRAM: THE CHALLENGE OF ASSESING EFFECTIVENESS By CHARLES LOUIS DEIBEL II ____________________ A Thesis Submitted to The Honors College In Partial Fulfillment of the Bachelors degree With Honors in Political Science THE UNIVERSITY OF ARIZONA M A Y 2 0 1 6 Approved by: ____________________________ Dr. John Tidd School of Government and Public Policy Abstract The National Security Agency (NSA) has played a key role in the United States Government’s counterterror program since September 11. Over the last 15 years, the NSA has faced considerable controversy regarding its counterterrorism data collection program and the legal authority behind it. This paper, however, is concerned with whether or not that program has been effective in preventing Islamist related or inspired terror attacks inside the United States. As NSA capabilities and authorities have expanded since 9/11, has it been effective in helping to prevent attacks in the U.S.? Definitively answering this question is extremely difficult, given significant challenges regarding the amount and quality of public information concerning NSA’s involvement in prevented terror attacks.
    [Show full text]
  • Tesi Di Diploma Di Mediatore Linguistico
    ! SCUOLA SUPERIORE PER MEDIATORI LINGUISTICI (Decreto Ministero dell’Università 31/07/2003) Via P. S. Mancini, 2 – 00196 - Roma TESI DI DIPLOMA DI MEDIATORE LINGUISTICO (Curriculum Interprete e Traduttore) Equipollente ai Diplomi di Laurea rilasciati dalle Università al termine dei Corsi afferenti alla classe delle LAUREE UNIVERSITARIE IN SCIENZE DELLA MEDIAZIONE LINGUISTICA CASO SNOWDEN: IL DATAGATE RELATORI: CORRELATORI: Prof.ssa Bisirri Adriana Prof.re Farrell Paul Nicholas Prof.re Medina Delgado Carlos Alberto Prof.ssa Piemonte Claudia CANDIDATA: LUDOVICA MARTINO MATRICOLA: 2347 ANNO ACCADEMICO 2017/2018 1! A mia mamma, mio papà e mio fratello Tommaso che credono sempre in me e mi danno fiducia. Ad Alessia sorella e complice nelle difficoltà. Alle mie amiche di una vita Beatrice e Flavia, certezze inesauribili. A mia nonna Teresa luce della mia vita. Vi voglio bene. 2! 3! INDICE SEZIONE ITALIANA Introduzione…………………………………………………..………10 CAPITOLO I: Chi è Edward Snowden…………………………….…..13 CAPITOLO II: La NSA…………………………………………..……17 2.1 Il quarto emendamento……………………………………20 CAPITOLO III: Quali informazioni ha divulgato……………………..21 3.1 PRISM………………….……….…………………………22 3.1.1 Contenuti e metadati…………………………….25 3.2 Caso VERIZON……….……….…………………………..26 3.2.1 Patriot Act …………..…………………………..26 3.3 Boundless Informant….……………….…………………..27 3.4 Tempora……………….……………………………………28 3.4.1 Upstream………..……………………………….29 3.5 Xkeyscore………………………………………………….30 3.6 Blarney………..….………………………………………..31 CAPITOLO IV: Chi l’aveva già fatto prima di lui……………………..33 4.1 Wikileaks:
    [Show full text]
  • Timeline of US Govt. Surveillance & Spying
    The history of United States government domestic surveillance and spying is long. Over the years, the US government has launched covert and illegal projects whose purpose among other is to "expose, disrupt, misdirect, discredit, or otherwise neutralize" movements for justice and freedom. Launched in March 2008, the LAPD Suspicious Activity Reporting (SAR) – Special Order 1 and iWATCH “See Something, Say Something” Program is one such open assault on people’s privacy and freedom, done under the pretext of “national security and the war on terror”. 1798: Congress passes four laws which come to be known collectively as the Alien and Sedition Acts: o June 17, 1798: The Naturalization Act increases the amount of time necessary for immigrants to become naturalized citizens in the United States from five to fourteen years; 1 o June 24, 1798: The Alien Friends Act authorizes the president to deport any resident alien considered "dangerous to the peace and safety of the United States;”2 o July 5, 1798: The Alien Enemies Act authorizes the president to apprehend and deport resident aliens if their home countries are at war with the United States of America. This includes aliens who are not chargeable with actual hostility or other crime against the public safety;3 o July 13, 1798: The Sedition Act makes it a crime to "oppose any measure or measures of the government" as well as to publish "false, scandalous, and malicious writing" against the government or its officials. The Act is intended to stifle dissent.4 April 12, 1917: President Wilson persuades Congress to declare war on Germany and enter World War 1, but the American public is wary of the financial and military cost.
    [Show full text]
  • Five Eyes Intelligence Alliance Director of International Intelligence Scarlett Robinson Secretary of International Defense Alec Prodger
    EYES ONLY ACCESS Five Eyes Intelligence Alliance Director of International Intelligence Scarlett Robinson Secretary of International Defense Alec Prodger Office of the Queen’s Model United Nations Washington D.C. THIS IS A SECURITY COVER SHEET CLASSIFIED TOP SECRET NO DISSEMINATION OR DECLASSIFICATION The contents of this document are fictional based loosely on the X-Files and will be used for the purposes of an extracurricular event. This document contains information affecting the international defense and security of the English-speaking world. Within the meaning of the Espionage Act ss U.S.C. 35 and 38. Its transmission or revelation of its contents in any manner to any unauthorized persons is prohibited by law. Reproduction in any form or the taking of written or electronically transcribed notes is strictly forbidden. READ AND DESTROY EYES ONLY ACCESS About This Committee On behalf of the Queen’s National Model United Nations conference team, we welcome you to the Five Eyes Intelligence Alliance Committee! In this committee you will be discussing the security and intelligence needs of a secret alliance formed between the United Kingdom, the United States, Canada, Australia, and New Zealand. You, the delegates, will represent the Directors, Chiefs, and Commanders of the security and defense agencies that make up the Five Eyes Alliance in the year 1996, and you will be tasked with guiding your respective countries through difficult security and intelligence issues. The most recent incident involving extraterrestrial activity was the Phoenix Lights incident: the spotting of a group of strange lights in a V formation above Phoenix, Arizona.
    [Show full text]
  • Current Events and the Constitution: Snowden and the NSA
    Educating Young People about the Constitution Current Events and the Constitution: Snowden and the NSA A mere nine months ago no one knew the name Edward Snowden. Now not a week goes by without a news story related to his revelations about the National Security Agency (NSA). No doubt your class has already begun to ponder the implications of NSA information gathering and what it says about our system of governance. Does the executive branch, which controls the NSA through the Department of Defense, have too much power? How do we resolve the tension between liberty and security? Is Snowden, who released classified information, a traitor or a whistleblower? Were his actions morally justified? While the Snowden affair is too large to cover in its entirety (please look at some of the resources below for a great roundup), from a constitutional standpoint one of the most relevant aspects of the debate over his actions is the tension between the executive's war powers and civil liberties. There are numerous restrictions on the president using the power of the military on American civilians. The Third Amendment, for example, forbids the peacetime quartering of soldiers in domestic homes, and the Posse Comitatus Act of 1878 forbids the federal government from employing military personnel to enforce U.S. domestic law. Similarly, U.S. law prohibits intelligence agencies from targeting American citizens. The National Security Act of 1947, which established the Central Intelligence Agency (CIA), explicitly prohibited the agency from having "police, subpoena, law‐enforcement powers, or internal security functions." The intelligence agency reforms that emerged post‐Watergate required special court authorizations for surveillance of U.S.
    [Show full text]
  • Church Cmte Book III: National Security Agency Surveillance
    NATIONAL SECURITY AGENCY SURVEILLANCE AFFECTING AMERICANS CONTENTS Page I. Introduction and Summary-- _ _ _ - - __ _ _ _ __ __ _ _ _ _ _ _ __ _ _ _ _ _ _ _ _ _ _ _ _ _ 735 A. NSA’s origins and official responsibilities __________________ 736 B. Summary of interception programs-- _ ____________________ 738 C. Issues and questions-- _ __ __ -_ - _ _ _- _ __ -_ _ __ __ _ __ _ _ _ _ _ _ _ __ 742 II. NSA’s Monitoring of International Communications- _____________ _ 743 A. Summary of watch list activity- _ _ _ _- _____ - ______________ 743 B. History_____------------------------------------------ 744 C. Types of names on watchlists------ _____________________ 749 D. Overlapping nature of intelligence community requests- _ _ _ _ 750 E. Drug watch lists: United States-South American intercepts- 752 F. Termination of the civil disturbance watch list activity- __ _ 756 G. Authorisation___-______---_------------------------------- 761 H. Conclusions------------------------------------------- 764 III. A Special NSA Collection Program: SHAMROCK ________________ 765 A. Legal restrictions _______________________________________ 765 B. The committee’s investigation- - _ - _ __ _ _ _ _ _- _ __ _ __ _ __ __ __ _ 766 C. The origins of SHAMROCK- - _ _________ ________________ 767 D. The participation of the companies-- __ __ _-_ __ _ -_ _-_ __ _ _ _ _ 770 E. NSA’s participation- _ _ _ ________________________________ 774 F. Termination of SHAMROCK- - _ - ________ -- _______ - _____ 776 IV. NSA Personnel Security and Related Matters- - - _ _ _ _ __ _-_ __ _-_ __ _ 777 A.
    [Show full text]