Enclosed Is the Header; the Next Three Posts Contain the 517K Flat-Text of the "1984" Polemic

Total Page:16

File Type:pdf, Size:1020Kb

Enclosed Is the Header; the Next Three Posts Contain the 517K Flat-Text of the Enclosed is the header; the next three posts contain the 517K flat-text of the "1984" polemic. For hardcore details on ECHELON, see Part 1 from 'Wild Conspiracy Theory' through the end of Part 1. ---guy ****************************************************************************** An Indictment of the U.S. Government and U.S. Politics Cryptography Manifesto ---------------------- By [email protected] 7/4/97-M version "The law does not allow me to testify on any aspect of the National Security Agency, even to the Senate Intelligence Committee" ---General Allen, Director of the NSA, 1975 "You bastards!" ---guy ****************************************************************************** This is about much more than just cryptography. It is also about everyone in the U.S.A. being fingerprinted for a defacto national ID card, about massive illegal domestic spying by the NSA, about the Military being in control of key politicians, about always being in a state of war, and about cybernetic control of society. ****************************************************************************** Part 1: Massive Domestic Spying via NSA ECHELON ---- - ------- -------- ------ --- --- ------- o The NSA Admits o Secret Court o Wild Conspiracy Theory o Over the Top o BAM-BAM-BAM o Australian ECHELON Spotted o New Zealand: Unhappy Campers Part 2: On Monitoring and Being Monitored ---- - -- ---------- --- ----- --------- o On Monitoring - Driver's Seat - Five Months Statistics - The FBI Investigations - I Can See What You Are Thinking - Why I Monitor o On Being Monitored Part 3: 1984 Means a Constant State of War ---- - ---- ----- - -------- ----- -- --- War #1 - Drugs War #2 - Guns War #3 - Child Pornography War #4 - Terrorism War #5 - Hackers Part 4: Why unlimited cryptography must be legislated NOW ---- - --- --------- ------------ ---- -- ---------- --- o Key Recovery Means No Cryptography o Key Recovery Isn't Even Feasible o Government Steamroller o Feds' Wacky Pro-GAK Logic - Business Will Demand It - To Safeguard Your Privacy Part 5: There is no part five ---- - ----- -- -- ---- ---- Part 6: Louis Freeh & The Creeping Police State ---- - ----- ----- --- -------- ------ ----- o Louis Freeh o National ID Card o Worldwide Banking and Phone Monitoring o Cybernetic Control of Society o Conclusions ****************************************************************************** ECHELON is NSA's world-wide surveillance network and associated software. DICTIONARY - Keyword searching with exclusion logic software. ORATORY - Speech recognition. Think of it as speech-to-text software. Subject to DICTIONARY searches. CALEA - A 1994 law ("Communications Assistance to Law Enforcement Act") to force a massive reworking of the U.S. telephone infra- structure so that the government can intrinsically wiretap it. Also called the FBI Digital Telephony Act. It is a domestic extension of ECHELON. GAK - Government Access [to cryptographic] Keys. Any cryptography product with GAK has been compromised so the government can read it. SIGINT - Signals Intelligence = NSA = electronic snooping Key Recovery - See GAK. C-SPAN - Two cable channels dedicated to broadcasting both houses of Congress and other U.S. governmental functions. DEA - U.S. Drug Enforcement Administration DIA - U.S. Pentagon Defense Intelligence Agency DIA - U.S. Drug Interdiction Agency (older) FBI - U.S. Federal Bureau of Investigation BATF - U.S. Bureau of Alcohol, Tobacco, and Firearms UKUSA - pronounced 'you-koo-za' - a secret wartime treaty that says member nations can spy on each others population without warrants or limits, and that this can be shared with the spied-on country's SIGINT agency. PGP - Free and unbreakable encryption, available world-wide. CISPES - Committee in Solidarity with the People of El Salvador "Ultra-secret" agencies: NSA - U.S. National Security Agency GCHQ - British Government Communications Headquarters CSE - Canada's Communications Security Establishment DSD - Australian Defense Signals Directorate GCSB - New Zealand's Government Communications Security Bureau ****************************************************************************** Main() ---- Using mainly publicly available material, here is my documentation of: o Part 1: Massive Domestic Spying via NSA ECHELON This is highly detailed documentation of NSA spying. This spying is illegal, massive, and domestic. The documentation is comprehensive, especially since it is now brought together in this one section. o Part 2: On Monitoring and Being Monitored In this section, I describe the capabilities of ECHELON keyword monitoring. A detailed example --- how to use keywords to pick out conversations of interest --- is given. I also put forth a case of what it means to be monitored heavily by the government. o Part 3: 1984 Means a Constant State of War The politics of war, and the Orwellian tactics employed by by the U.S. Government to control its citizens. o Part 4: Why unlimited cryptography must be legislated NOW In additional to the reasons given in the previous sections, the 'debate' reasons constantly given by the government are reviewed and debunked. And our nation's experts say it will hurt security. The GAO says the same thing. o Part 5: There is no part five. o Part 6: Louis Freeh & The Creeping Police State Basically, Louis Freeh is the anti-Christ leading us to Hell. National ID cards are effectively being implemented without needing to issue cards. The U.S. Government is trying to monitor all phone calls and banking transactions, and have all equipment worldwide designed for their monitoring. They are bent on controlling the world to the point of there being no crime left on the planet. Of course, democracy destroyed is the direct result. ---- This publication advocates five major items: o Passage of ProCode/SAFE legislation, allowing U.S. companies to export unlimited strength cryptography, free from "Key Recovery". Key Recovery means messages are no longer a secret, because the Government has screwed around with it. o Killing the CALEA legislation, which orders all communications equipment be DESIGNED so the Government can spy on it. o Dismantling domestic ECHELON, the Government listening in on our domestic phone calls. o A Cabinet-level U.S. Privacy Commission, with teeth. ---- The "average" American has no idea why cryptography is important to them. It is the only way to begin preventing massive illegal domestic spying. Currently, there are no restrictions on domestic use of unlimited strength cryptography. That is not because the Government hasn't complained about child pornographers or terrorists or other criminals who might use it. No, that's the reason they are giving for why U.S. companies can't EXPORT products, such as web browsers, outside U.S. territory, without compromising it with Government "Key Recovery"; i.e. made stupider and breakable. Why such an indirect control on what they claim is a domestic problem? Because that is how 'The Creeping Police State' works. Slowly, bit-by-bit. Slowly, State-by-State everyone in the U.S. is being fingerprinted. The FBI is now advocating biometric capture of all newborns too. This is an interesting manifesto, please take the time to read it. Cryptography can be used to keep private: Internet traffic, such as email, and telephone conversations (PGP phone). A version of PGP phone that looks and works like a normal telephone --- but can't be spied upon --- would eventually become wide-spread. It begins to change the mind-set that the Police State is inevitable. ---- Major references... In the last several years intelligence operatives, specifically including SIGINT (signal intelligence) people, have started telling the story about the massive domestic use of computer monitoring software in the U.S. Including our domestic phone calls, Internet, fax, everything. I'm going to quote a number of articles and books; they involved talking to over 100 of these intelligence operatives. Buy this book: "Secret Power" by Nicky Hager, ISBN 0-908802-35-8. It describes in detail the ECHELON platform. It's one of the most important. New Zealand people are quite unhappy at their place within ECHELON. Buy this book: "Spyworld: Inside the Canadian and American Intelligence Establishments" By Mike Frost [NSA trained sigint person] and Michel Gratton, Toronto Doubleday 1994. Mr. Frost describes missions in the U.S. where he was trained by the NSA to handle domestic jobs that would be illegal for the NSA. These books are quite damning, in a heavily documented way. This is an AMAZINGLY COMPREHENSIVE BOOK: buy it! "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996 Buy this book: "The Secret War Against the Jews", Authors: John Loftus and Mark Aarons, ISBN 0-312-11057-X, 1994. Don't let the title throw you: the authors spoke with a great many intelligence people, and cleverly probed NSA/CIA/FBI by submitting items for publication approval, and when they censored something... Bingo. Because of the Catch-22 situation, the NSA gave up trying to censor many books, since it can be used to confirm questions they would otherwise have refused to answer. The other books referenced within are also suggested reading. I have sometimes edited for brevity the excerpts, especially my newspaper clippings of stories flying by. If I have any news story specifics wrong or if you have more details, please email me. Later versions of this document can be searched for at dejanews.com. Or, you can email me, Subject: Requesting Cryptography Manifesto. ---- ---- Here comes a large 'reasoned
Recommended publications
  • A Failure of Intelligence: the Echelon Interception System & the Fundamental Right to Privacy in Europe
    Pace International Law Review Volume 14 Issue 2 Fall 2002 Article 7 September 2002 Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe Kevin J. Lawner Follow this and additional works at: https://digitalcommons.pace.edu/pilr Recommended Citation Kevin J. Lawner, Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe, 14 Pace Int'l L. Rev. 435 (2002) Available at: https://digitalcommons.pace.edu/pilr/vol14/iss2/7 This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace International Law Review by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. POST-SEPT. 11TH INTERNATIONAL SURVEILLANCE ACTIVITY - A FAILURE OF INTELLIGENCE: THE ECHELON INTERCEPTION SYSTEM & THE FUNDAMENTAL RIGHT TO PRIVACY IN EUROPE Kevin J. Lawner* I. Introduction ....................................... 436 II. Communications Intelligence & the United Kingdom - United States Security Agreement ..... 443 A. September 11th - A Failure of Intelligence .... 446 B. The Three Warning Flags ..................... 449 III. The Echelon Interception System .................. 452 A. The Menwith Hill and Bad Aibling Interception Stations .......................... 452 B. Echelon: The Abuse of Power .................. 454 IV. Anti-Terror Measures in the Wake of September 11th ............................................... 456 V. Surveillance Activity and the Fundamental Right to Privacy in Europe .............................. 460 A. The United Nations International Covenant on Civil and Political Rights and the Charter of Fundamental Rights of the European Union... 464 B.
    [Show full text]
  • An Interview with James Bamford
    Investigating the Puzzle Palace: An Interview with James Bamford BONNIE BRENNAN AND KATHERINE GILBERT QUESTION: Do you consider clandestine intelligence gathering a legitimate activity for a modern nation-state? BAMFORD: I think it is very legitimate; I ju.st think that it should be directed externally. It is unrealistic not to have clandestine activities, though to some extent NSA isn't even really engaged in clandestine collection. Thousands of signals are just falling down outside right now, and all they're doing is putting out a dish and collecting them. There's not really anything clandestine about it. A listening post is a large thing with big antennae that can be seen from the road. It's just technical collection gathering, and I don't think there's anything really wrong with that as long as they're concentrating on foreign countries. We assume foreign countries can do the same thing to the United States. The Soviet Union, I'm sure, has a big listening post in Cuba. I don't see anything wrong with that. QUESTION: In his book, The Codebreakers, David Kahn shows that intelligence gathering by nations is as old as civilization. In the nineteenth century, Clausewitz described "intelligence" as the "basis . of our own plans and operations" and posited that "unreliable and transient intelligence results in a flimsy structure that can easily collapse and bury us in its ruins." What, in your opinion, is the role of intelligence today? BAMFORD: The role of intelligence is to provide a government with a third eye to see what is going on in places where it can't otherwise see; it has expanded tremendously from thirty years ago when the concentration was on human intelligence.
    [Show full text]
  • United States District Court Eastern District of Michigan Southern Division
    UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION AMERICAN CIVIL LIBERTIES UNION; AMERICAN CIVIL LIBERTIES UNION FOUNDATION; AMERICAN CIVIL LIBERTIES Case No. 2:06-cv-10204 UNION OF MICHIGAN; COUNCIL ON AMERICAN-ISLAMIC RELATIONS; COUNCIL Hon. Anna Diggs Taylor ON AMERICAN-ISLAMIC RELATIONS MICHIGAN; GREENPEACE, INC.; NATIONAL ASSOCIATION OF CRIMINAL DEFENSE LAWYERS; JAMES BAMFORD; LARRY DIAMOND; CHRISTOPHER HITCHENS; TARA MCKELVEY; and BARNETT R. RUBIN, Plaintiffs, v. NATIONAL SECURITY AGENCY / CENTRAL SECURITY SERVICE; and LIEUTENANT GENERAL KEITH B. ALEXANDER, in his official capacity as Director of the National Security Agency and Chief of the Central Security Service, Defendants. Larry J. Saylor (P28165) Peter T. Barbur (Admission Pending) MILLER, CANFIELD, PADDOCK AND STONE, PLC CRAVATH, SWAINE & MOORE LLP 150 West Jefferson, Suite 2500 Worldwide Plaza Detroit, Michigan 48226 825 Eighth Avenue (313) 963-6420 New York, NY 10019 [email protected] (212) 474-1000 Sidney S. Rosdeitcher (Admission pending) Attorneys for Amicus Curiae The Association Chair, Committee on Civil Rights of the Bar of the City of New York THE ASSOCIATION OF THE BAR OF THE CITY OF NEW YORK 1285 Avenue of the Americas New York, NY 10019-6064 (212) 373-3238 MEMORANDUM OF LAW OF AMICUS CURIAE THE ASSOCIATION OF THE BAR OF THE CITY OF NEW YORK IN SUPPORT OF PLAINTIFFS’ MOTION FOR PARTIAL SUMMARY JUDGMENT TABLE OF CONTENTS Page TABLE OF AUTHORITIES……………………………………………………………………... ii I. STATEMENT OF INTEREST OF AMICUS CURIAE. ....................................................1 II. SUMMARY OF ARGUMENT...........................................................................................2 III. THE RELEVANT BACKGROUND..................................................................................3 IV. THE NSA SURVEILLANCE PROGRAM IMPERMISSIBLY IMPEDES ATTORNEY-CLIENT COMMUNICATIONS IN VIOLATION OF THE FIRST AND SIXTH AMENDMENTS...........................................................................................4 A.
    [Show full text]
  • Security Agency Stops Public Access To
    ·.a:gF.· I··o·;A2919576 a : ,_______ ...,.,...._....__ ___________ _ THE SUN, Thursday, April 28, 1983 --------------------------~-------:---!"".A~7--. Security agency, stops public· access to letters ill private, lihrajfjr . secrecy stamp, in a ~ault the library agency's action, denounced it, in the officials told the librarians that visit .to 1969 by William F. Frieciman, a vlsit by two. NSA officials a~ n~~rt of New York Times News Service k · th · ,,.. uses to house secret data. words of one, as "a new form of cen- was part of a systematic effort to pioneer in cryptological wor ID e ·our continuing. review of research. / Washington ....:. The Natiqnal Secu· Ma,ny of the letters were cited by sorship." · track down and, if necessary, remove - United States and one of the security materials used by author· :Jam~ rity Agency (NSA), the nation's larg· · author James Bamford in his book · Mark H. Lynch, a lawyer for the from circulation research materials · agency's top code breakers. They Bamford." . · . • ' est and most secretive intelligence . "The Puzzle Palace," a critical report American Civil Liberties Union, ·said, · about sensitive matters that -were dealt primarily. with personal mat• '· The letter al.sO said. "It's obviolis organization, has directed a private about the agency that was published . "When the government starts barring used in Mr. Bamford's book, library ters, according to library officials. we share a 'common desire that col· library in Virginia to halt public ac­ last y~ar. The NSA. is responsible for· . the . public from seeing unclassified officials said. The letters contained _brief refer- lecUons of papers not be exploited un· cess to personal letters menti9ned in.
    [Show full text]
  • A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service (NSA/CSS) 1931-1985
    Description of document: A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service (NSA/CSS) 1931-1985 Requested date: 15-June-2009 Released date: 03-February-2010 Posted date: 15-February-2010 Source of document: National Security Agency Attn: FOIA/PA Office (DJP4) 9800 Savage Road, Suite 6248 Ft. George G. Meade, MD 20755-6248 Fax: 443-479-3612 Online form: Here The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. A REFERENCE GUIDE TO SELECTED HISTORICAL DOCUMENTS RELATING TO THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE 1931-1985 (U) SOURCE DOCUMENTS IN Compiled by: CRYPTOLOGIC HISTORY Gerald K.
    [Show full text]
  • COMSEC Monitoring and Analysis, Though NSA Exerted Some Influence Through Its Annual Review of the Consolidated Cryptologic Program and Other Measures
    SOUTH EAST AS IA Part One THIS DOCUMENT CONTAINS CODEWORD MATERIAL TOP SECRET NOFORN TOP SECRET UMBRA NOf?OltN CRYPTOLOGIC HISTORY SERIES SOUTHEAST ASIA Working Against the Tide (COM SEC Monitoring and Analysis) PART ONE (b) (3)-P.L. 86-36 Hiram M. Wolfe, I II, ASA Raymond P. Schmidt, NAVSECGRU Thomas N. Thompson, AFSS June 1970 TOP ~t:Cltt:T U~IBftA NOf?OftN SECURITY NOTICE Although the information contained in this journal ranges in security classification from UNCLASSIFIED to TOP SECRET CODEWORD, the overall security classification assigned to this issue is TOP SECRET UMBRA. The "No Foreign Nations" (NOFORN) caveat has been added to guard against inadvertent disclosure of portions of the text which discuss topics normally held to NOFORN channels. While the TSCW NOFORN classification by itself requires careful handling, additional caution should be exercised with regard to the present journal and others in the series because of the comprehensive treatment and broad range of the subject matter. TOP SECRET UMBRA HOFORH ---.--------- ------. -- 'f'Of S:EERE'f' UMBRA normm CRYPTOLOGIC HISTORY SERIES Southeast Asia Sponsors Vice Adm. Noel Gayler, USN Director, NSA Maj. Gen. Charles). Denholm, USA Commanding General. USASA Rear Adm. Ralph E. Cook, USN Commander, NAVSECGRU Maj. Gen. Carl W. Stapleton, USAF Commander, AFSS Joint Staff Juanita M. Moody Chief William D. Gerhard General Editor Lawton L. Sternbeck, ASA Hiram M. Wolfe, III ASA Raymond P. Schmidt NAVSECGRU Bob W. Rush, AFSS Thomas N. Thompson AFSS Mary Ann Bacon Editor 'fOF 3:ECR:E'f UMBRA HOFORPf 'fOP SECRE'f UMBRA ?WFORN Foreword Important as it is in peacetime, communications security becomes even more important in wartime.
    [Show full text]
  • Questioning the National Security Agency's Metadata Program
    I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY Secret without Reason and Costly without Accomplishment: Questioning the National Security Agency’s Metadata Program JOHN MUELLER & MARK G. STEWART* I. INTRODUCTION When Edward Snowden’s revelations emerged in June 2013 about the extent to which the National Security Agency was secretly gathering communications data as part of the country’s massive 9/11- induced effort to catch terrorists, the administration of Barack Obama set in motion a program to pursue him to the ends of the earth in order to have him prosecuted to the full extent of the law for illegally exposing state secrets. However, the President also said that the discussions about the programs these revelations triggered have actually been a good thing: “I welcome this debate. And I think it’s healthy for our democracy. I think it’s a sign of maturity because probably five years ago, six years ago, we might not have been having this debate.”1 There may be something a bit patronizing in the implication that the programs have been secret because we were not yet mature enough to debate them when they were put into place. Setting that aside, however, a debate is surely to be welcomed—indeed, much overdue. It should be conducted not only about the National Security Agency’s (NSA) amazingly extensive data-gathering programs to * John Mueller is a professor of political science at Ohio State University and a Senior Fellow at the Cato Insitute. Mark G. Stewart is a professor of engineering at the University of Newcastle, Australia.
    [Show full text]
  • 523696 REF ID:A523696 {U) Chapter 16 Cryptology and the Watergate
    DOCID: 523696 REF ID:A523696 lOP SECRET I::JMBM {U) Chapter 16 Cryptology and the Watergate Era (U) BACKGROUND TO SCANDAL (U) The greatest political scandal in American history originated with an obscure note in the Metro seetion of the Washington Post on Sunday, June 18, 1972. In it, two ~etro . section reporters, Bob Woodward and Carl Bernstein, cove~ed what appeared to be an amateurish break-in at the Democratic National Headquarters in the Watergate Hotel in downtown Washington. (U) The Nixon administration managed to cover over the politi~l effects of the break-in until after the elections in Novem~r. But when Congress returned in January, it was ready to investigate. In February 1973, the Senate voted to establish a Select Committee, commonly referred to as the Ervin Committee after Senator Sam Ervin, Democratic senator from North Carolina, to hold hearings. At the time, no one associated with the committee knew where they would get information, since the administration was keeping a tight lip, and· the . Watergate burglars weren't•talking. But on March 23, one of the burglars, James McCord, turned state's evidence: The federal judg~, John Sirica, had been pressuring the defendants by threatening lengthy prison terms if they did not cooperate. Now McCord was cooperating, and the entire thing began to unravel. The president, concerned with get~g on with his second term. tried to shush the (U) Prealclent Nixon an4 hlalDner circle, 1973 whole thing. (U) The scandal, of course, would not shush. Instead, it mushroomed, swallowing first Nixon's White House staff', then much of his cabinet, and imally the president himself.
    [Show full text]
  • Defendant's Motion for Disclosure of FISA-Related Material and To
    Case: 1:12-cr-00723 Document #: 51 Filed: 08/09/13 Page 1 of 6 PageID #:213 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION UNITED STATES OF AMERICA, ) ) Plaintiff, ) ) v. ) No. 12 CR 723 ) Judge Sharon Johnson Coleman ADEL DAOUD, ) ) Defendant. ) DEFENDANT’S MOTION FOR DISCLOSURE OF FISA-RELATED MATERIAL AND TO SUPPRESS THE FRUITS OR DERIVATIVES OF ELECTRONIC SURVEILLANCE AND ANY OTHER MEANS OF COLLECTION CONDUCTED PURSUANT TO FISA OR OTHER FOREIGN INTELLIGENCE GATHERING Defendant, ADEL DAOUD, by and through his attorneys, THOMAS ANTHONY DURKIN, JANIS D. ROBERTS, and JOSHUA G. HERMAN, pursuant to the Free Exercise, Free Speech, Search and Seizure, and Due Process clauses of the First, Fourth, and Fifth Amendments to the Constitution of the United States, as well as the relevant provisions of the Foreign Intelligence Surveillance Act (“FISA”), specifically 50 U.S.C. §1806(f) and (g), hereby moves for disclosure of FISA-related materials, and to suppress any fruits or derivatives of electronic surveillance and any other means of collection conducted pursuant to FISA or any other foreign intelligence gathering or any intelligence agencies of the United States. In support of this motion, Defendant, through counsel, shows to the Court the following: 1. On September 18, 2012, the government filed its “Notice of Intent to Use Foreign Intelligence Surveillance Act Information” (“FISA Notice”) (Dkt. #9). 2. On May 22, 2013, counsel for Defendant moved for notice of disclosure of FISA Amendments Act (“FAA”)evidence pursuant to 50 U.S.C. §§ 1881e(a) and 1806(c). Counsel specifically requested notice of: (1) whether the electronic surveillance described in its FISA Case: 1:12-cr-00723 Document #: 51 Filed: 08/09/13 Page 2 of 6 PageID #:214 Notice was conducted pursuant to the pre-2008 provisions of the FISA or, instead, the FAA; and, (2) whether the affidavit and other evidence offered in support of any FISA order relied on information obtained or derived from an FAA surveillance order.
    [Show full text]
  • The Puzzle Palace: Archives and National Security
    The Puzzle Palace: Archives and National Security In addition to the intelligence operations of the The Marshall Library has a long history of close better-known CIA and FBI, successive American cooperation with NSA. It exhibits museum items on presidents and their administrations have relied loan from the Agency. Fred C. Hadsel, director of on the National Security Agency, established by The George C. Marshall Research Foundation, told Harry Truman in 1952. NSA was created not by law the New York Times that the foundation's relation­ but by a top secret presidential memorandum ad­ ship with the government "is not and should not be dressed to the Secretary of State and Secretary (cont. on p. 2) of Defense. One of NSA's principal tasks is keeping secure codes for U.S. use and deciphering 1983 Election Results communications of foreign governments. Andrea Hinding, University of Minnesota, was The first book-length study of NSA, James Bamford's elected vice president of SAA in the 1983 elec­ The Puzzle Palace, was published in 1982. The tions. She will become president at the 1984 author, an investigative writer, cited research annual meeting in Washington, DC. Hinding is at the National Archives in accessioned records an SAA Fellow, a former Council member, and of the Departments of State, Defense, and Justice, editor of Women's History Sources: A Guide to and in NSA records released by the Agency after Archives and Manuscripts Collections in the United Freedom of Information Act requests. Additionally, States. Bamford cited the papers of William F. Friedman and General Marshall S.
    [Show full text]
  • 523696 REF ID:A523696 {U) Chapter 16 Cryptology and the Watergate
    DOCID: 523696 REF ID:A523696 lOP SECRET I::JMBM {U) Chapter 16 Cryptology and the Watergate Era (U) BACKGROUND TO SCANDAL (U) The greatest political scandal in American history originated with an obscure note in the Metro seetion of the Washington Post on Sunday, June 18, 1972. In it, two ~etro . section reporters, Bob Woodward and Carl Bernstein, cove~ed what appeared to be an amateurish break-in at the Democratic National Headquarters in the Watergate Hotel in downtown Washington. (U) The Nixon administration managed to cover over the politi~l effects of the break-in until after the elections in Novem~r. But when Congress returned in January, it was ready to investigate. In February 1973, the Senate voted to establish a Select Committee, commonly referred to as the Ervin Committee after Senator Sam Ervin, Democratic senator from North Carolina, to hold hearings. At the time, no one associated with the committee knew where they would get information, since the administration was keeping a tight lip, and· the . Watergate burglars weren't•talking. But on March 23, one of the burglars, James McCord, turned state's evidence: The federal judg~, John Sirica, had been pressuring the defendants by threatening lengthy prison terms if they did not cooperate. Now McCord was cooperating, and the entire thing began to unravel. The president, concerned with get~g on with his second term. tried to shush the (U) Prealclent Nixon an4 hlalDner circle, 1973 whole thing. (U) The scandal, of course, would not shush. Instead, it mushroomed, swallowing first Nixon's White House staff', then much of his cabinet, and imally the president himself.
    [Show full text]
  • How Much Is Too Much?
    LINCOLN MEMORIAL UNIVERSITY LAW REVIEW __________________________________ VOLUME 3 FALL 2015 _____________________________________ THE NSA’S EAVESDROPPING OPERATIONS AFTER THE SNOWDEN REVELATIONS: HOW MUCH IS TOO MUCH? JANUARY 2015 SYMPOSIUM TRANSCRIPT James Bamford MR. JACOB BAGGETT: I have the pleasure of introducing Mr. James Bamford as our first speaker. Mr. Bamford is an award-winning journalist in the field of national security. The New York Times calls him the nation's premier journalist on the subject of the NSA. And his most recent book, "The Shadow Factory", which is on sale outside by Union Avenue Books, was named by the Washington Post as one of the best books of the year. And he's here to discuss the transformation of the NSA since September 11th. Please welcome Mr. Bamford. (Applause) MR. JAMES BAMFORD: Thanks very much. It's really great being here. I want to thank Matt Lyon and Melanie Reid, Jacob Baggett, and Lauren Mullins for taking really great care of me. It's really great being here. The fact that this university is named after NSA AFTER SNOWDEN 116 President Lincoln is really quite an honor for me because I've always admired one of the things he's said. And that is the quote he has up here. I think if he had been President about a dozen years ago, we might not have gotten into the war in Iraq. If you read his quote there, "[k]ings had always been involving and impoverishing their people in wars, pretending generally, if not always, that the good of the people was the object."1 He was very much against attacking countries without getting congressional approval.
    [Show full text]