2019 Symposium on Cryptologic History
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Review of FBI Security Programs, March 2002
U.S. Department of Justice A Review of FBI Security Programs Commission for Review of FBI Security Programs March 2002 Commission for the Review of FBI Security Programs United States Department of Justice 950 Pennsylvania Avenue, NW, Room 1521 Washington, DC 20530 (202) 616-1327 Main (202) 616-3591 Facsimile March 31, 2002 The Honorable John Ashcroft Attorney General United States Department of Justice 950 Pennsylvania Avenue, N.W. Washington, D.C. 20530 Dear Mr. Attorney General: In March 2001, you asked me to lead a Commission to study security programs within the Federal Bureau of Investigation. Your request came at the urging of FBI Director Louis Freeh, who had concluded that an outside review was critical in light of the then recently discovered espionage by a senior Bureau official. In discharging my duties, I turned to six distinguished citizens as fellow Commissioners and to a staff of highly qualified professionals. I want to acknowledge the diligence with which my colleagues pursued the complex matters within our mandate. The Commission took its responsibilities seriously. It was meticulous in its investigation, vigorous in its discussions, candid in sharing views, and unanimous in its recommendations. When I agreed to chair the Commission, you promised the full cooperation and support of the Department of Justice and the FBI. That promise has been fulfilled. I would like to thank the Department’s Security and Emergency Planning Staff for the expert help they gave us, and I especially commend the cooperation of Director Mueller and FBI personnel at every level, who have all been chastened by treachery from within. -
US Counterintelligence and Security Concerns Feb 1987.P65
Union Calendar No. 3 100TH CONGRESS HOUSE OF REPRESENTATIVES REPORT 1st Session 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS1986 REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE HOUSE OF REPRESENTATIVES FEBRUARY 4, 1987.Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 68-440 WASHINGTON : 1987 Union Calendar No. 3 100TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS-1986 FEBRUARY 4, 1987-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. STOKES, from the Permanent Select Committee on Intelligence, submitted the following REPORT EXECUTIVE SUMMARY Over the past several years, a dangerous upward trend in successful espionage operations against the United States has occurred. Present and former U.S. Gov- ernment employees with access to sensitive classified information have played the key roles in each operation. Damage to U.S. national security has been signifi- cant and is still being estimated. Deeply concerned over these developments, the House Permanent Select Com- mittee on Intelligence has spent a great deal of time investigating this alarming situation. This report represents one outcome of the investigation. From its early days, the Administration has focused considerable attention and effort on improving the effectiveness of U.S. counterintelligence. Concomitantly, the House and Senate Intelligence Committees have authorized significantly in- creased funding for counterintelligence and urged that counterintelligence con- cerns assume a higher priority within the Intelligence Community. These efforts have elevated the morale, status and numbers of counterintelligence personnel, helped cope with security investigation backlogs and encouraged new initiatives in some operational and policy areas. -
Wh Owat Ches the Wat Chmen
WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment. -
Corp Bro Inside Layout
Message from the Director, NSA The National Security Agency’s rich legacy of cryptologic success serves not only as a reminder of our past triumphs, but also as an inspiration for our future. Harry Truman, the man responsible for signing the legislation that brought our Agency into existence, was once quoted as saying, “There is nothing new in the world except the history you do not know.” Like all truisms, it is only partially accurate. Each generation of Americans must at some point deal with unforeseen problems and issues that transcend the status quo. Most would agree that the challenges faced by NSA in today’s war against terrorism are far different from those of World War II, Vietnam, or Desert Storm. Even so, President Truman was correct in his assertion that there is much to be learned from the past. The history of the National Security Agency has in many respects been based on and characterized by feats of intellectual brilliance. Pioneers like William Friedman, Frank Rowlett, Dr. Louis Tordella, and Agnes Meyer Driscoll, to name but a few, were able to build on past successes and do whatever was necessary to meet the challenges of their time. We should not forget, however, that NSA’s success is due not just to the efforts of the well- known legends of the cryptologic past, but also to the dedicated work of thousands of men and women whose names will never be noted in any history book. History tells us that both genius and hard work are required to ensure success. -
Espionage Against the United States by American Citizens 1947-2001
Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. -
NSA Newsletter, April 1999
.The commencement exercises for the Honoring Those Who Serve-Armed Forces Week Community College of the Air Force-a special guest speaker has been invited to address the graduat "The 21st century, notthe 20th cen Service Color Guard will hoist the ing class. tury, will prove to be the brightest era Colors. A joint military formation fea for NSA/CSS and our people. As we turing each of the Services will be rep In remembrance of the Agency's fall stand on the frontier ofmany oppor resented at the ceremony. The Director en heroes, the Army and Air Force tunities, we must all remember: it is will hold a joint wreath-laying ceremo the Marine, not the reporter, who ny at the National Vigilance Park. gives us freedom of speech; it is the Thanks to the assistance offered by Sailor, not the poet, who gives us free the National Cryptologic Museum, and dom of expression; it is the Airman, other groups, displays will be set up not the campus demonstrator, who throughout the NSA/CSS campus to gives us the freedom to commemorate draw attention to the contributions of events, such as Armed Forces Week; military coworkers to the defense of and it is the Soldier, who at the dark the Nation. est hour, stands by the flag and says The Armed Services feature a num 'this we'll defend,' who gives us the ber of professional-caliber musical promise ofthe future." groups, and NSA has invited several to -Lt Gen Minihan participate in this year's celebration. Armed Forces Week (A1-''"'W) is not 5KRun simply a time to recognize the service The annual CWF/AFW 5K Run provided by the men and women of will take place Thursday, May 13. -
Legal Studies Research Paper Series
Unlimited War and Social Change: Unpacking the Cold War’s Impact Mary L. Dudziak USC Legal Studies Research Paper No. 10-15 LEGAL STUDIES RESEARCH PAPER SERIES University of Southern California Law School Los Angeles, CA 90089-0071 Unlimited War and Social Change: Unpacking the Cold War’s Impact Mary L. Dudziak Judge Edward J. and Ruey L. Guirado Professor of Law, History and Political Science USC Gould Law School September 2010 This paper is a draft chapter of WAR · TIME: A CRITICAL HISTORY (under contract with Oxford University Press). For more on this project, see Law, War, and the History of Time (forthcoming California Law Review): http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1374454. NOTE: This is very much a working draft, not a finished piece of work. I would be grateful for any comments and criticism. I can be reached at: [email protected]. copyright Mary L. Dudziak © 2010 Unlimited War and Social Change: Unpacking the Cold War’s Impact Abstract This paper is a draft chapter of a short book critically examining the way assumptions about the temporality of war inform American legal and political thought. In earlier work, I show that a set of ideas about time are a feature of the way we think about war. Historical progression is thought to consist in movement from one kind of time to another (from wartime to peacetime, to wartime, etc.). Wartime is thought of as an exception to normal life, inevitably followed by peacetime. Scholars who study the impact of war on American law and politics tend to work within this framework, viewing war as exceptional. -
Who Watches the Watchmen? the Conflict Between National Security and Freedom of the Press
WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment. -
Military Intelligence (MI) Is Always Engaged and Always Looking Forward with an Eye to Future Threats
July - September 2008 PB 34-O8-3 MI MISSIONS OF THE NEAR FUTURE MIPB_Jul-Sep_08_Master.indd 1 11/25/2008 10:50:34 AM FROM THE EDITOR Military Intelligence (MI) is always engaged and always looking forward with an eye to future threats. This issue takes a look at how MI is adapting to the current operational environment and developing tactics, techniques, and procedures to counter the threat today and in the near future. Two articles speak to the use of persistent surveillance to support the current fight, capabilities and lim- itations, and employment in the future modular force. An article from the 82nd Airborne Division talks about an initiative from the 1/82 BCT, the Special Weapons Exploitation Team, an internally resourced BCT capability to analyze enemy effects and counter threat weapons/tactics in today’s and tomorrow’s complex combat environments. The MI Noncommissioned Officers’ Academy has recently upgraded its automation to enhance training by adding a Thin Client to each student’s workstation. This and near future plans to take advantage of OSINT data in training are explained in the CSM Forum. Also included are articles on the Red Teaming concept, adapting Counterintelligence to counter low in- tensity collection of technology, and an introduction to the Defense Support to Civil Authorities Disaster Intelligence concept. Personal experiences from Iraq are related in two articles, one dealing with working with Coalition intel- ligence forces; and the other with border operations with the Iraqi Security Forces. A historical perspective takes a look at the causes of the resurgency of the Taliban in Afghanistan Finally, a reprint of an article from the Defense Intelligence Agency’s Communique describes that agen- cy’s efforts to provide its employees with the kind of work environment needed to successfully support the Warfighter. -
AA-34-5 Fort George G. Meade, National Security Agency, EAGLE Health and Physical Fitness Center, Building 9810
AA-34-5 Fort George G. Meade, National Security Agency, EAGLE Health and Physical Fitness Center, Building 9810 Architectural Survey File This is the architectural survey file for this MIHP record. The survey file is organized reverse- chronological (that is, with the latest material on top). It contains all MIHP inventory forms, National Register nomination forms, determinations of eligibility (DOE) forms, and accompanying documentation such as photographs and maps. Users should be aware that additional undigitized material about this property may be found in on-site architectural reports, copies of HABS/HAER or other documentation, drawings, and the “vertical files” at the MHT Library in Crownsville. The vertical files may include newspaper clippings, field notes, draft versions of forms and architectural reports, photographs, maps, and drawings. Researchers who need a thorough understanding of this property should plan to visit the MHT Library as part of their research project; look at the MHT web site (mht.maryland.gov) for details about how to make an appointment. All material is property of the Maryland Historical Trust. Last Updated: 05-15-2018 MARYLAND HISTORICAL TRUST NR Eligible: yes DETERMINATION OF ELIGIBILITY FORM no X Property Name: Building 9810 (EAGLE Health & Fitness Center) Inventory Number: AA-34-5 Address: 9810 Emory Road Historic district: yes X no City: Fort Meade Zip Code: 20755 County: Anne Arundel Property Owner: U.S. Government Tax Account ID Number: 90042590 Tax Map Parcel Number(s): 0372 Tax Map Number: 0029 ~~~~~~~~~~ ~~~~~~~~~ Project: East Campus Integration Program EIS, Fort Meade, MD Agency: National Security Agency (NSA) Agency Prepared By: HOR, Inc. -
Coverage of the Jonathan Pollard Spy Case
University of Pennsylvania ScholarlyCommons Departmental Papers (ASC) Annenberg School for Communication 6-1-2001 Defending the American Dream: Coverage of the Jonathan Pollard Spy Case Barbie Zelizer University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/asc_papers Part of the Journalism Studies Commons Recommended Citation Zelizer, B. (2001). Defending the American Dream: Coverage of the Jonathan Pollard Spy Case. Qualitative Sociology, 24 (2), 203-220. https://doi.org/10.1023/A:1010722225840 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/asc_papers/71 For more information, please contact [email protected]. Defending the American Dream: Coverage of the Jonathan Pollard Spy Case Abstract This article contemplates the journalistic coverage of American espionage as an attempt to maintain consonance with broader cultural discourses about what it means to be an American. Tracking the American press coverage of the Jonathan Pollard spy case, the article demonstrates that the press turns espionage into a phenomenon upholding fundamental American beliefs in openness, sincerity, and straightforwardness. It shows that, rather than represent espionage as a phenomenon embodying deceit, secrecy, and immoral action, the press turns espionage into a phenomenon that communicates that one is what one says one is and that one's self presentation reflects one's insides. Ultimately, however, this representation of espionage undermines a full understanding of how - and why - spying works in culture. Disciplines Communication | Journalism Studies This journal article is available at ScholarlyCommons: https://repository.upenn.edu/asc_papers/71 Defending the American Dream: Coverage of the Jonathan Pollard Spy Case Barbie Zelizer Abstract This article contemplates the journalistic coverage of American espionage as an attempt to maintain consonance with broader cultural discourses about what it means to be an American. -
Spy-Traitors
INSTITUTE FOR THE STUDY OF WESTERN CIVILIZATION SUMMER SERIES OF THE HISTORY OF ESPIONAGE LECTURE 9: SPY-TRAITORS TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Sorge 1895-1944 TuesdayAugust 27, 2019 The Cambridge Five: Cairncross, Blunt, Burgess, Philby, Maclean TuesdayAugust 27, 2019 Alger Hiss 1904-1996 TuesdayAugust 27, 2019 Julius Rosenberg 1918-1953 TuesdayAugust 27, 2019 Klaus Fuchs 1911-1988 TuesdayAugust 27, 2019 Theodore Hall 1925-1999 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John le Carre TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Richard Miller, FBI TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Surveillance photo: Richard Miller and Svetlana Ogorodnikova TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Betty Pack “Cynthia” TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 John Profumo and Christine Keeler TuesdayAugust 27, 2019 “Hi brucet, the hottest man in the world! My name is Nastya and I’m from Russia, but currently I live in the USA. I just wanted you to know that I liked you from your photos and would like to know more about you. Let me know if you would like to get in touch, here is my email [email protected]. Cheers, Nastya.” —Suspicious invitation from a suspected Russian agent, recently received by Bruce Thompson TuesdayAugust 27, 2019 Bruce T. Paul N. TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 “The hottest man in the world,” or the target of a Russian “honey trap”? TuesdayAugust 27, 2019 TuesdayAugust 27, 2019 Ronald Pelton, NSA b.