Modern Safeguards for Modern Surveillance: an Analysis of Innovations in Communications Surveillance Techniques

Total Page:16

File Type:pdf, Size:1020Kb

Modern Safeguards for Modern Surveillance: an Analysis of Innovations in Communications Surveillance Techniques Modern Safeguards for Modern Surveillance: An Analysis of Innovations in Communications Surveillance Techniques Gus HoSEIN* & CAROLINE WILSON PALOWt TABLE OF CONTENTS 1. INTRODUCTION ................................ .......... 1071 A. A BriefHistory of CommunicationsSurveillance ... ..... 1073 B. Modern Communications Surveillance Techniques.............. 1080 1. Targeted Use of Offensive Technologies ...... ..... 1080 2. Targeted and Semi-targeted Use of Mobile Phone Surveillance ......................... ..... 1 081 3. Mass Surveillance ofNetwork Activity .................. 1082 II. THE RISKS OF MODERN COMMUNICATIONS SURVEILLANCE........... 1083 A. Secrecy .................................... 1085 B. DirectedSurveillance: The Two-Body Problem... ...... 1085 C. Overbreadth ............................ ..... 1086 D. Applicability of ConstitutionalProtections Against UnreasonableSearch and Seizure .................. 1088 E. Other ConstitutionalConcerns ............... ..... 1089 III. How SHOULD COURTS APPROACH THESE NEW TECHNIQUES? .. .. 1089 A. Offensive Technologies .................... ..... 1093 B. Mobile Monitoring Devices ............... ....... 1097 C. Mass Surveillance of the Network .............. .... 1102 IV. CONCLUSION........................................ 1104 I. INTRODUCTION To understand communications surveillance law is to try to resolve the three-body problem of simultaneously comprehending law, policy, and technology while at least two of the three may be changing at any moment in time. This makes it one of the more exciting domains for scholars, analysts, and technologists, but it is also one of the most challenging. Communications surveillance is a rapidly shifting landscape from the perspectives of policy and technology. Governments across the world are deploying new techniques and technologies with alarming speed. We are achieving new levels of surveillance, quickly approaching what Justice Brandeis warned about when he said that "[s]ubtler and more far-reaching means of invading privacy have become available to the Government," and that * Gus Hosein is the Executive Director of Privacy International. t Caroline Wilson Palow is a Legal Officer at Privacy International. 1072 OHIO STATE LA WJOURNAL [Vol. 74:6 "[d]iscovery and invention have made it possible for the Government, by means far more effective than stretching upon the rack, to obtain disclosure in court of what is whispered in the closet."' There is a rapidly growing market in communications surveillance technologies that can conduct surveillance in ways that just ten years ago were well beyond the limits of our technology and often our imaginations. With widespread innovations in policy and technology across the world, what is most surprising is how old-fashioned our legislation is, and in turn, our safeguards. Many communications surveillance laws were drafted in the 1980s and 1990s, with updates in the 1990s and early 2000s. 2 Many countries across the world are still introducing laws on communications surveillance, but their models are quite old, often borrowing language from laws from the 1990s (in the case of U.S. and UK law) and international conventions such as the Council of Europe Cybercrime Convention of 2001.3 They all ban interception of communications content, grant exceptions to government agencies, permit access to information about the communications (so-called communications metadata), establish authorization and oversight regimes, and permit government to order communications service providers to provide capabilities for lawful intercept and/or access.4 But they are not keeping pace with the new forms of advanced surveillance techniques and policies being deployed. In this Article we will draw out the modern landscape of surveillance policy and technologies (Part I). The deployment of new techniques and technologies is being done without new legal frameworks, and as such, we must resort to relying on older frameworks that may be unable to understand these new IOlmstead v. United States, 277 U.S. 438, 473 (1928) (Brandeis, J., dissenting). 2See, e.g., Electronic Communications Privacy Act (ECPA) of 1986, Pub. L. No. 99- 508, 100 Stat. 1848 (codified as amended in scattered sections of 18 U.S.C.) (amending and updating Title III of the Omnibus Crime Control and Safe Streets Act of 1968, commonly called the Wiretap Act); Communications Assistance for Law Enforcement Act (CALEA) of 1994, Pub. L. No. 103-414, 108 Stat. 4279 (codified at 47 U.S.C. §§ 1001-1010 (2012)) (further amending the Wiretap Act and Stored Communications Act in 1994); Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (USA PATRIOT ACT) of 2001, Pub. L. No. 107-56, 115 Stat. 272 (codified in scattered sections of the U.S.C.) (further amending the Wiretap Act and Stored Communications Act); Interception of Communications Act (IOCA), 1985, c. 56 (Eng.) (regulating the interception of communications); Regulation of Investigatory Powers Act (RIPA), 2000, c. 23 (Eng.) (replacing IOCA); Telecommunications (Interception Capability) Act 2004 (Act No. 19/2004) (N.Z.); Loi relative Ala protection de la vie priv6e contre les 6coutes, la prise de connaissance et l'enregistrement de communications et de t616communications priv6es of June 30, 1994, MONITEUR BELGE [M.B.] [Official Gazette of Belgium], Jan. 24, 1995, 01542. 3 Council of Europe Convention on Cybercrime, Nov. 23, 2001, E.T.S. No. 185, available at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm. 4 See, e.g., Wire and Electronic Communications Interception and Interception of Oral Communications (Wiretap Act), 18 U.S.C. §§ 2510-2522 (2012); RIPA, 2000, c. 23; Telecommunications Act, 2004 (N.Z.); Regulation of Interception of Communications and Provision of Communication-Related Information Act 70 of 2002 § 5 (S. Afr.). 2013] MODERN SAFEGUARDS FOR MODERN SUR VEILLANCE 1073 techniques, or constitutional safeguards that have a long and troubled history with innovation (Part II). Using the example of the lack of legislative activity in the United States, we look at how lower courts are trying to resolve the Fourth Amendment concerns inherent in some of these techniques, and make suggestions regarding how we believe current law should be applied (Part III). We are in a moment of great uncertainty characterized by the absence of legislative activity implementing real safeguards, use of new communications surveillance capabilities often in secretive ways, and courts grappling to understand new technologies. Laws, technologies, and the courts have, until now, maintained a delicate balance on communications surveillance; when new technologies posed new threats, often the courts or the legislative bodies would respond. If one branch failed, another would usually pick up the gauntlet. After the U.S. Supreme Court decided that interception of communications did not qualify as a search under the Fourth Amendment in 1928,5 Congress responded in the 1930s with strict controls. 6 In the 1960s the Supreme Court and Congress fed off one another to develop jurisprudence7 and legislation.8 Responding to abuses in the 1970s, Congress enacted new laws, 9 and when the Supreme Court decided against protecting certain metadata,' 0 Congress responded with rules on "trap and trace" and "pen registers."" Unfortunately, we are currently seeing a lack of interest in safeguards from Congress and other legislatures around the world, while technical capabilities are expanding. There is even speculation that the Foreign Intelligence Security Court is being activist in enabling surveillance.12 It is high time to reintroduce safeguards into the conversation, and to apply them against technologies that are increasingly used to conduct directed and mass surveillance of our sensitive information. A. A Brief History of Communications Surveillance Communications surveillance is almost as old as our ability to communicate.13 While our attempts to regulate that surveillance are more recent, they still lag behind the pace of technological innovation. Scholars thus 5 Olmstead, 277 U.S. at 464. 6 See Communications Act of 1934, Pub. L. No. 416, 48 Stat. 1064 (codified as amended in scattered sections of 47 U.S.C.). 7 See, e.g., Katz v. United States, 389 U.S. 347 (1967). 8 See Omnibus Crime Control and Safe Streets Act of 1968, Pub. L. No. 90-351, 82 Stat. 197 (codified as amended at 18 U.S.C. §§ 2510-2522 (2012)) (containing Title III, commonly referred to as the Wiretap Act). 9 See Foreign Intelligence Surveillance Act (FISA) of 1978, Pub. L. No. 95-511, 92 Stat. 1783 (codified as amended in scattered sections of 50 U.S.C.). 10 See Smith v. Maryland, 442 U.S. 735, 745-46 (1979). 11 See ECPA of 1986, Pub. L. No. 99-508, 100 Stat. 1868. 1 2 See Eric Lichtblau, In Secret, Court Vastly Broadens Powers of N.S.A., N.Y. TIMES, July 7, 2013, at Al. 13 For a history of communication surveillance going back to the Egyptians, see generally DAVID KAHN, THE CODEBREAKERS: THE STORY OF SECRET WRITING (1967). 1074 OHIO STATE LAW JOURNAL [Vol. 74:6 struggle to understand how to resolve modem forms of communications surveillance with older legal frameworks. For instance, our abilities to comprehend what a constitutional statement about a right to privacy actually means may be linked with the state of surveillance at the time. Efforts to monitor communications are of course linked to our methods of communicating. With letters and post came the interception of postal communications. With the
Recommended publications
  • The NAMTA Journal
    The NAMTA Journal Back To The Future Volume 45. Number 1 May 2021 Molly OʼShaughnessy Jacqui Miller Kimberlee Belcher-Badal Ph.D. Robyn MilosGregory MacDonald Jennifer ShieldsJacquie Maughan Lena WikramaratneAudrey Sillick Gerard Leonard Kathleen Allen Jim RobbinsDeborah Bricker Dr. Maria Montessori Mario M. Montessori A.M. Joosten Mary Black Verschuur Ph.D. John McNamara David Kahn TABLE OF CONTENTS BACK TO THE FUTURE:WHY MONTESSORI STILL MATTERS …………..………….…….7 Molly O’Shaughnessy THE RETURN TO SCIENTIFIC PEDAGOGY: EMBRACING OUR ROOTS AND RESPONSIBILITIES……………………………………………………………………….33 Jacqui Miller and Kimberlee Belcher-Badal Ph.D. IN REMEMBRANCE………………………………..……………..……………………...53 Deborah Bricker TRIBUTE TO ANNETTE HAINES…………………..……………..……………………....56 Robyn Milos TRIBUTE TO KAY BAKER………………………..……………..…………………….... 59 Gregory MacDonald TRIBUTE TO JOEN BETTMANN………………..………………..………………………..62 Jennifer Shields GUIDED BY NATURE…………….…………..………….……..………………………..66 Jacquie Maughan THE CHILD IN THE WORLD OF NATURE…….………..…………………………..69 Lena Wikramaratne SOWING THE SEEDS OF SCIENCE:OUR GIFT TO THE FUTURE…………………...78 Audrey Sillick EXPERIENCES IN NATURE:RESOLUTE SECOND-PLANE DIRECTIONS……….……...88 TOWARD ERDKINDER Gerard Leonard and Kathleen Allen 2 The NAMTA Journal • Vol. 44, No. 1 • Winter 2020 ECOPSYCHOLOGY:HOW IMMERSION IN NATURE AFFECTS YOUR HEALTH……….107 TOWARD ERDKINDER Jim Robbins SILENCE AND LISTENING ……………………..………………...……..………….…….115 Gerard Leonard ABOUT THE IMPORTANCE AND THE NATURE OF THE SILENCE GAME…………………………………..………………...………………….. 117
    [Show full text]
  • NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC.
    [Show full text]
  • 2003 Iraq War: Intelligence Or Political Failure?
    2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? A Thesis submitted to the Faculty of The School of Continuing Studies and of The Graduate School of Arts and Sciences in partial fulfillment of the requirements for the degree of Master of Arts in Liberal Studies By Dione Brunson, B.A. Georgetown University Washington, D.C. April, 2011 DISCLAIMER THE VIEWS EXPRESSED IN THIS ACADEMIC RESEARCH PAPER ARE THOSE OF THE AUTHOR AND DO NOT REFLECT THE OFFICIAL POLICIES OR POSITIONS OF THE U.S. GOVERNMENT, DEPARTMENT OF DEFENSE, OR THE U.S. INTELLIGENCE COMMUNITY. ALL INFORMATION AND SOURCES FOR THIS PAPER WERE DRAWN FROM OPEN SOURCE MATERIALS. ii 2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? Dione Brunson, B.A. MALS Mentor: Ralph Nurnberger, Ph.D. ABSTRACT The bold U.S. decision to invade Iraq in 2003 was anchored in intelligence justifications that would later challenge U.S. credibility. Policymakers exhibited unusual bureaucratic and public dependencies on intelligence analysis, so much so that efforts were made to create supporting information. To better understand the amplification of intelligence, the use of data to justify invading Iraq will be explored alongside events leading up to the U.S.-led invasion in 2003. This paper will examine the use of intelligence to invade Iraq as well as broader implications for politicization. It will not examine the justness or ethics of going to war with Iraq but, conclude with the implications of abusing intelligence. iii ACKNOWLEDGMENTS Thank you God for continued wisdom. Thank you Dr. Nurnberger for your patience. iv DEDICATION This work is dedicated to Mom and Dad for their continued support.
    [Show full text]
  • DOCID: 3700821 Communications Security and the Problem of Hamlet
    .DOCID: 3700821 UNCLASSIFIED Communications Security and the Problem of Hamlet: To Be or Not to Be DANIELJ. KNAUF Editor's Note: Mr. Knauf presented this paper at the conuention of the Armed Forces Communications Electronics Association (AFCEA) in Anaheim, California, on 29 January 1986. We believe that Mr.Knauf 's comments on communications security from the perspective ofa Shakespearean tragedy will be of interest to many ofour readers. 1. INTRODUCTION At risk of offending the many serious students oi Shakespeare, all English majors, and assorted other literati, I should like to examine the communications security of the United States against a slightly unusual backdrop: the tragic story of Hamlet, Prince ofDenmark. William Shakespeare, aft.er all, begins this psychologico.l drama with two words of special interest to those of us in the telecommunications business: "Who's there?" asked by a soldier named Bernardo. The guard to whom he addresses this question, Francisco, has obviously been briefed on proper challenge-and-reply authentication procedures (i.e., that the called party must always initiate the challenge), and stoutly replies: Nay, answer" me: stand, and unfold yourself. Fortunately for Bernardo, they are using an easy-to-remember if not-very- secure password ("Long Live the King"), and so we are allowed to enter into one of the greatest plays ever written - one which adds to its greatness by clearly showing the consequences of poor communications security (Comsec). We may admire, for example, Hamlet's use of Comsec as a "force multiplier" in his neat disposal of that treacherous duo, Rosencrantz and Guildenstern, as he tells his friend, Horatio, in Act V: Scene 2.
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • National Programmes for Mass Surveillance of Personal Data in Eu Member States and Their Compatibility with Eu Law
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS NATIONAL PROGRAMMES FOR MASS SURVEILLANCE OF PERSONAL DATA IN EU MEMBER STATES AND THEIR COMPATIBILITY WITH EU LAW STUDY Abstract In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this study makes an assessment of the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of surveillance practices at stake, which represent a reconfiguration of traditional intelligence gathering, the study contends that an analysis of European surveillance programmes cannot be reduced to a question of balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The study argues that these surveillance programmes do not stand outside the realm of EU intervention but can be engaged from an EU law perspective via (i) an understanding of national security in a democratic rule of law framework where fundamental human rights standards and judicial oversight constitute key standards; (ii) the risks presented to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners, and (iii) the potential spillover into the activities and responsibilities of EU agencies.
    [Show full text]
  • Foreign Intelligence Surveillance Act of 1978
    FOREIGN INTELLIGENCE SURVEILLANCE ACT OF 1978 HEARINGS BEFORE THE SUBCOMMITTEE ON INTELLIGENCE AND THE RIGHTS OF AMERICANS OF THE SELECT COMMITTEE ON INTELLIGENCE OF THE UNITED STATES SENATE NINETY-FIFTH CONGRESS SECOND SESSION ON S. 1566 FOREIGN INTELLIGENCE SURVEILLANCE ACT O1 1978 JTLY 19, 21, 1977 AND FEBRUARY 8, 24, 27, 1978 Printed for the use of the Select Committee on Intelligence U.S. GOVERNMENT PRINTING OFFICE 94-628 WASHINGTON: 1978 For sale by the Superintendent of Documents, U.S. Government Printing Office Washington, D.C. 20402 Stock Number 052-070-04477-2 SENATE SELECT COMMITTEE ON INTELLIGENCE (Established by S. Res. 400, 94th Cong., 2d sess.) DANIEL K. INOUYE, Hawaii, Chairman BARRY GOLDWATER, Arizona, Vice Chairman BIRCH BAYE, Indiana CLIFFORD P. CASE, New Jersey ADLAI E. STEVENSON, Illinois JA GMEN, Utah WILLIAM D. HATHAWAY, Maine CHARLES McC. MATHIAS, Sn., Maryland WALTER D. HUDDLESTON, Kentucky JAMES B. PEARSON, Kansas JOSEPH R. BIDEN, J., Delaware JOHN H. CHAFES, Rhode Island ROBERT MORGAN, North Carolina RICHARD G. LUGAR, Indiana GARY HART, Colorado MALCOLM WALLOP, Wyoming DANIEL PATRICK MOYNIHAN, New York ROBERT C. BYRD, West Virginia, Ew Officio Member HOWARD H. BAKER, JR., Tennessee, Ex Officio Member WILLIAM 0. MILLER, Staff Director EARL D.EIsHNHOWER, Minority Staff Director AUDREY H. HATCR, Chief Clerk SUBCOsMITTE ON INTELLIGENCE AND THE ]RIGHTS OF AMERICANS BIRCH BAYH, Indiana, Chiran SAKE GARN, Utah, Vice Chairman ROBERT MORGAN, North Carolina CLIFFORD P. CASE, New Jersey DANIEL PATRICK MOYNIHAN, New York JOHN H. CHAFEE, Rhode Island CONTENTS HEARING DAYS Page Tuesday, July 19, 1977 1----. Thursday, July 21, 1977---------------------------------------------- 45 Wednesday, February 8, 1978 ----------------------------------------- 87 Friday, February 24, 1978 ------------------------------------------- 185 Monday, February 27, 1978 ------------------------------------------- 11 LIST OF WITNESSES TUESDAY, JULY 19, 1977 Testimony of Griffin B.
    [Show full text]
  • 1 Collect It All: Everyday Lives Turned Into Passive Signals Intelligence
    GCHQ and UK Mass Surveillance Chapter 1 1 Collect it all: everyday lives turned into passive signals intelligence 1.1 Introduction The NSA and GCHQ have stated their desire to “collect all the signals, all the time”.i To fulfil this aim, they want the ability to collect all data generated by our daily use of the Internet, phones and other technology. Through the wiretapping of international fibre optic cables, the communications of billions of people are intercepted every day. These include our personal phone calls, emails, text messages and web searches. The information provided by these communications can be broadly split into the actual content of the communication and the communications data, also called metadata, the information on when, where and to whom it was communicated. GCHQ collects both the content of communications, what is being said, and the metadata of communications. Traditionally metadata collection was perceived as less intrusive than the interception of content – reading the envelope was not as bad as opening and reading the letter. But nowadays it is widely acknowledged that metadata can provide an intimate picture of an individual’s life. We can map social relationships and traveling patterns just from metadata, without anyone looking at the contents of messages. At present, content and communications data are treated differently under the law but they can both be used to gain intrusive insights into our life. As well as collecting our personal communications data, GCHQ and the NSA have programmes that can collect data from apps, web cams and social media. The data we 1 of 16 GCHQ and UK Mass Surveillance generate will proliferate as more and more household products, from cars to fridges, use digital technology.
    [Show full text]
  • Revised Edition 2019 Dedicated to the Memory of the Allied Polish Cryptanalysts
    The Cryptographic Mathematics of ⒺⓃⒾⒼⓂⒶ This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email your request to [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Color photographs, David S. Reynolds, NSA/CSS photographer Cover: General Heinz Guderian in armored command vehicle with an Engima machine in use, May/June 1940. German Federal Archive The Cryptographic Mathematics of Enigma Dr. A. Ray Miller Center for Cryptologic History National Security Agency Revised edition 2019 Dedicated to the Memory of the Allied Polish Cryptanalysts Marian Rejewski Jerzy Rozycki Henryk Zygalski he Enigma cipher machine had the confidence of German forces who depended upon its security. This misplaced con- Tfidence was due in part to the large key space the machine provided. This brochure derives for the first time the exact number of theoretical cryptographic key settings and machine configura- tions for the Enigma cipher machine. It also calculates the number of practical key settings Allied cryptanalysts were faced with daily throughout World War II. Finally, it shows the relative contribution each component of the Enigma added to the overall strength of the machine. ULTRA [decrypted Enigma messages] was the great- est secret of World War II after the atom bomb. With the exception of knowledge about that weapon and the prob- able exception of the time and place of major operations, such as the Normandy invasion, no information was held more tightly….
    [Show full text]
  • Syria: Syrian Telecommunications Establishment, Syrian Computer Society
    2 ENEMIES OF THE INTERNET / 12 MARCH 2014 //////////////////////////////////////////////////////////////////////////////////////// INTRODUCTION ........................................................................................................... 4 EUROPE AND CENTRAL ASIA .................................................................................. 8 Belarus: Operations and Analysis Centre ....................................................... 8 Russia: Federal Security Service ............................................................................ 10 Turkmenistan: TurkmenTelecom ............................................................................. 12 United Kingdom: Government Communications Headquarters ....................... 13 Uzbekistan: Expert Commission on Information and Mass Communication ................................................................................. 16 AMERICAS .................................................................................................................... 18 Cuba: Ministry of Informatics and Communications ............................................ 18 USA: National Security Agency ............................................................................... 20 MIDDLE EAST AND NORTH AFRICA ............................................................................... 23 Bahrain: Ministry of Interior, National Security Apparatus ............................................................................ 23 Iran: Supreme Council for Cyberspace, Working Group
    [Show full text]
  • Intelligence Special Relationship’ Between Britain and the United States Written by Jonjo Robb
    The ‘Intelligence Special Relationship’ between Britain and the United States Written by Jonjo Robb This PDF is auto-generated for reference only. As such, it may contain some conversion errors and/or missing information. For all formal use please refer to the official version on the website, as linked below. The ‘Intelligence Special Relationship’ between Britain and the United States https://www.e-ir.info/2014/06/15/the-intelligence-special-relationship-between-britain-and-the-united-states/ JONJO ROBB, JUN 15 2014 Is it accurate to talk of an ‘intelligence special relationship’ between Britain and the United States? The United Kingdom and the United States are often regarded as having incredibly close and cordial bilateral relations, to the extent that this is often described as a ‘special relationship’. President Barack Obama remarked when addressing Parliament on a state visit to the UK in 2011 that the two nations enjoyed ‘one of the oldest, one of the strongest alliances the world has ever known’.[1] On taking office in 2010, Secretary of State for Foreign & Commonwealth Affairs William Hague commented that ‘the United States is without doubt the most important ally of the United Kingdom’.[2] The two states share a language, a vast history, and a number of interests and values. The UK and USA have both in the past and at present cooperated intensively on military matters. Both were members of the ‘Big Three’ during World War II, both were founding members of NATO, and both formed the leading contingents in the invasions of Afghanistan and Iraq. As a result of their shared military experiences, the UK and USA have also cooperated on intelligence matters.
    [Show full text]
  • The National Cryptologic Museum Library
    Cross References The National Cryptologic Museum Library Eugene Becker Last year, a widely published German technical author, Klaus Schmeh, e-mailed the library of the National Cryptologic Museum from his home in Gelsenkirchen, Germany. He needed information for an article on the Kryha cipher machine, a device popular in the 1920s. Librarian Rene Stein found articles about the machine but, even more useful, she found unpublished correspondence between Alexander von Kryha, the machine’s inven- tor, and a German who had invested in the machine. She photocopied the files and sent them to Schmeh, who used them for a talk at the 2009 Cryptologic History Symposium and for an article in Cryptologia magazine. Thus the museum advanced knowledge of the history of cryptology. When scholar Chris Christensen needed information on the US Navy cryptology corre- spondence courses for his article on William Wray, an early NSA mathematician, he con- tacted the museum library. From its collection of Special Research Histories, he obtained copies of the courses produced by the Navy between 1937 and 1946. In researching his book on the vocoder, which played a role in speech scrambling, David Tompkins met at the NSA Museum with Frank Gentges, a vocoder consultant dur- ing the Cold War. Gentges and his partner, the late David Coulter, had contributed their collection of speech cryptodevices to the museum. Gentges took Tompkins on a Cold War “Secure Voice” tour, explaining the HY-2 vocoder and the STU-II and STU-III phone systems. (The museum's audio history of secure voice was also helpful.) Because Tomp- kins was primarily interested in the replica of the extremely secure World War II SIG- SALY voice encryption system, he and Gentges spent most of the day in the library going through declassified SIGSALY files.
    [Show full text]