Anglo-American Privacy and Surveillance Laura K

Total Page:16

File Type:pdf, Size:1020Kb

Anglo-American Privacy and Surveillance Laura K Journal of Criminal Law and Criminology Volume 96 Article 8 Issue 3 Spring Spring 2006 Anglo-American Privacy and Surveillance Laura K. Donohue Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Laura K. Donohue, Anglo-American Privacy and Surveillance, 96 J. Crim. L. & Criminology 1059 (2005-2006) This Criminal Law is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/06/9603-1059 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 96, No. 3 Copyright 0 2006 by Northwestern University, School of Law Printed in US.A. CRIMINAL LAW ANGLO-AMERICAN PRIVACY AND SURVEILLANCE LAURA K. DONOHUE* TABLE OF CONTENTS IN TROD UCTION ........................................................................................ 106 1 I. SURVEILLANCE AND THE LAW INTHE UNITED STATES ....................... 1064 A. REASONABLE EXPECTATION OF PRIVACY ............................ 1065 B. NATIONAL SECURITY AND SURVEILLANCE .......................... 1072 1. The R ed Scare............................................................................. 1073 2. Title III ........................................................................................ 10 7 7 3. Executive Excess ......................................................................... 1080 a. NSA: Operation SHAMROCK and MINARET ......... 1080 b. FBI: COINTELPRO and the Security Index/ADEX.. 1082 c. CIA: Operation CHAOS ............................................. 1087 d. DOD: Operation CONUS ........................................... 1088 4. The Church Com m ittee ............................................................... 1090 5. The ForeignIntelligence Surveillance Act ................................. 1094 C. THE INFORMATION AGE .............................................................. 1098 1. 1994 Communications Assistancefor Law Enforcement Act ..... 1099 2. 2001 USA PATRIO TAct ............................................................. 1101 a. FISA A lterations ......................................................... 1103 b. Delayed Notice Search Warrants ................................ 1107 Fellow, Center for International Security and Cooperation, Stanford University. Special thanks to Paul Lomio, Sonia Moss, and Erika Wayne at the Robert Crown Law Library, for help in acquiring the materials used in this article. I am indebted to Barbara Babcock and Robert Weisberg for suggestions on the American constitutional discussion and to Clive Walker for comments on British surveillance law. This piece is part of a longer study of counterterrorist law in the United Kingdom and United States that will be published this coming year by Cambridge University Press. 1059 1060 LAURA K DONOHUE [Vol. 96 c. National Security Letters ............................................. 1108 D. WEAKENING OF THE ATTORNEY GENERAL GUIDELINES.. 1118 E. SURVEILLANCE OPERATIONS .................................................... 1121 1. CounterintelligenceField Activity .............................................. 1121 2. Echelon ....................................................................................... 1 12 7 3. Carnivore/DCS1000 .................................................................. 1129 4. Magic Lantern ............................................................................ 1131 5. Terrorism Information and Prevention System (TIPS) ............... 1132 6. Watch L ists ................................................................................. 1 13 6 F. DATA MININ G ................................................................................. 1139 1. Advances in Technology and the Commodification of Information ..................................................................................... 1140 2. Data Mining Operations............................................................. 1144 II. SURVEILLANCE AND THE LAW IN THE UNITED KINGDOM ................. 1152 A. THE EVOLUTION OF INFORMATION-GATHERING AUTHORITY ................................................................................. 1156 1. PropertyInterference ................................................................. 1156 2. Interception of Communications................................................. 1159 a. Malone v. United Kingdom and its aftermath .............. 1164 b. Halford v. United Kingdom and the Regulation of Investigatory Powers Act 2000 ................................. 1166 c. Effectiveness of Safeguards ........................................ 1168 3. Covert Surveillance: Intrusive, Directed, Covert Human Intelligence Sources........................................................................ 1173 a. Khan v. United Kingdom ............................................. 1174 b. 2000 Regulation of Investigatory Powers Act ............ 1175 4. Encrypted Data........................................................................... 1178 B. POST-9/1 1: THE 2001 ANTI-TERRORISM, CRIME AND SECURITY ACT ............................................................................ 1180 C. ANONYMITY AND SURVEILLANCE IN PUBLIC SPACE: C C T V ............................................................................................. 1184 1. Data ProtectionAct 1998 ........................................................... 1186 2. European Courts ........................................................................ 1187 3. CCTV in the United States .......................................................... 1188 III. POLICY CONSIDERATIONS ................................................................. 1190 A . R ISK S ................................................................................................ 1 19 0 1. S ubstantive .................................................................................. 1 19 1 2. Politica l ...................................................................................... 1 19 3 3 . L ega l ........................................................................................... 1 19 4 4. Socia l .......................................................................................... 1 19 5 2006] PRIVACY AND SURVEILLANCE 1061 5. Econom ic ....................................................................................1 19 9 B . O PT IO N S ..........................................................................................1200 CONCLUDING REMARKS .........................................................................1206 INTRODUCTION In October 2001, President George W. Bush authorized the National Security Agency ("NSA") "to intercept the international communications of people with known links to al Qaida and related terrorist organizations." 1 Four years and two months later, news of the program became public. Attorney General Alberto Gonzales defended the Commander-in-Chief's power to ignore warrants otherwise required under the Foreign Intelligence Surveillance Act or Title III of the Omnibus Crime Control and Safe Streets Act. Congress itself had authorized the President to "use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided" the 9/11 attacks.3 For Gonzales, this meant that the President was acting "at the zenith of his powers" under the tripartite framework set forth by Justice Jackson in Youngstown v. Sawyer.4 This was not the first time Article II claims backed surveillance programs designed to protect the United States from attack. In the midst of the Cold War, the NSA ran Operations SHAMROCK and MINARET. The Federal Bureau of Investigation ("FBI") orchestrated COINTELPRO and amassed over 500,000 dossiers on American citizens. The Central Intelligence Agency ("CIA") oversaw Operation CHAOS and built a database that tracked 300,000 people. Routine counterintelligence operations disrupted everything from women's liberation to the civil rights movement. However, in 1978, Congress introduced the Foreign Intelligence Surveillance Act ("FISA") precisely to prevent unchecked executive surveillance of American citizens. And congressional interest in ensuring 1 President's Radio Address, 41 Weekly Comp. Pres. Doc. 1881 (Dec. 17, 2005), available at http://www.whitehouse.gov/news/releases/2005/12/20051217.html. 2 Foreign Intelligence Surveillance Act of 1978, Pub. L. No. 95-511, § 102, 92 Stat. 1786 (1978) (codified as amended at 50 U.S.C. §§ 1801-11 (2000)); Omnibus Crime Control and Safe Streets Act, Pub. L. No. 90-35 1, tit. 3, 82 Stat. 212 (codified at 18 U.S.C. §§ 2510-20). 3 Authorization for Use of Military Force, Pub. L. No. 107-40, §2(a), 115 Stat. 224, 224 (2001) (reported as a note to 50 U.S.C. § 1541). 4 U.S. DEP'T OF JUSTICE, LEGAL AUTHORITIES SUPPORTING THE ACTIVITIES OF THE NATIONAL SECURITY AGENCY DESCRIBED BY THE PRESIDENT 2 (2006) (discussing Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579, 635-38 (1952) (Jackson, J., concurring)). 1062 LAURA K DONOHUE [Vol. 96 oversight did not end there: in 1991 Congress amended the 1947 National Security Act to require the President to keep the congressional intelligence committees "fully and currently informed" of surveillance programs underway, including any "significant anticipated
Recommended publications
  • Volume 59, Issue 1
    Volume 60, Issue 4 Page 1023 Stanford Law Review THE SURPRISINGLY STRONGER CASE FOR THE LEGALITY OF THE NSA SURVEILLANCE PROGRAM: THE FDR PRECEDENT Neal Katyal & Richard Caplan © 2008 by the Board of Trustees of the Leland Stanford Junior University, from the Stanford Law Review at 60 STAN. L. REV. 1023 (2008). For information visit http://lawreview.stanford.edu. THE SURPRISINGLY STRONGER CASE FOR THE LEGALITY OF THE NSA SURVEILLANCE PROGRAM: THE FDR PRECEDENT Neal Katyal* and Richard Caplan** INTRODUCTION.....................................................................................................1024 I. THE NSA CONTROVERSY .................................................................................1029 A. The Foreign Intelligence Surveillance Act................................................1029 B. The NSA Program .....................................................................................1032 II. THE PRECURSOR TO THE FDR PRECEDENT: NARDONE I AND II........................1035 A. The 1934 Communications Act .................................................................1035 B. FDR’s Thirst for Intelligence ....................................................................1037 C. Nardone I...................................................................................................1041 D. Nardone II .................................................................................................1045 III. FDR’S DEFIANCE OF CONGRESS AND THE SUPREME COURT..........................1047 A. Attorney General
    [Show full text]
  • J. Edgar Hoover, "Speech Before the House Committee on Un‐American Activities" (26 March 1947)
    Voices of Democracy 3 (2008): 139‐161 Underhill 139 J. EDGAR HOOVER, "SPEECH BEFORE THE HOUSE COMMITTEE ON UN‐AMERICAN ACTIVITIES" (26 MARCH 1947) Stephen Underhill University of Maryland Abstract: J. Edgar Hoover fought domestic communism in the 1940s with illegal investigative methods and by recommending a procedure of guilt by association to HUAC. The debate over illegal surveillance in the 1940s to protect national security reflects the on‐going tensions between national security and civil liberties. This essay explores how in times of national security crises, concerns often exist about civil liberties violations in the United States. Key Words: J. Edgar Hoover, Communism, Liberalism, National Security, Civil Liberties, Partisanship From Woodrow Wilson's use of the Bureau of Investigation (BI) to spy on radicals after World War I to Richard Nixon's use of the renamed Federal Bureau of Investigation (FBI) to spy on U.S. "subversives" during Vietnam, the balance between civil liberties and national security has often been a contentious issue during times of national crisis.1 George W. Bush's use of the National Security Agency (NSA) to monitor the communications of suspected terrorists in the United States is but the latest manifestation of a tension that spans the existence of official intelligence agencies.2 The tumult between national security and civil liberties was also visible during the early years of the Cold War as Republicans and Democrats battled over the U.S. government's appropriate response to the surge of communism internationally. Entering the presidency in 1945, Harry S Truman became privy to the unstable dynamic between Western leaders and Josef Stalin over the post‐war division of Eastern Europe.3 Although only high level officials within the executive branch intimately understood this breakdown, the U.S.
    [Show full text]
  • Durham Research Online
    Durham Research Online Deposited in DRO: 27 April 2017 Version of attached le: Accepted Version Peer-review status of attached le: Peer-reviewed Citation for published item: Lu, Jennifer (2017) 'Covert and overt operations : interwar political policing in the United States and the United Kingdom.', American historical review., 122 (3). pp. 727-757. Further information on publisher's website: https://doi.org/10.1093/ahr/122.3.727 Publisher's copyright statement: This is a pre-copyedited, author-produced version of an article accepted for publication in American Historical Review following peer review. The version of record Lu, Jennifer (2017). Covert and Overt Operations: Interwar Political Policing in the United States and the United Kingdom. American Historical Review 122(3): 727-757 is available online at: https://doi.org/10.1093/ahr/122.3.727 Use policy The full-text may be used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal research or study, educational, or not-for-prot purposes provided that: • a full bibliographic reference is made to the original source • a link is made to the metadata record in DRO • the full-text is not changed in any way The full-text must not be sold in any format or medium without the formal permission of the copyright holders. Please consult the full DRO policy for further details. Durham University Library, Stockton Road, Durham DH1 3LY, United Kingdom Tel : +44 (0)191 334 3042 | Fax : +44 (0)191 334 2971 https://dro.dur.ac.uk “Covert and Overt Operations: Interwar Political Policing in the United States and the United Kingdom” Manuscript accepted for publication by the American Historical Review Jennifer Luff Readers should consult the final copy-edited version published in the American Historical Review SINCE THE EARLY DAYS OF THE Cold War, observers have reproached American anticommunism by invoking the example of British moderation.
    [Show full text]
  • Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote
    Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote Mobile Threats Are Increasing Smartphones, or mobile phones with advanced capabilities like those of personal computers (PCs), are appearing in more people’s pockets, purses, and briefcases. Smartphones’ popularity and relatively lax security have made them attractive targets for attackers. According to a report published earlier this year, smartphones recently outsold PCs for the first time, and attackers have been exploiting this expanding market by using old techniques along with new ones.1 One example is this year’s Valentine’s Day attack, in which attackers distributed a mobile picture- sharing application that secretly sent premium-rate text messages from the user’s mobile phone. One study found that, from 2009 to 2010, the number of new vulnerabilities in mobile operating systems jumped 42 percent.2 The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up. Smartphones and personal digital assistants (PDAs) give users mobile access to email, the internet, GPS navigation, and many other applications. However, smartphone security has not kept pace with traditional computer security. Technical security measures, such as firewalls, antivirus, and encryption, are uncommon on mobile phones, and mobile phone operating systems are not updated as frequently as those on personal computers.3 Mobile social networking applications sometimes lack the detailed privacy controls of their PC counterparts. Unfortunately, many smartphone users do not recognize these security shortcomings. Many users fail to enable the security software that comes with their phones, and they believe that surfing the internet on their phones is as safe as or safer than surfing on their computers.4 Meanwhile, mobile phones are becoming more and more valuable as targets for attack.
    [Show full text]
  • Chapter 4 Freedom and Progress
    Chapter 4 Freedom and Progress The best road to progress is freedom’s road. John F. Kennedy The only freedom which deserves the name, is that of pursuing our own good in our own way, so long as we do not attempt to deprive others of theirs, or impeded their efforts to obtain it. John Stuart Mill To cull the inestimable benefits assured by freedom of the press, it is necessary to put up with the inevitable evils springing therefrom. Alexis de Tocqueville Freedom is necessary to generate progress; people also value freedom as an important component of progress. This chapter will contend that both propositions are correct. Without liberty, there will be little or no progress; most people will consider an expansion in freedom as progress. Neither proposition would win universal acceptance. Some would argue that a totalitarian state can marshal the resources to generate economic growth. Many will contend that too much liberty induces libertine behavior and is destructive of society, peace, and the family. For better or worse, the record shows that freedom has increased throughout the world over the last few centuries and especially over the last few decades. There are of course many examples of non-free, totalitarian, ruthless government on the globe, but their number has decreased and now represents a smaller proportion of the world’s population. Perhaps this growth of freedom is partially responsible for the breakdown of the family and the rise in crime, described in the previous chapter. Dictators do tolerate less crime and are often very repressive of deviant sexual behavior, but, as the previous chapter reported, divorce and illegitimacy are more connected with improved income of women than with a permissive society.
    [Show full text]
  • Jenny Parker Mccloskey, 215-409-6616 Merissa Blum, 215-409-6645 [email protected] [email protected]
    FOR IMMEDIATE RELEASE Contact: Jenny Parker McCloskey, 215-409-6616 Merissa Blum, 215-409-6645 [email protected] [email protected] NATIONAL CONSTITUTION CENTER TO BRING BACK PROHIBITION IN MARCH 2017 Original exhibit, American Spirits: The Rise and Fall of Prohibition, returns for a limited engagement Exhibit opens Friday, March 3 Philadelphia, PA (January 5, 2017) – The National Constitution Center is bringing back American Spirits: The Rise and Fall of Prohibition, its critically acclaimed exhibit that brings the story of Prohibition vividly to life. The exhibit, created by the National Constitution Center, originally debuted in 2012 and has since toured nationally, including stops at the Seattle’s Museum of History and Industry in Washington, Grand Rapids Public Museum in Michigan, and Peoria Riverfront Museum in Illinois. It will open to the public Friday, March 3 and run through July 16, 2017. An exclusive, members-only sneak preview opening party is planned for Thursday, March 2. The event will include an America’s Town Hall panel discussion on the constitutionality of Prohibition and its impact on American society today. “We are thrilled to have this superb exhibit back from its national tour,” said President and CEO Jeffrey Rosen. “American Spirits brings the U.S. Constitution to life. Visitors can educate themselves about the constitutional legacy of Prohibition and how to amend the Constitution today.” The exhibit uses a mix of artifacts and engaging visitor activities to take visitors back in time to the dawn of the temperance movement, through the Roaring ’20s, and to the unprecedented repeal of a constitutional amendment.
    [Show full text]
  • Suspect Until Proven Guilty, a Problematization of State Dossier Systems Via Two Case Studies: the United States and China
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations Fall 2009 Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Kenneth N. Farrall University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian Studies Commons, Communication Technology and New Media Commons, International and Intercultural Communication Commons, and the Social Influence and oliticalP Communication Commons Recommended Citation Farrall, Kenneth N., "Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China" (2009). Publicly Accessible Penn Dissertations. 51. https://repository.upenn.edu/edissertations/51 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/51 For more information, please contact [email protected]. Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Abstract This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS - comprising interconnecting subsystems of records and identification - damage individual autonomy and self-determination, impacting not only human rights, but also the viability of the social system. The research, a hybrid of case-study and cross-national comparison, was guided in part by a theoretical model of four primary SDS driving forces: technology, political economy, law and public sentiment. Data sources included government documents, academic texts, investigative journalism, NGO reports and industry white papers. The primary analytical instrument was the juxtaposition of two individual cases: the U.S.
    [Show full text]
  • Electronic Communications Surveillance
    Electronic Communications Surveillance LAUREN REGAN “I think you’re misunderstanding the perceived problem here, Mr. President. No one is saying you broke any laws. We’re just saying it’s a little bit weird that you didn’t have to.”—John Oliver on The Daily Show1 The government is collecting information on millions of citizens. Phone, Internet, and email habits, credit card and bank records—vir- tually all information that is communicated electronically is subject to the watchful eye of the state. The government is even building a nifty, 1.5 million square foot facility in Utah to house all of this data.2 With the recent exposure of the NSA’s PRISM program by whistleblower Edward Snowden, many people—especially activists—are wondering: How much privacy do we actually have? Well, as far as electronic pri- vacy, the short answer is: None. None at all. There are a few ways to protect yourself, but ultimately, nothing in electronic communications is absolutely protected. In the United States, surveillance of electronic communications is governed primarily by the Electronic Communications Privacy Act of 1986 (ECPA), which is an extension of the 1968 Federal Wiretap act (also called “Title III”) and the Foreign Intelligence Surveillance Act (FISA). Other legislation, such as the USA PATRIOT Act and the Communications Assistance for Law Enforcement Act (CALEA), sup- plement both the ECPA and FISA. The ECPA is divided into three broad areas: wiretaps and “electronic eavesdropping,” stored messages, and pen registers and trap-and-trace devices. Each degree of surveillance requires a particular burden that the government must meet in order to engage in the surveillance.
    [Show full text]
  • FBI's Carnivore: How Federal Agents May Be Viewing Your Personal E-Mail and Why There Is Nothing You Can Do About It
    The FBI's Carnivore: How Federal Agents May Be Viewing Your Personal E-Mail and Why There Is Nothing You Can Do About It PETER J. GEORGITON* Much controversy has arisen over the FBI's proposal to use an e-mail and Internet surveillanceprogram, named "Carnivore," to assist its law enforcement efforts on the Information Superhighway. In this note, the authorexamines how Carnivoreoperates and its implicationsfor individuals 'privacy rights under the Fourth Amendment and the Electronic Communications Privacy Act of 1986 (ECPA). The author concludes that the current state of constitutional and statutory law governing electronicsurveillance indicates that the FBI can utilize Carnivore to conduct a wide range of intrusive searches with little or no legal justification. Carnivore'sability to retrieve more than mere e-mail messages of suspects, the FBI's checkered past on privacy issues, and the lack ofjudicial oversight make the potentialfor abuse of Carnivoregreat. As a result, Congress must take a hard look at both the ECPA and Carnivore to prevent law enforcement agenciesfrom using Carnivore to peer into our personal e-mails and Internet usage. Whether he wrote DOWN WITH BIG BROTHER, or whether he refrainedfrom writing it, made no difference.... The Thought Police would get him just the same. He had committed-would still have committed, even ifhe had never set pen to paper-the essential crime that contained all others in itself Thoughtcrime, they called it. Thoughtcrime was not a thing that could be concealedforever. You might dodge successfully for a while, even for years, but sooner or laterthey were bound to get you.
    [Show full text]
  • Image Steganography Applications for Secure Communication
    IMAGE STEGANOGRAPHY APPLICATIONS FOR SECURE COMMUNICATION by Tayana Morkel Submitted in partial fulfillment of the requirements for the degree Master of Science (Computer Science) in the Faculty of Engineering, Built Environment and Information Technology University of Pretoria, Pretoria May 2012 © University of Pretoria Image Steganography Applications for Secure Communication by Tayana Morkel E-mail: [email protected] Abstract To securely communicate information between parties or locations is not an easy task considering the possible attacks or unintentional changes that can occur during communication. Encryption is often used to protect secret information from unauthorised access. Encryption, however, is not inconspicuous and the observable exchange of encrypted information between two parties can provide a potential attacker with information on the sender and receiver(s). The presence of encrypted information can also entice a potential attacker to launch an attack on the secure communication. This dissertation investigates and discusses the use of image steganography, a technology for hiding information in other information, to facilitate secure communication. Secure communication is divided into three categories: self-communication, one-to-one communication and one-to-many communication, depending on the number of receivers. In this dissertation, applications that make use of image steganography are implemented for each of the secure communication categories. For self-communication, image steganography is used to hide one-time passwords (OTPs) in images that are stored on a mobile device. For one-to-one communication, a decryptor program that forms part of an encryption protocol is embedded in an image using image steganography and for one-to-many communication, a secret message is divided into pieces and different pieces are embedded in different images.
    [Show full text]
  • Out of the Ordinary: Finding Hidden Threats by Analyzing Unusual
    RAND-INITIATED RESEARCH CHILD POLICY This PDF document was made available CIVIL JUSTICE from www.rand.org as a public service of EDUCATION the RAND Corporation. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE Jump down to document6 INTERNATIONAL AFFAIRS NATIONAL SECURITY The RAND Corporation is a nonprofit POPULATION AND AGING research organization providing PUBLIC SAFETY SCIENCE AND TECHNOLOGY objective analysis and effective SUBSTANCE ABUSE solutions that address the challenges TERRORISM AND facing the public and private sectors HOMELAND SECURITY TRANSPORTATION AND around the world. INFRASTRUCTURE Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND-Initiated Research View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. Out of the Ordinary Finding Hidden Threats by Analyzing Unusual Behavior JOHN HOLLYWOOD, DIANE SNYDER, KENNETH McKAY, JOHN BOON Approved for public release, distribution unlimited This research in the public interest was supported by RAND, using discretionary funds made possible by the generosity of RAND's donors, the fees earned on client-funded research, and independent research and development (IR&D) funds provided by the Department of Defense.
    [Show full text]
  • Extensions of Remarks
    August 8, 1984 EXTENSIONS OF REMARKS 23165 EXTENSIONS OF REMARKS MILITARY READINESS: A vestments, especially strategic nuclear fense request, the House Armed Services GROWING PROBLEM programs. Simply drawing out pro­ Committee was most protective of conven­ curement, or cutting a program in half tional warfare systems and force readiness, will only postpone what will then be a but willing to let strategic nuclear systems HON. CHARLES McC. MATHIAS, JR. take their lumps. Weinberger's sacrifices OF MARYLAND larger crunch in the 1985-90 time­ were quite the opposite, insulating the stra­ IN THE SENATE OF THE UNITED STATES frame. tegic buildup while cutting back the general Aerospace America magazine recent­ forces. Wednesday, August 8, 1984 ly pttblished an article in which these very points were discussed, and in con­ Looking down the road, it is obvious that •Mr. MATHIAS. Mr. President, while many more tough decisions will have to be siderable detail. I insert the Aerospace made about what to keep, cut back, post­ the current military readiness picture America article entitled "Pentagon's may be good-and even getting pone, and what to jettison. Richard De­ Bright New World Fading Fast" in the Lauer, defense under secretary for research better-the long-term effectiveness of RECORD: and engineering, told Sen. Ted Stevens <D­ our Armed Forces may indeed be in Alaska) that he could "handle" congression­ danger. [From the Aerospace America, July 1984] al refusal of new starts for the $1 billion DDG-51 guided missile destroyer as well as It seems to me there are two poten­ PENTAGON'S BRIGHT NEW WORLD FADING FAST tial problems: the nature of the de­ the $129 million requested for development <By Henry Simmons) of the McDonnell Douglas C-17 STOL fense budget itself, and the financial transport in the current fiscal year.
    [Show full text]