(U) Cryptologic Almanac 50Th Anniversary Series
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Moorer Commission
The Moorer Commission 1 Findings of the Independent Commission of Inquiry into the Israeli Attack on USS Liberty, the Recall of Military Rescue Support Aircraft while the Ship was Under Attack, and the Subsequent Cover - up by the United States Government October 22, 2003 Admiral Thomas H. Moorer, U.S. Navy (deceased) Former Chairman, Joint Chiefs of Staff General Raymond G. Davis, U.S. Marine Corps (deceased) (MOH)*, Former Assistant Commandant of the Marine Corps Rear Admiral Merlin Staring, U.S. Navy (deceased) Former Judge Advocate of the Navy (73 - 75) Ambassador James Akins (deceased) Former U.S. Ambassador to Saudi Arabia (73 - 76) We, the undersigned having undertaken an independent investigation of Israel’s attack on USS Liberty , including eyewit ness testimony from surviving crewmembers, a review of naval and other official records, an examination of official statements by the Israeli and American governments, a study of the conclusions of all previous official inquiries, and a consideration of im portant new evidence and recent statements from individuals having direct knowledge of the attack or the cover up, hereby find the following:** 1. That on June 8, 1967, after eight hours of aerial surveillance, Israel launched a two - hour air and naval attack against USS Liberty, the world’s most sophisticated intelligence ship, inflicting 34 dead, and 173 wounded American servicemen (a casualty rate of 70%, in a crew of 294).; 2 2. That the Israeli air attack lasted approximately 25 minutes, during which time un marked Israeli aircraft dropped napalm canisters on USS Liberty’s bridge, and fired 30mm cannons and rockets into our ship, causing 821 holes, more than 100 of which were rocket - size; survivors estimate 30 or more sorties were flown over the ship by minimu m of 12 attacking Israeli planes which were jamming all 5 American emergency radio channels; 3. -
Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government. -
Directors of Central Intelligence As Leaders of the U.S
All statements of fact, opinion, or analysis expressed in this book are those of the author. They do not necessarily reflect official positions of the Central Intel- ligence Agency or any other US government entity, past or present. Nothing in the contents should be construed as asserting or implying US government endorsement of the authors’ factual statements and interpretations. The Center for the Study of Intelligence The Center for the Study of Intelligence (CSI) was founded in 1974 in response to Director of Central Intelligence James Schlesinger’s desire to create within CIA an organization that could “think through the functions of intelligence and bring the best intellects available to bear on intelli- gence problems.” The Center, comprising professional historians and experienced practitioners, attempts to document lessons learned from past operations, explore the needs and expectations of intelligence consumers, and stimulate serious debate on current and future intelligence challenges. To support these activities, CSI publishes Studies in Intelligence and books and monographs addressing historical, operational, doctrinal, and theoretical aspects of the intelligence profession. It also administers the CIA Museum and maintains the Agency’s Historical Intelligence Collection. Comments and questions may be addressed to: Center for the Study of Intelligence Central Intelligence Agency Washington, DC 20505 Printed copies of this book are available to requesters outside the US government from: Government Printing Office (GPO) Superintendent of Documents P.O. Box 391954 Pittsburgh, PA 15250-7954 Phone: (202) 512-1800 E-mail: [email protected] ISBN: 1-929667-14-0 The covers: The portraits on the front and back covers are of the 19 directors of central intelligence, beginning with the first, RAdm. -
A Failure of Intelligence: the Echelon Interception System & the Fundamental Right to Privacy in Europe
Pace International Law Review Volume 14 Issue 2 Fall 2002 Article 7 September 2002 Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe Kevin J. Lawner Follow this and additional works at: https://digitalcommons.pace.edu/pilr Recommended Citation Kevin J. Lawner, Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe, 14 Pace Int'l L. Rev. 435 (2002) Available at: https://digitalcommons.pace.edu/pilr/vol14/iss2/7 This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace International Law Review by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. POST-SEPT. 11TH INTERNATIONAL SURVEILLANCE ACTIVITY - A FAILURE OF INTELLIGENCE: THE ECHELON INTERCEPTION SYSTEM & THE FUNDAMENTAL RIGHT TO PRIVACY IN EUROPE Kevin J. Lawner* I. Introduction ....................................... 436 II. Communications Intelligence & the United Kingdom - United States Security Agreement ..... 443 A. September 11th - A Failure of Intelligence .... 446 B. The Three Warning Flags ..................... 449 III. The Echelon Interception System .................. 452 A. The Menwith Hill and Bad Aibling Interception Stations .......................... 452 B. Echelon: The Abuse of Power .................. 454 IV. Anti-Terror Measures in the Wake of September 11th ............................................... 456 V. Surveillance Activity and the Fundamental Right to Privacy in Europe .............................. 460 A. The United Nations International Covenant on Civil and Political Rights and the Charter of Fundamental Rights of the European Union... 464 B. -
An Interview with James Bamford
Investigating the Puzzle Palace: An Interview with James Bamford BONNIE BRENNAN AND KATHERINE GILBERT QUESTION: Do you consider clandestine intelligence gathering a legitimate activity for a modern nation-state? BAMFORD: I think it is very legitimate; I ju.st think that it should be directed externally. It is unrealistic not to have clandestine activities, though to some extent NSA isn't even really engaged in clandestine collection. Thousands of signals are just falling down outside right now, and all they're doing is putting out a dish and collecting them. There's not really anything clandestine about it. A listening post is a large thing with big antennae that can be seen from the road. It's just technical collection gathering, and I don't think there's anything really wrong with that as long as they're concentrating on foreign countries. We assume foreign countries can do the same thing to the United States. The Soviet Union, I'm sure, has a big listening post in Cuba. I don't see anything wrong with that. QUESTION: In his book, The Codebreakers, David Kahn shows that intelligence gathering by nations is as old as civilization. In the nineteenth century, Clausewitz described "intelligence" as the "basis . of our own plans and operations" and posited that "unreliable and transient intelligence results in a flimsy structure that can easily collapse and bury us in its ruins." What, in your opinion, is the role of intelligence today? BAMFORD: The role of intelligence is to provide a government with a third eye to see what is going on in places where it can't otherwise see; it has expanded tremendously from thirty years ago when the concentration was on human intelligence. -
National Security Agency
Coordinates: 39°6′32″N 76°46′17″W National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United National Security Agency States Department of Defense, under the authority of the Director of National Intelligence. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems.[8][9] The NSA relies on a variety of measures to accomplish its Seal of the National Security Agency mission, the majority of which are clandestine.[10] Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become the largest of the U.S. intelligence organizations in terms of Flag of the National Security Agency personnel and budget.[6][11] The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end.[12] The NSA is also alleged to have been behind such attack software as Stuxnet, which severely damaged Iran's nuclear program.[13][14] The NSA, alongside the Central Intelligence Agency (CIA), maintains a physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a NSA Headquarters, Fort Meade, Maryland highly classified intelligence team) inserts eavesdropping devices in high value targets (such Agency overview as presidential palaces or embassies). -
In the Shadow of General Marshall-Old Soldiers in The
In The Shadow of General Marshall: Old Soldiers in the Executive Branch Ryan Edward Guiberson Anaconda, Montana Bachelor of Science, United States Air Force Academy, 1992 Master of Arts-Political Science, University of Florida, 1994 A Dissertation presented to the Graduate Faculty of the University of Virginia in Candidacy for the Degree of Doctor of Philosophy Department of Politics University of Virginia August, 2013 2 Abstract: The usurpation of political authority by tyrannical military figures is a theme that pervades the history of politics. The United States has avoided such an occurrence and the prospect of a military coup d’etat rarely registers as a realistic concern in American politics. Despite the unlikelihood of this classic form of military usurpation, other more insidious forms lurk and must be guarded against to protect civilian control of the military. One potential manifestation has been referred to as a military colonization of the executive branch. This form implies that retired senior military officers increasingly pursue executive branch positions and unduly promote the interests of the active duty military, its leaders, and military solutions to national security issues. This work addresses military colonization claims by examining the number of retired senior military officers that have served in executive branch positions, trends in where they participate, and their political behavior in these positions. It also uses interviews with retired senior military officers to gain their perspectives on the incentives and disincentives of executive branch service. The study concludes that in the post-Cold War period, participation rates of retired senior military officers in key executive branch positions do not diverge significantly from broader post-World War II patterns. -
Who Watches the Watchmen? the Conflict Between National Security and Freedom of the Press
WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment. -
Mein Nachbar
Das deutsche Nachrichten-Magazin Leitartikel Partner und Gegner zugleich Warum der SPIEGEL weitere geheime Dokumente über die NSA-Affäre enthüllt as Verhältnis Deutschlands zu den USA in Zeiten der Die Bundesregierung hat die Selbstherrlichkeit der Welt- NSA-Affäre gleicht dem Ritt auf einer Schiffschaukel: macht lange hingenommen. Sie hat manches geahnt, vieles DAus luftigen Höhen geht es atemberaubend in die verdrängt und einiges über die Allgegenwart der NSA gewusst, Tiefe. Im Sommer vergangenen Jahres, als die ersten Snowden- weil der Bundesnachrichtendienst bei den Operationen mit- Enthüllungen bekannt wurden, erklärte die Regierung Merkel mischt. Dass der BND mit der NSA intensiv kooperiert, nicht die Affäre schon für beendet, bevor sie ihre Wucht entfaltete. nur bei der Terrorbekämpfung, sondern auch bei der unter- Im Herbst aber, als bekannt wurde, das private Handy der schiedslosen Massenüberwachung globaler Kommunikations- Bundeskanzlerin sei überwacht worden, erreichte das Ver- ströme, belegen die neuen Snowden-Dokumente. Die Deut- hältnis einen Tiefpunkt. Nun war von Konsequenzen die Rede, schen sind Partner und Gegner zugleich. von einem anderen Umgang unter Verbündeten. Die Bundeskanzlerin hat einen Amtseid auf das Grund- Dann reiste die Kanzlerin nach Washington, und wieder gesetz geschworen. Spionage gegen Deutschland ist nach kehrte Friede ein. Seither würden Transatlantiker wie Sicher- dem Strafgesetz verboten. Die Grundrechte der Bürger sind heitsbehörden am liebsten zum normalen Geschäft übergehen, also keine flexible Größe, abhängig davon, wie es um das Ver- bei dem die Aufgaben verteilt hältnis Deutschlands zu den sind: Die NSA ist der omnipo- USA gerade bestellt sein mag. tente Weltgeheimdienst, die Entweder haben die ameri- Deutschen sind der verständ- kanische und die deutsche nisvolle, hilfreiche Bündnis- Regierung miteinander ab - partner. -
Penetrate, Exploit, Disrupt, Destroy: the Rise of Computer Network Operations As a Major Military Innovation
PENETRATE, EXPLOIT, DISRUPT, DESTROY: THE RISE OF COMPUTER NETWORK OPERATIONS AS A MAJOR MILITARY INNOVATION by Craig J. Wiener A Dissertation Submitted to the Graduate Faculty of George Mason University in Partial Fulfillment of The Requirements for the Degree of Doctor of Philosophy Biodefense Committee: _______________________________________ Gregory Koblentz, Chair _______________________________________ A. Trevor Thrall _______________________________________ Stuart Malawer _______________________________________ Gregory Koblentz, Program Director _______________________________________ Mark J. Rozell, Dean Date: __________________________________ Fall Semester 2016 George Mason University Fairfax, VA Penetrate, Exploit, Disrupt, Destroy: The Rise of Computer Network Operations as a Major Military Innovation A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at George Mason University By Craig J. Wiener Master of Science George Mason University, 2010 Bachelor of Arts New York University 1992 Director: Gregory Koblentz, Associate Professor Schar School of Policy and Government Fall Semester 2016 George Mason University Fairfax, VA Copyright 2016 Craig J. Wiener All Rights Reserved ii DISCLAIMER Any errors herein are solely those of the author. Additionally, the views expressed herein are those of the author. iii DEDICATION To Betty: I wish you were here. iv ACKNOWLEDGEMENTS I have a tremendous number of people to thank who have helped me throughout my Master of Science and PhD studies, leading to the submission of my dissertation. It literally took a village, and although I cannot thank everyone here, please know the depth of my gratitude is significant and ongoing. I would like to thank the faculty and staff of the George Mason School of Policy, Government and International Affairs, and the Graduate School of Public and International Affairs for giving me an opportunity to pursue my studies in national security. -
Cyber Center for Education & Innovation
VISION FOR THE NEW CYBER CENTER FOR EDUCATION & INNOVATION Home of the National Cryptologic Museum A PUBLIC-PRIVATE PARTNERSHIP WITH UNPARALLELED CYBER DEFENSE EXPERTISE. PLEASE JOIN US AND GET INVOLVED! The Cyber Center and our participation, volunteer Yleadership and support are urgently Museum Master needed to help us conceptualize, Plan includes: capitalize and construct the new Cyber Center for Education & Innovation, n A new state-of-the-art Home of the National Cryptologic Museum. Join us now! Museum To discuss your interest in supporting our efforts to create n The Conference Center this vital new resource, please contact: n Vigilance Air Park MGEN Roderick J. Isler, USA (Ret) n Classroom facilities Vice President, Cyber Center for Education & Innovation, New Museum Project Campaign n World class research National Cryptologic Museum Foundation and rare books library P.O. Box 1563 Millersville, MD 21108 n A comprehensive site and Office: 443-292-0091 land use concept Cell: 301-785-0896 Continued strong private and [email protected] public leadership is needed to realize this challenging vision. 1 CCEI-NCM Parking 498 Spaces 2 CCEI-NCM 3 Museum and Conference Center Drop-off 4 Service Road/ Loading Dock 5 Existing Museum 6 National Vigilance Park 7 Security Check Point 8 Colony Seven Road 9 Current NSA Parking (N1) 10 Current NSA Parking (N10) 11 Future VCP-1 12 86 foot Security Set Back 13 Entrance Signage PROPOSED SITE PLAN HELP US BUILD AND COMPLETE THIS NEW NATIONAL TREASURE. THE CYBER CENTER FOR EDUCATION & INNOVATION, HOME OF THE NATIONAL CRYPTOLOGIC MUSEUM is envisioned to be an integrated multi-purpose facility serving public and private stakeholders. -
Admiral Bobby Ray Inman the Fifth Lyndon Baines Johnson Distinguished Lecturer Robert L
Bobby Ray Inman LBJ Lecture March 1, 1984 Introduction of Admiral Bobby Ray Inman The Fifth Lyndon Baines Johnson Distinguished Lecturer Robert L. Hardesty President Southwest Texas State University Welcome to the fifth of the Lyndon Baines Johnson Distinguished Lectures. Many of you are now familiar with the Lyndon Baines Johnson Distinguished Lecture Series. When the series began in the spring of 1982, it was to carry out a dream that President Johnson had for Southwest Texas State University. Speaking on campus only a week before his death, he said that he wanted to bring the nation’s most influential and respected people to this campus to talk to students and faculty and to comment on the issues of the day. In the two years since the series began, we have carried out that dream. And tonight we are continuing this tradition. A key difference in our speaker this evening is that he represents not the past, or even the present, so much as he represents the future. Admiral Bobby Ray Inman and MCC, the corporation that he heads, are on the leading edge of the future not only of Texas, but of the nation, and of the world. When Governor Mark White determined that Microelectronics and Computer Technology Corporation — MCC — should be housed in Texas, he left no stone unturned in bringing it here. He probably did more than any other governor in Texas history to consciously shape the destiny of our state. For MCC will do more than bring industry and jobs to Texas. It will bring the future.