Showing posts with label nsa. Show all posts
Showing posts with label nsa. Show all posts

2009-01-22

Ex-NSA analyst: Agency spied on news organizations

A former National Security Agency analyst told MSNBC’s Keith Olbermann Wednesday night that the Bush Administration targeted and eavesdropped on the conversations of American journalists.

Share:
· Facebook
· LinkedIn
· Email
· Print
· Link

Russell Tice, one of the sources who revealed the secret NSA warrantless wiretapping program to The New York Times in 2005, gave harrowing details about the NSA’s wiretapping program in an interview less than 24 hours after President George Bush left office.

He told Olbermann that the NSA collected all communications from various U.S. groups, many of which had nothing to do with terrorism:

Tice: Now, what I was finding out, though, is that the collection on those organizations was 24/7, and you know, 365 days a year, and it made no sense. And that's -- I started to investigate that. That's about the time when they came after me, to fire me. But an organization that was collected on were U.S. news organizations and reporters and journalists.

Olbermann: To what purpose? I mean, is there a file somewhere full of every e-mail sent by all the reporters at the "New York Times?" Is there a recording somewhere of every conversation I had with my little nephew in upstate New York? Is it like that?

Tice: If it was involved in this specific avenue of collection, it would be everything. Yes. It would be everything.

When Bush defended the secret wiretapping program after it became public a little more than three years ago, he said that only international communications were monitored as a way to collect terrorism intelligence. But Tice said that was not true.

“The National Security Agency had access to all Americans' communications, faxes, phone calls, and their computer communications. And that doesn't -- it didn't matter whether you were in Kansas, you know, in the middle of the country, and you never made a communication -- foreign communications at all. They monitored all communications,” he said.

Additionally Tice told Olbermann that "the agency would tailor some of their briefings to try to be deceptive” to congressional committees so that no one would know exactly what the NSA was collecting.

Olbermann asked Tice if President Barack Obama could, and would, stop the NSA from continuing to spy on Americans. Tice responded that he had tried to reach out to the Obama Administration and was still hoping he could work with the White House on intelligence issues.

The American Civil Liberties Union is challenging the NSA wiretapping program, as legalized by the FISA Amendments Act of 2008, in federal court in Manhattan. The Reporters Committee filed a friend-of-the-court brief in the case, Amnesty International v. McConnell, arguing that the law violates the First Amendment rights of journalist to conduct interviews with their sources.

Samantha Fredrickson, 3:48 pm · Comments: 0

2008-12-08

NSA Builds New Data-Mining Center In San Antonio

Photo by Greg M. Schwartz
It looks innocent enough, but no loitering, please: The NSA’s Texas Cryptology Center, under construction at 410 and West Military.
SA Current | Surrounded by barbwire fencing, the anonymous yet massive building on West Military Drive near San Antonio’s Loop 410 freeway looms mysteriously with no identifying signs of any kind. Surveillance is tight, with security cameras surrounding the under-construction building. Readers are advised not to take any photos unless you care to be detained for at least a 45-minute interrogation by the National Security Agency, as this reporter was.

There’s a strangely blurry line during such an interrogation. After viewing the five photos I’d taken of the NSA’s new Texas Cryptology Center, the NSA officer asked if I would delete them. When I asked if he was ordering me to do so, he said no; he was asking as a personal favor. I declined and was eventually released.

America’s top spy agency has taken over the former Sony microchip plant and is transforming it into a new data-mining headquarters — oddly positioned directly across the street from a 24-hour Walmart — where billions of electronic communications will be sifted in the agency’s mission to identify terrorist threats.

“No longer able to store all the intercepted phone calls and e-mail in its secret city, the agency has now built a new data warehouse in San Antonio, Texas,” writes author James Bamford in the Shadow Factory, his third book about the NSA. “Costing, with renovations, upwards of $130 million, the 470,000-square-foot facility will be almost the size of the Alamodome. Considering how much data can now be squeezed onto a small flash drive, the new NSA building may eventually be able to hold all the information in the world.”

Bamford’s book focuses on the NSA’s transformation since 9/11, with the impetus for the new facility being a direct ramification of those attacks. At the time, the NSA had only about 7 percent of its facilities outside the Washington D.C./Baltimore area. But the realization that additional attacks could virtually wipe out the agency catalyzed a regional expansion. [See “Secret Agency Man,” November 5, 2008.]

The new facility is a potential boon to the local economy since it’s reportedly going to employ around 1,500 people, but questions remain about whether there will be adequate oversight to prevent civil-rights violations like Uncle Sam’s recent notorious warrantless wiretapping program. The NSA would suggest the facility’s ability to sort through surveillance data is one of America’s top defenses against terrorist threats, but the NSA’s presence comes with concerns that abuse of its secretive power could see the agency become akin to the “Thought Police” of 1984, George Orwell’s classic novel depicting the nightmare of a total surveillance society — and all for nothing. Even as the facility is completed, a new government-backed report has concluded that data surveillance is an ineffective method for identifying potential terrorists or preventing attacks.

So just what will be going on inside the NSA’s new San Antonio facility? Bamford describes former NSA Director Mike Hayden’s goals for the data-mining center as knowing “exactly what Americans were doing day by day, hour by hour, and second by second. He wanted to know where they shopped, what they bought, what movies they saw, what books they read, the toll booths they went through, the plane tickets they purchased, the hotels they stayed in… In other words, Total Information Awareness, the same Orwellian concept that John Poindexter had tried to develop while working for the Pentagon’s [Defense Advanced Research Projects Agency].”

Bamford details how Hayden, now head of the CIA, had originally leaned toward being overprotective of civil rights, not wanting to see the NSA revisit the scandal-ridden era of the 1970s and the violations of “Project Shamrock.” But 9/11 altered Hayden’s philosophical direction 180 degrees. The Total Information Awareness project supposedly died when the plan was exposed, Poindexter resigned, and Congress cut off further funding. But Bamford and others have reported that the project simply migrated to the NSA, “an agency with a far better track record than DARPA for keeping secrets.”

The NSA remembers the Alamo

The NSA was waffling on selection of a home for its new facility when the City of San Antonio sent a mission to NSA headquarters in January 2007 to lobby for it, part of a continuing effort to woo the agency. On January 18, Microsoft announced its selection of San Antonio for a new data center. The NSA followed suit three months later. Bexar County Judge Nelson Wolff was part of the effort to entice the NSA to choose San Antonio. He says talks centered on economic factors and what the city could do to facilitate the NSA’s plans.

“They’re pretty tight on what they do; they don’t share that information with you,” says Wolff. “I hope that the administration will be addressing [civil-rights violations], and I hope they’re correcting those concerns.”

Bamford writes about how NSA and Microsoft had both been eyeing San Antonio for years because it has the cheapest electricity in Texas, and the state has its own power grid, making it less vulnerable to power outages on the national grid. He notes that it seemed the NSA wanted assurance Microsoft would be here, too, before making a final commitment, due to the advantages of “having their miners virtually next door to the mother lode of data centers.” The new NSA facility is just a few miles from Microsoft’s data center of the same size. Bamford says that under current law, NSA could gain access to Microsoft’s stored data without even a warrant, but merely a fiber-optic cable.

“What the Microsoft people will have will be just storage of a lot of the email that is being sent. They keep this email — I don’t know why — and there should be some legislation saying how long it should be kept,” said Bamford in a phone interview last week. “The post office doesn’t keep copies of our letters when we mail letters; why should the telecom companies or the internet providers keep copies of our email? It doesn’t make sense to me. But there’s no legislation. So they need a place to store it, and that’s where they’re storing all this stuff.”

(Microsoft did not return a call for comment before press deadline.)

The new NSA facility boosts the agency’s already formidable presence in South Texas, where they have 2,000 employees on the Medina Annex of the Lackland Air Force Base — mostly Signals Intelligence, or Sigint, specialists, who use cutting-edge technology to intercept anything from faxes to emails and satellite communications.

NSA’s new facility also gives the agency easy access to UTSA’s Institute for Cyber Security and the school’s Center for Infrastructure Assurance and Security. The ICS was founded in 2007 with a $3.5-million grant from the Texas Emerging Technology Fund to continue efforts to protect American communities against cyber-attacks, with the CIAS — a think tank launched in 2001 — being rolled into the ICS. All of this led U.S. Representative Ciro Rodriguez (D-San Antonio) to declare San Antonio “the center of cybersecurity, in the country and the world.”

ICS Founding Executive Director Ravi Sandhu acknowledges some synergy between the NSA presence in San Antonio and UTSA’s cybersecurity work.

“Cybersecurity in the public domain has largely been about defense, but there’s certainly an attack component to it. To some degree, the U.S. Department of Defense and intelligence agencies are now starting to talk about the attack component in the public domain,” says Sandhu.

Sandhu says UTSA’s cybersecurity students are recruited by many of San Antonio’s local employers and doesn’t doubt that NSA is one of them. “Recruiting is one end … but it’s an attractive thing for NSA employees [too]. They can further their education — they can do degrees part-time, they can do advanced degrees … so there are advantages beyond direct recruitment of NSA students.”

Does automated data mining even work?

While the opening of the NSA’s massive new data center heightens existing civil-rights concerns, a new report from the National Research Council questions whether such data-mining is even effective. Sponsored by the Department of Homeland Security and the National Science Foundation and released in October of this year, the report suggests that pattern-based data-mining is not even a viable way to identify terrorists.

The 352-page study —“Protecting Individual Privacy in the Struggle Against Terrorists” — concludes that identification of terrorists through automated data-mining “is neither feasible as an objective nor desirable as a goal of technology development efforts.” It also says inevitable false positives will result in “ordinary, law-abiding citizens and businesses” being erroneously flagged as suspects.

“Actions such as arrest, search, or denial of rights should never be taken solely on the basis of an automated data-mining result,” says the report. The question, then, is how rigorously will human analysts vet such information before alleged leads are pursued, and who has oversight of the process?

“Part of the problem is … jurisdiction over national-security issues is very divided in Congress. You have the Homeland Security committee, the Justice committee, but, of course, you also have some basic issues — government oversight, appropriations,” says Professor Fred Cate, the NRC committee member who wrote most of the report and who serves as director of Indiana University’s Center for Applied Cybersecurity Research. “So I think in some ways one of the issues is the need for a more streamlined oversight system so that somebody takes responsibility for it.”

Cate says the migration of the TIA project to the NSA is part of the problem.

“Because so many different agencies are involved and because there are no consistent oversight mechanisms, it’s very hard [to monitor]. And Congress created a Privacy and Civil Liberties Oversight Board, and then it didn’t like the way it created it initially, so then it recreated it with more powers, but it never confirmed any members to it,” says Cate. “So for the past year, there’s been nobody in that critical position. So I think one immediate step for Congress and the new president will be to nominate members and get them confirmed.”

The lack of clearly delineated oversight remains a vital yet unsolved issue. Senator Jay Rockefeller (D-W.Virginia), Chairman of the Senate Intelligence Committee, would appear to be the Congressman with the most power to pursue such oversight.

“Eisenhower warned of the military-industrial complex, but now it’s mostly the security, industrial complex; it’s these people that build all the hardware and software for Homeland Security and Intelligence and all that,” says Bamford. “As far as I can see, nobody has a handle on how many contractors are out there, what they’re doing, how much money’s going to them, how much is useful, how much is wasted money.”

Cate says the NRC committee is not necessarily opposed to data-mining in principal, but is concerned about how it’s carried out. “The question is can you do it and make it work so that you don’t intrude unnecessarily into privacy and so that you reach reliable conclusions.”

Bamford writes in the Shadow Factory of how the NSA’s Georgia listening post has eavesdropped on Americans during the Iraq War, including journalists, without a warrant or any indication of terrorism. He also reports on NSA eavesdropping on undecided members of the United Nations Security Council in the run-up to the vote on the Iraq War resolution, with the Bush regime seeking information with which to twist the arms of voting countries. The spying was only revealed due to British Parliament whistleblower Claire Short, who admitted she’d read secret transcripts of UN Secretary-General Kofi Annan’s confidential conversations.

“The UN people have been aware of [NSA eavesdropping] for a long time, but there’s not much they can do about it,” says Bamford.

A common response to concerns about data surveillance is that those who keep their noses clean have nothing to worry about. But the reach of the NSA’s surveillance net combined with lack of oversight and the political paranoia escalated by the 9/11 attacks means that almost anyone could wind up on the terrorist watch list.

“The principal end product of all that data and all that processing is a list of names — the watch list — of people, both American and foreign, thought to pose a danger to the country,” writes Bamford. “Once containing just twenty names, today it is made up of an astonishing half a million — and it grows rapidly every day. Most on the list are neither terrorists nor a danger to the country, and many are there simply by mistake.”

Bamford reports that consequences of being on the list could include having an application for a Small Business Administration loan turned down; having a child’s application to one of the military academies rejected; or, because the names are shared with foreign governments, being turned away after landing in Europe for a vacation or business trip. All without ever being told why.

A senior intelligence official concerned about the situation told Bamford “the system is a disaster,” adding that the list at the National Counterterrorism Center isn’t even compatible with the NSA and CIA systems.

“They could be snooping on just about anything right now and not be accountable and be able to hold their hands up and go, ‘Our system doesn’t track that,’ when in many cases the system does, but the code is so convoluted you could never know it,” says the official.

Bamford also reports on Uncle Sam’s skyrocketing use of “national security letters” for obtaining personal information. The NSLs, which do not require probable cause or court approval, jumped from 8,500 in 2000 to 143,074 between 2003 and 2005, according to a 2007 Justice Department inspector general’s report. Under the revised version of the 1994 Communications Assistance for Law Enforcement Act, it’s not only a crime for any company to refuse to cooperate, it’s also become a crime for company officials to even disclose their cooperation.

“There was a lot of pressure by the FBI in ’94 to have CALEA enacted … but the Clinton Administration was in favor of doing all that,” says Bamford.

The question for us then becomes who, if anyone, is watching the watchdogs? One organization devoted to such duty is the Electronic Frontier Foundation, a San Francisco-based non-profit whose mission is to protect electronic civil liberties. Reducing the use of NSLs to gag and acquire data from online service providers is one of the planks in EFF’s proposed privacy agenda for the new Obama administration.

“The issue here is that when people are gagged, you can’t talk about it and [people] don’t know what kind of abuses there are,” says EFF media-relations coordinator Rebecca Jeschke. The EFF privacy agenda also includes repealing or repairing the FISA Amendments Act, reforming the Electronic Communications Privacy Act, and reform of the State Secrets Privilege, the latter which has been used by the Bush regime to shield its electronic surveillance activity from judicial review.

The EFF filed a lawsuit against the NSA in September on behalf of AT&T customers who were victims of warrantless wiretapping, with defendants including President Bush, Vice President Cheney, and NSA Director Keith Alexander. The EFF also filed suit against AT&T — until this summer headquartered in San Antonio, the telecom giant still maintains a sizable presence here — for participating in the illegal surveillance program, and is challenging the FISA Amendments Act passed by Congress in July — which gave retroactive immunity to the telecom companies — as being unconstitutional.

“Where I disagreed was the immunity to telecommunications entities … and that’s why I couldn’t support something that provided for the immunity provision,” says U.S. Representative Charlie Gonzalez (D-San Antonio) of the FISA Amendments Act. “We had something that we thought in the House was good, and then the Senate did their own thing. But I was never happy with the inclusion of the blanket-immunity provision to telecommunications entities, because I thought it relieved them of a responsibility and duty that they owe as corporate citizens.”

Gonzalez added that he thinks “there’s still tremendous shortcomings in the law when it comes to making sure that you don’t have abuses of the authority of eavesdropping.”

The Electronic Privacy Information Center in Washington, D.C., a public interest research group whose mission is similar to EFF’s, is suing the Department of Justice for access to documents authored by government lawyers regarding President Bush’s warrantless wiretapping program. These opinions, prepared by the Office of Legal Counsel, provided the legal rationale for Uncle Sam to wiretap American citizens in the United States without court approval. On October 31, a federal judge ordered the DOJ to provide for independent judicial inspection of documents relating to the program.

The latest news in Uncle Sam’s ongoing surveillance scandal happens to come from the FBI’s involvement with the NSA. The Washington Times reported in November that Supervisory Special Agent Bassem Youssef, who oversees the FBI’s role in the NSA’s warrantless surveillance program, says the FBI engaged in unlawful acts while carrying out that surveillance. Youssef, who now fears career retaliation for stepping up as a whisteblower, is due to testify with the Justice Department.

Whether or not the new Obama administration will enact any demonstrable change in the personnel and policies that created the civil-rights violations of recent years remains a question mark.

“Everything I’ve seen so far with Obama has not been focused on change. It’s been focused on bringing back the old Clinton Administration or continuing the same,” says Bamford, noting the President-elect’s decisions to nominate Hillary Clinton as Secretary of State and keep Robert Gates as Secretary of Defense. Bamford mentions Wisconsin Senator Russ Feingold as someone he feels would fight for greater accountability.

“That’s a person I would like to see rewarded for making the right decision, instead of people being rewarded for making the wrong decisions,” says Bamford of Feingold’s record in voting against the revised FISA Amendments Act and being the only senator to vote against the Patriot Act.

Bamford ends The Shadow Factory by quoting Senator Frank Church, the first chairman of the Senate Intelligence Committee, during the original hearings on the NSA in the 1970s. “If a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know. Such is the capability of this technology,” said Church more than three decades ago.

That technology now sees its latest evolution occurring at the shadowy building on San Antonio’s West Military Drive. •


2008-11-24

Report: NSA Kept File On Tony Blair’s ‘Private Life’ And Intercepted Iraqi President’s ‘Pillow Talk’

bushblair.jpgIn October, ABC News reported that despite President Bush’s promises that the National Security Administration’s warrantless wiretapping program was aimed only at terrorists, the NSA frequently listened to and transcribed the private phone calls of Americans abroad. The network’s report was based on whistleblower interviews with two former military intercept operators.

One of the whistleblowers, former Navy Arab linguist David Murfee Faulk, told ABC News that he and his co-workers listened in on “hundreds of Americans” over the years:

Another intercept operator, former Navy Arab linguist, David Murfee Faulk, 39, said he and his fellow intercept operators listened into hundreds of Americans picked up using phones in Baghdad’s Green Zone from late 2003 to November 2007.

“Calling home to the United States, talking to their spouses, sometimes their girlfriends, sometimes one phone call following another,” said Faulk.

But it wasn’t just ordinary Americans. In a new report today, Faulk tells ABC that during his time working for the government, “U.S. intelligence snooped on the private lives of two of America’s most important allies in fighting al Qaeda: British Prime Minister Tony Blair and Iraq’s first interim president, Ghazi al-Yawer”:

David Murfee Faulk told ABCNews.com he saw and read a file on Blair’s “private life” and heard “pillow talk” phone calls of al-Yawer when he worked as an Army Arab linguist assigned to a secret NSA facility at Fort Gordon, Georgia between 2003 and 2007.

Though “collecting information on foreign leaders is a legal and common practice of intelligence agencies around the world,” former intelligence officials tell ABC News that the U.S. and Britain have a long-standing agreement “not to collect on each other“:

The NSA works extremely closely and shares data with its British counterpart, the GCHQ, Government Communications Headquarters.

“If it is true that we maintained a file on Blair, it would represent a huge breach of the agreement we have with the Brits,” said one former CIA official.

After ABC’s initial report in October, Senate Democrats promised to investigate the whistleblowers’ allegations. The Inspector General for the NSA is also reported to be investigating the allegations by Faulk and another former military intercept operator, Adrienne Kinne.

2008-11-15

Documents Released By the Government in Response to The ACLU's Cell Phone FOIA Requests (11/12/2008)

The American Civil Liberties Union and the Electronic Frontier Foundation (EFF) filed a lawsuit in July 2008 urging a federal court to order the Department of Justice (DOJ) to turn over records related to the government's use of people's cell phones as tracking devices. Click the links below to open pdfs of documents released to the ACLU by the Executive Office of United States Attorneys. August 12, 2008
August 22, 2008
September 11, 2008
September 16, 2008 (pt 1)
September 16, 2008 (pt 2)
September 16, 2008 (pt 3)
October 15, 2008 (pt 1)
October 15, 2008 (pt 2)
October 15, 2008 (pt 3)
November 6, 2008

NSA Releases Documents on U.S. Cold War Intelligence Activities

By The Public Record
The Public Record
Friday, November 14, 2008

Favoured : 3

Published in : Nation/World

Editor's Note: George Washington University's National Security Archive obtained from the highly secretive National Security Agency numerous documents related to U.S. Cold War Intelligence Activities. The information below detailing U.S. intelligence work during the Cold War was drafted by National Security Archives staff.

Soviet Strategic Forces Went on Alert Three Times during September-October 1962 Because of Apprehension over Cuban Situation

Forty-six years ago, a month before the Cuban Missile crisis, Soviet leaders put their strategic forces on their “highest readiness stage since the beginning of the Cold War,” according to a newly declassified internal history of the National Security Agency published today for the first time by the National Security Archive. Possibly responding to President Kennedy’s call for reserves, perhaps worried that the White House had discovered Moscow’s plans to deploy missiles on Cuba, the Kremlin kept forces on alert for 10 days, beginning on September 11, 1962.

The USS Oxford on its maiden voyage, circa August 1961. The Navy wanted to see if this ship was seaworthy, so it not carrying NSA officers on board. Used in patrols of the Caribbean and Latin America, the Oxford was in Cuban waters during the Cuban Missile Crisis. (photo from collection of Matthew Aid)

The NSA’s signals intelligence (SIGINT) history also discloses that, a month later, on October 15th, the Soviets initiated a “precautionary, preliminary” alert, perhaps because Soviet Premier Nikita Khrushchev feared that U.S. intelligence had discovered the missiles. After President Kennedy’s speech on October 22nd 1962, announcing the “quarantine” (blockade) of Cuba, the Kremlin put military forces, especially air defense forces, on an “extraordinarily high state of alert.” Significantly, “offensive forces avoided assuming the highest readiness stage, as if to insure that Kennedy understood that the USSR would not launch first.”

In response to a declassification request by the National Security Archive, the secretive National Security Agency has declassified large portions of a four-part “top-secret Umbra” study, American Cryptology during the Cold War. Despite major redactions, this history discloses much new information about the agency’s history and the role of SIGINT and communications intelligence (COMINT) during the Cold War. Researched and written by NSA historian Thomas Johnson, the three parts released so far provide a frank assessment of the history of the Agency and its forerunners, warts-and-all.

According to National Security Archive visiting fellow Matthew Aid (author of the forthcoming history The Secret Sentry: The Top Secret History of the National Security Agency), Johnson’s study shows “refreshing openness and honesty, acknowledging both the NSA’s impressive successes and abject failures during the Cold War.” Another striking feature of Johnson’s study is the candor with which it discusses the fractious and damaging relationships between the agencies which make up the U.S. government’s intelligence establishment. Among the successes and failures disclosed by Johnson’s history are:

  • After the end of World War II, with Soviet codes still unbreakable, the U.S. Army and Navy SIGINT organizations had relatively little to listen to. Johnson’s history reveals that as of mid-1946, the most productive source available to the U.S. Army SIGINT organization was French communications, which accounted for half of the finished reporting going to intelligence consumers in Washington.
  • SIGINT coverage of the Soviet Union and the Peoples Republic of China by the Air Force Security Agency (an NSA predecessor) during the early 1950s was so bad that a senior CIA official referred to this period as “the dark ages for communications intelligence.”
  • The discovery of high-level Soviet spies operating inside the Australian government in 1947 led the U.S. to cut off Australian access to classified U.S. government information, which was not resumed until two years later in 1949. Full SIGINT cooperation with Australia did not resume until 1953; according to Johnson, the Australian-American intelligence rift “had a deleterious affect on early U.S. SIGINT efforts against the Peoples Republic of China."
  • During the 1950s, relations between senior officials at the CIA and NSA were at times so bad that they impeded cooperation between the two agencies. The CIA deliberately cut NSA out of the famous Berlin Tunnel operation (1954-1956), with NSA’s director, General Ralph Canine, finding out about the operation from the New York Times after the Soviets discovered the Tunnel in April 1956.
  • By the early 1960s, the NSA was beginning to encounter information overload as more and more intercepted messages were stored in huge warehouses of magnetic tapes. According to Johnson, “the volume of unprocessed … tape was becoming difficult to manage technically and was embarrassing politically.”
  • The Cuban Missile Crisis of 1962 was a major strategic intelligence failure for NSA. SIGINT provided no warning of the presence of Soviet nuclear-armed intermediate and medium-range ballistic missiles in Cuba prior to their discovery by U-2 reconnaissance aircraft; according to Johnson, this “marked the most significant failure of SIGINT to warn national leaders since World War II.”
  • In April 1975, as the North Vietnamese military prepared for the final offensive to capture the beleaguered South Vietnamese capital of Saigon, ambassador Graham Martin refused to believe SIGINT reporting which clearly indicated that the offensive was about to commence, arguing that the intercepts were a “deception.” He believed that North Vietnamese wanted a coalition government, not military victory. The offensive began on April 26, 1975. Three days later, Saigon fell.
  • Even though the 1970s was a period of lower budgets and dramatic personnel reductions for NSA, it regained some degree of access to Soviet encrypted communications during the late 1970s. A sentence that the Agency did not delete hints at this and other major cryptanalytic successes “Even with decreased money, cryptology was yielding the best information that it had produced since World War II.”
  • Ten days before the Soviet Union invaded Afghanistan on 28 December 1979, U.S. intelligence agencies provided “specific warning” of the invasion. The post-mortems evaluating intelligence estimates of the Soviet invasion “were unanimous in describing [them] as an intelligence success.”
  • During the 1960s and early 1970s, the NSA officials who ran the Agency’s domestic watch-list/eavesdropping program (Minaret) disguised the origin of their reports because they “seemed to understand that the operation was disreputable if not outright illegal.”

The NSA released the first three parts of American Cryptology during the Cold War in response to a mandatory review request filed by the National Security Archive. The excisions are currently under appeal, both at the NSA as well as the Interagency Security Classification Appeals Panel. With book four of the history recently completed, the Archive has also requested its declassification.


Read the Documents

Document 1: Thomas R. Johnson, American Cryptology during the Cold War, 1945-1989: Book I: The Struggle for Centralization, 1945-1960 (National Security Agency: Center for Cryptological History, 1995), Top Secret Umbra, Excised copy, pp. i-xvii and 1-155

Document 2: Thomas R. Johnson, American Cryptology during the Cold War, 1945-1989: Book I: The Struggle for Centralization, 1945-1960, pp. 157-287

Document 3: Thomas R. Johnson, American Cryptology during the Cold War, 1945-1989: Book II: Centralization Wins, 1960-1972 (National Security Agency: Center for Cryptological History, 1995), Top Secret Umbra, Excised copy, pp. 289-494

Document 4: Thomas R. Johnson, American Cryptology during the Cold War, 1945-1989: Book II: Centralization Wins, 1960-1972, pp. 495-652

Document 5: Thomas R. Johnson, American Cryptology during the Cold War, 1945-1989: Book III: Retrenchment and Reform, 1972-1980 (National Security Agency: Center for Cryptological History, 1998), Top Secret Umbra, Excised copy, pp. i-ix, and 1-116

Document 6: Thomas R. Johnson, American Cryptology during the Cold War, 1945-1989: Book III: Retrenchment and Reform, 1972-1980, pp. 117-262

2008-10-13

Did NSA Lie, Cover-Up? Senators Open Second Probe

Top Democrats and Republicans Ask NSA to Respond to ABC News Report on Eavesdropping

2008-10-11

(ACLU) Exposed: NSA Spies on Innocent Americans


News reports confirm what we’ve known all along: the National Security Agency is monitoring the personal conversations of innocent Americans.

Help put an end to out-of-control government eavesdropping. Donate now to support the ACLU’s lawsuit, and help us bring our government’s behavior back in line with the Constitution.

Dear ACLU Supporter,

Reports all over the media yesterday and today confirm what we’ve known all along. Surveillance programs touted as critical to protect national security have in fact been used to monitor the private communications of innocent Americans abroad, including humanitarian workers and U.S. service-members.

Two former military intercept operators -- the people at the National Security Agency (NSA) who actually listen in to people’s calls -- revealed the news in an ABC report released yesterday.

Contrary to direct assurances from Bush administration officials that NSA monitoring was directed at suspected terrorists, the intercept operators report that "hundreds of U.S. citizens overseas have been eavesdropped on as they call friends and family back home."

The NSA even intentionally directed its surveillance powers at well-established humanitarian organizations like Doctors Without Borders and the International Red Cross.

It is outrageous that service men and women and international aid workers have had their private conversations needlessly and wantonly invaded by our government.

That is why the ACLU’s lawsuit challenging the constitutionality of Congress’s expansion of the NSA’s surveillance authority under the FISA Amendments Act is so critical. Our case, Amnesty International v. McConnell -- brought on behalf of an impressive array of journalists, human rights organizations and lawyers -- shines a spotlight on the devastating effect of unchecked spying power on Americans doing indispensable work around the globe.

Stand up to warrantless and unnecessary government spying. Donate now to support the ACLU’s lawsuit, and help us put an end to out-of-control government eavesdropping.

It’s more important than ever that you support the ACLU’s lawsuit and other actions challenging out-of-control government spying.

Just as we warned -- and as our FISA lawsuit contends -- the NSA’s new unchecked surveillance powers invade the privacy of innocent Americans and fundamentally undermine human rights workers, journalists and attorneys doing important work around the globe. This dragnet spying is ineffective, intrusive, unnecessary and most certainly unconstitutional.

Donate now to support the ACLU’s lawsuit and put an end to out-of-control government eavesdropping.

The FISA Amendments Act -- rushed through a timid pre-election Congress -- gives the government nearly unfettered access to Americans’ international communications without any meaningful judicial oversight.

As this week’s news demonstrates, with unchecked and unaccountable spying powers, NSA officials will quickly run amok. That’s why the ACLU is acting decisively to bring our government’s behavior back in line with the Constitution.

We will not yield until we bring this reckless spying to an end. Please stand with us today.

Sincerely,
Anthony D. Romero
Anthony D. Romero
Executive Director
ACLU

P.S. To learn more about our lawsuit challenging unconstitutional spying, visit our website.

© ACLU, 125 Broad Street, 18th Floor New York, NY 10004