NSA Advisory – Original Document ✌️@abovetopsecretxxl

Read all at

https://t.me/ABOVETOPSECRETXXL/29064

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!

True Information is the most valuable resource and we ask you to give back.http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
https://berndpulch.org/about-me/
👉JOIN @ABOVETOPSECRETXXL

https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A
https://rumble.com/c/c-1227213
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL

SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
(Paypal, Apple Pay, Venmo, Visa, Master Card, Discover, JCB, Diners Club, 3DS)
Bitcoin: bc1q2ku4m6j5hmay36gdp7k2penr66wxzc7mchcaed
Ethereum: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7
Ripple: rfoQ7LytJNCAPj8BwP7PZfd1oFPrsN6kZv
USDT: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7
USD Coin: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7

Monero: 41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh.USDT: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7

True Information is the most valuable resource and we ask you kindly to give back.

GOD BLESS YOU!

NSA Mobile Device Best Practice ✌️@abovetopsecretxxl

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!

True Information is the most valuable resource and we ask you to give back.http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
https://berndpulch.org/about-me/
👉JOIN @ABOVETOPSECRETXXL

https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A
https://rumble.com/c/c-1227213
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL

SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
(Paypal, Apple Pay, Venmo, Visa, Master Card, Discover, JCB, Diners Club, 3DS)
Bitcoin: bc1q2ku4m6j5hmay36gdp7k2penr66wxzc7mchcaed
Ethereum: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7
Ripple: rfoQ7LytJNCAPj8BwP7PZfd1oFPrsN6kZv
USDT: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7
USD Coin: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7

Monero: 41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh.USDT: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7

True Information is the most valuable resource and we ask you kindly to give back.

GOD BLESS YOU!

Robert Birchum, USAF Officer, Pleads Guilty to Retaining NSA TOP SECRET/SCI Documents ✌️@abovetopsecretxxl

“Tampa, FL – U.S. District Judge Kathryn Kimball Mizelle today sentenced Robert L. Birchum (55, Tampa) to three years in federal prison for unlawfully possessing and retaining classified documents relating to the national defense of the United States. The court also ordered Birchum to pay a fine of $25,000.

Birchum pleaded guilty to unlawfully possessing and retaining classified documents relating to the national defense of the United States on February. 21, 2023. According to the plea agreement, Birchum previously served as a Lieutenant Colonel in the U.S. Air Force. During his 29-year career, Birchum served in various positions in intelligence, including those requiring him to work with classified intelligence information for the Joint Special Operations Command, the Special Operations Command, and the Office of the Director of National Intelligence. While on active duty, Birchum entered into several agreements with the United States regarding the protection and proper handling of classified information.

In 2017, however, law enforcement officers discovered that Birchum knowingly removed more than 300 classified files or documents, including more than 30 items marked Top Secret, from authorized locations. Birchum kept these classified materials in his home, his overseas officer’s quarters, and a storage pod in his driveway. None of these locations were authorized for storage of classified national defense information. In particular, the criminal information charges that Birchum possessed two documents on a thumb drive found in his home that contained information relating to the National Security Agency’s capabilities and methods of collection and targets’ vulnerabilities. Both of these documents were classified as Top Secret/SCI, and their unauthorized release could be expected to cause exceptionally grave damage to the national security of the United States.

“The unauthorized removal of highly sensitive documents by the defendant in this case posed great risk to our national security,” said U.S. Attorney Roger Handberg. “We are grateful for our law enforcement partners who work diligently to keep our nation safe every day.”

“A goal of the FBI’s Counterintelligence program is to protect the secrets of the US Intelligence community. This sentencing illustrates the bureau’s commitment and perseverance in pursuing those individuals who knowingly jeopardize our nation’s security,” said FBI Tampa Special Agent in Charge David Walker.

The U.S. Air Force Office of Special Investigations and the FBI investigated the case. Assistant U.S. Attorney Cherie L. Krigsman of the Middle District of Florida and Trial Attorney Evan N. Turgeon of the National Security Division’s Counterintelligence and Export Control Section prosecuted the case.”

https://www.justice.gov/usao-mdfl/pr/former-us-air-force-intelligence-officer-sentenced-36-months-imprisonment-willfully

Read all at

https://t.me/ABOVETOPSECRETXXL/29017

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!

True Information is the most valuable resource and we ask you to give back.http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
https://berndpulch.org/about-me/
👉JOIN @ABOVETOPSECRETXXL

https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A
https://rumble.com/c/c-1227213
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL

SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
(Paypal, Apple Pay, Venmo, Visa, Master Card, Discover, JCB, Diners Club, 3DS)
Bitcoin: bc1q2ku4m6j5hmay36gdp7k2penr66wxzc7mchcaed
Ethereum: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7
Ripple: rfoQ7LytJNCAPj8BwP7PZfd1oFPrsN6kZv
USDT: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7
USD Coin: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7

Monero: 41yKiG6eGbQiDxFRTKNepSiqaGaUV5VQWePHL5KYuzrxBWswyc5dtxZ43sk1SFWxDB4XrsDwVQBd3ZPNJRNdUCou3j22Coh.USDT: 0xC0198713e0049260cbe788DEd449FEc290Bf21b7

True Information is the most valuable resource and we ask you kindly to give back.

GOD BLESS YOU!

The National Security Agencyand the EC-121 Shootdown-ORIGINAL DOCUMENT

God Bless You!

SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

READ ALL AT:

https://t.me/ABOVETOPSECRETXXL/26245

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
https://berndpulch.org/about-me/
👉JOIN @ABOVETOPSECRETXXL
https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A
https://rumble.com/c/c-1227213
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL
SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

God Bless You!

✌️@abovetopsecretxxl

NSA-Converged Analysis of Smartphone Devices-ORIGINAL DOCUMENT

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
https://berndpulch.org/about-me/
👉JOIN @ABOVETOPSECRETXXL
https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL
SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

READ ALL AT:

https://t.me/ABOVETOPSECRETXXL/24084

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
👉JOIN @ABOVETOPSECRETXXL
https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL
SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

The Black NSA-Budget-ORIGINAL DOCUMENT

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
https://berndpulch.org/about-me/
👉JOIN @ABOVETOPSECRETXXL
https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL
SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

READ ALL AT:

https://t.me/ABOVETOPSECRETXXL/24036

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
👉JOIN @ABOVETOPSECRETXXL
https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL
SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

ACLU 20131209 NSA Video Games Paper

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA GCHQ csec hacienda heise 14 0816

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA Smartphones Analysis

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA Tao Intro

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

GCHQ optic nerve

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA xkeyscore sources

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

GCHQ belgacom connections

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA sid NATO intercept 15 0515

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA icreach

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA quantum tasking

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA UK mikey ibake

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

ODNI CLEANED096 NSA summary of BR requirements (maybe Feb 2009)

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA Prism 13 1021

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

Spiegel Media 35656

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

GCHQ automated noc detection

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

ACLU FISC Order BR 06 08

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA mystic

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA ant handys

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

(TS) NSA Quantum Tasking Techniques for the RT Analyst

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

ACLU DNI McConnell 2007 Shubert State Secrets Declaration

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

http activity in xks

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

EFF 20130605 guard verizon 215 secondary order

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA tarex the intercept 14 1010

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

(TS) NSA Quantum Tasking Techniques for the RT Analyst

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

Black Budget Cryptanalysis Amp Exploitation

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

EFF 20140218 intercept GCHQ sigdev

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

GCHQ anonymoUS

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

ACLU NSA Course Materials Module 1

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA prism 13 1021

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

PRISM Overview Powerpoint Slides

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

ACLU 20131209 NSA Video Games Paper

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

ACLU NSA Course Materials Module 1

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

ACLU NSA Alexander 2007 Shubert Declaration

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

ACLU January 25 2011 United States Signals Intelligence Directive 18

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

Spy Budget fy13

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

GCHQ jtrig humint intercept

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

ACLU January 25 2011 United States Signals Intelligence Directive 18

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

GCHQ full spectrum cyber

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

5 Eyes Cellspy CBC Intercept 15 0521

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

Smurf Capability Iphone

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA Treasure Map

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA Cable Spy Types

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

ACLU Egotistical Giraffe

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

GCHQ Psychology

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA sms exploit

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA Manhunting Intercept 15 0713

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

GCHQ Online Deception

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA Sentry Eagle The Intercept 14 1010

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

Email Address vs USer Activity

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

Phone Number Extractor

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

Tracking Targets on Online Social Networks

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

osint fUSion project

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSAs Spy Catalogue

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

GCHQ psychology

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA ghost machine

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

NSA xkeyscoreNSA xkeyscore

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

by Edward Snowden

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

EXPOSED-Elimination of German Resources for War-ORIGINAL DOCUMENT

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

https://t.me/ABOVETOPSECRETXXL

In the Matter of Josef Mengele-ORIGINAL DOCUMENT

by Department of Justice

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

https://t.me/ABOVETOPSECRETXXL

Malmedy Massacre Investigation

by United States Senate. Committee on Armed Services.

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

https://t.me/ABOVETOPSECRETXXL

POLISH SUPREME NATIONAL TRIBUNE – ORIGINAL DOCUMENT

by Polish Supreme National Tribunal

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

Trial summaries and reports from the Polish Supreme National Tribunal as reported by UN observers.

https://t.me/ABOVETOPSECRETXXL

Law Reports of Trials of War Criminals

by United Nations War Crimes Commission

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

https://t.me/ABOVETOPSECRETXXL

Synposes of National Trials Presented to UNWCC – ORIGINAL DOCUMENT

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

https://t.me/ABOVETOPSECRETXXL

Elimination of German Resources for War

by United Nations War Crimes Commission

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

https://t.me/ABOVETOPSECRETXXL

UNWCC Lists of War Criminals-Original Document

by United Nations War Crimes Commission

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

https://t.me/ABOVETOPSECRETXXL

EXPOSED-A Psychological Analysis of Adolf Hitler-ORIGINAL DOCUMENTS

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

by Office of Strategic Services

https://t.me/ABOVETOPSECRETXXL

EXPOSED-Yokohama War Crimes Trials-ORIGINAL DOCUMENTS

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

Trial documents from American military tribunals of Japanese war criminals digitized by the  International Criminal Court.

https://t.me/ABOVETOPSECRETXXL

EXPOSED-STUDIES IN INTELLIGENCE NAZI – RELATED ARTICLES-ORIGINAL DOCUMENTS

by National Security Agency

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

https://t.me/ABOVETOPSECRETXXL

EXPOSED-NAZI ESCAPE ROUTES TO ARGENTINA-ORIGINAL DOCUMENTS

by National Security Agency

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

https://t.me/ABOVETOPSECRETXXL

EXPOSED-Voynich Manuscript: An Elegant Enigma-ORIGINAL DOCUMENTS

by National Security Agency

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

https://t.me/ABOVETOPSECRETXXL

EXPOSED- NSA-Center for Cryptologic History Publication Finding Aid ORIGINAL DOCUMENTS

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

NSA finding aid. Covers records and publications (classified and open source) collected by the Center for Cryptologic History.

https://t.me/ABOVETOPSECRETXXL

EXPOSED- NSA UFO Files- ORIGINAL DOCUMENTS

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

EXPOSED-Cuban Missile Crisis – CIA – NSA Files & White House Recordings – ORIGINAL DOCUMENTS

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

CIA, NSA Files & White House Recordings relating to the Cuban Missile Crisis.

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

Candle In The Dark: COMINT And Soviet Industrial Secrets, By National Security Agency

SUPPORT US AND Become a Patron!

CLICK HERE: https://www.patreon.com/bePatron?u=54250700

True Information is the most valuable resource and we ask you kindly to give back. Thank you!

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://gettr.com/user/berndpulch

https://truthbook.social/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

MORE:

https://t.me/ABOVETOPSECRETXXL/15560

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THIS INFO IN FULL LENGTH UNREDACTED, OUR FULL VIDEOS, OUR FULL DOCUMENT AND MUCH MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

NSA CYBERSECURITY YEAR IN REVIEW – ORIGINAL DOCUMENT

SUPPORT US AND GET EXCLUSIVE GIFT, REPORTS & DOCS Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM & GAB FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

👉JOIN @ABOVETOPSECRETXXL

https://gab.com/berndpulch

https://www.bitchute.com/channel/R55w1IXstR3h/

https://www.youtube.com/channel/UCdoKPR_qNWDyJwtCK484A6A

Continue reading “NSA CYBERSECURITY YEAR IN REVIEW – ORIGINAL DOCUMENT”

NSA – Cryptologic-Quarterly/Doing Business Smarter – ORIGINAL DOCUMENT

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

THIS IS AN EXCERPT – YOU CAN DOWNLOAD THE FULL DOCUMENT AND MANY MORE FOR FREE AT OUR TELEGRAM CHANNEL

https://t.me/ABOVETOPSECRETXXL

Continue reading “NSA – Cryptologic-Quarterly/Doing Business Smarter – ORIGINAL DOCUMENT”

NSA SECURITY GUIDANCE FOR 5G – ORIGINAL DOCUMENT

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

Continue reading “NSA SECURITY GUIDANCE FOR 5G – ORIGINAL DOCUMENT”

NSA IG Investigation IV-12-0112 – ORIGINAL DOCUMENT

SUPPORT US AND Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

Continue reading “NSA IG Investigation IV-12-0112 – ORIGINAL DOCUMENT”

NSA – SEMI ANNUAL REPORT TO CONGRESS – ORIGINAL DOCUMENT

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

Continue reading “NSA – SEMI ANNUAL REPORT TO CONGRESS – ORIGINAL DOCUMENT”

REVEALED – NSA – CLEANED049. OVSC1204 v1OGCAprl15.pdf

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM FOR MORE ABOVE TOP SECRET INFOS

https://t.me/ABOVETOPSECRETXXL

Continue reading “REVEALED – NSA – CLEANED049. OVSC1204 v1OGCAprl15.pdf”

TOP SECRET – THE NSA & THE EC 121 SHOOTDOWN – ORIGINAL DOCUMENT

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

🚨 FOLLOW US ON TELEGRAM FOR EVEN MORE ABOVE TOP SECRET INFOS & ORIGINAL DOCUMENTS

https://t.me/ABOVETOPSECRETXXL

Continue reading “TOP SECRET – THE NSA & THE EC 121 SHOOTDOWN – ORIGINAL DOCUMENT”

TOP SECRET – NSA – Pages From Denial And Deception Except -Redacted – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Page 1 of Pages-From-Denial-and-Deception-Except-Redacted.pdf

Page 1 of Pages-From-Denial-and-Deception-Except-Redacted.pdf
Continue reading “TOP SECRET – NSA – Pages From Denial And Deception Except -Redacted – Original Document”

REVEALED – Indictment Of NSA Agent For Leaking TOP SECRET Infos – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Page 1 of LEAK CASE Indictment
Continue reading “REVEALED – Indictment Of NSA Agent For Leaking TOP SECRET Infos – Original Document”

Snowden Archive – Attempts To Penetrate Networks Of Stellar PCS & Other Telcom – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Page 1 of GCHQ "Satellite Teleport Knowledge"
Continue reading “Snowden Archive – Attempts To Penetrate Networks Of Stellar PCS & Other Telcom – Original Document”

NSA – Scope Of Treasure Map – Map Of Every Router & Device On The Global Internet – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Page 1 of Treasure Map Presentation
Continue reading “NSA – Scope Of Treasure Map – Map Of Every Router & Device On The Global Internet – Original Document”

Revealed – NSA & Nazi Gold – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

Suche nach dem Nazi-Raubgold: Der Goldschatz der Nazis - Panorama -  Stuttgarter Zeitung
Page 1 of Nsa-Nazi-Gold
Continue reading “Revealed – NSA & Nazi Gold – Original Document”

Top Secret NSA Document About Mumbai Terrorist Attacks – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

http://www.berndpulch.org

THE ONLY WEBSITE WITH THE LICENSE TO SPY!

26/11 Mumbai attack: 10 years of 2008 Mumbai terror attacks: All you need  to know about the 26/11 siege that shook Mumbai
Page 1 of Top-Secret N.S.A. Document

WikiLeaks – US Spy Order In France – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

France rejects asylum request by Wikileaks founder Assange - World News
Julian Assange
Page 1 of WikiLeaks US Spy Order France In
Continue reading “WikiLeaks – US Spy Order In France – Original Document”

Cryptome – NSA Cyber Commando East Campus Buildings – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Inside the U.S.' new state-of-the-art cyberwarfare bunker - CyberScoop
Continue reading “Cryptome – NSA Cyber Commando East Campus Buildings – Original Document”

New Report Says Denmark Helped US NSA Spy On German Politicians

New details have come to light in the scandal over the US National Security Agency’s surveillance of top European politicians. Revelations that emerged in 2013 showed that the US intelligence agency had tapped the phones of several leaders – including Germany’s Angela Merkel. Now, a new multi-national media investigation says a Danish military intelligence unit supported the US wiretapping operation. Danish intelligence reportedly worked with the US National Security Agency from here – to eavesdrop on European politicians. A joint investigation by several European media outlets shows former German chancellor candidate, Peer Steinbrück, was among the espionage targets. A major problem is that the Danish government didn’t inform their German neighbors, though they apparently knew about the eavesdropping as early as 2015. The German government said it only found out about the spying after press inquiries. Spying on Chancellor Angela Merkel and former Foreign Minister Frank-Walter Steinmeier was revealed by NSA leaker Edward Snowden and a parliamentary inquiry. It did not reveal that a close European ally was involved. The NSA, the Danish intelligence service and the Danish government refused to comment on the latest revelations.

Continue reading “New Report Says Denmark Helped US NSA Spy On German Politicians”

NSA General Counsel Gerstell – “How We Need To Prepare For A Global Cyber Pandemic” – Original Document

Become a Patron!
True Information is the most valuable resource and we ask you to give back

Glenn S. Gerstell SPEECH | April 9, 2018

By some accounts, Russian meddling in the US election system may have originated from the depths of a hot dog cart. It’s a success story, of sorts.

In the early 1990s, an enterprising hot dog vendor in Russia seized upon the entrepreneurial opportunities created by the collapse of the Soviet Union to start his own catering company. He eventually grew his business enough to win lucrative catering contracts with the Russian government. He and his restaurants threw opulent banquets for Kremlin officials, earning him the nickname “Putin’s Cook.” Yevgeny Prigozhin’s company even won a contract in 2011 to deliver school lunches across Moscow, but children wouldn’t eat the food, complaining that it smelled rotten. Bad publicity ensued. Prigozhin’s company responded not by upgrading the food, but by hiring people to flood the internet with postings praising the food and rejecting complaints. Presumably, they found it cheaper to use the internet to write fake reviews than to fund deluxe hot dogs for schoolchildren.

Continue reading “NSA General Counsel Gerstell – “How We Need To Prepare For A Global Cyber Pandemic” – Original Document”

Revealed – NSA Backdoors, Savage, MD

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

39°05’37.42″ N 76°45’36.40″ W

[Image]

[Image]

[Image]

[Image]Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Revealed – Agadez, Niger, Drone Base Construction, 2017-2020

Become a Patron!
True Information is the most valuable resource and we ask you to give back

10/24/2019[Image]

 

[Image]

10/22/2019[Image]

 

[Image]

9/30/2019[Image]

 

[Image]

9/19/2019[Image]

 

[Image]

8/17/2019[Image]

 

[Image]

8/03/2019[Image]

 

[Image]

6/27/2019[Image]

 

[Image]

4/02/2019[Image]

 

[Image]

2/03/2019[Image]

 

[Image]

12/08/2018[Image]

 

[Image]

5/01/2018[Image]

 

[Image]

11/30/2017[Image]

 

[Image]

4/16/2017[Image]

 

[Image]

 
 
 
 
 
 

Anderson Cooper about the notorious Russian Agents and their US Election Involvement

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Kellyanne Conway and CNN’s Anderson Cooper clashed in an interview over CNN’s reporting of the classified documents presented to President Obama and President-elect Trump including allegations that Russian operatives claim to have compromising personal and financial information about Trump.

Russian Agents Of Shield,Russian Agents Killed,Russian Agents In The Us,Russian Agents Dying,Russian Agents Voted For Trump,Russian Agents Behind Yahoo,Russian Agents Of Influence,Russian Agents Indicted,Russian Agents Trump,Russian Agents Yahoo Hack,Russian Agents Arrested,Russian Agents Are Behind Yahoo Breach,Russian Agents In America,Russian Travel Agents Association,Russian Sleeper Agents In America,Russian Kgb Agents In America,Russian Travel Agents In Australia,Russian Visa Agents In Australia,Russian Agents Behind Yahoo,Russian Agents Behind,Russian Basketball Agents,Russian Agents Killed By Isis,Russian Agents Executed By Isis,Russian Agents Killed By Is,Russian Agents Killed By Child,Russian Agents In Britain,Russian Visa Agents In Bangalore,Russian Fsb Agents Killed By Isis,Russian Chemical Agents,Russian Sleeper Agents Cold War,Russian Estate Agents Cyprus,Russian Sleeper Agents Caught,Russian Property Agents Cyprus,Russian Real Estate Agents Chicago,Russian Agents Killed By Child,Russian Visa Agents In Chennai,Child Russian Agents,Russian Agents Dying,Russian Agents Dead,Russian Double Agents,Russian Double Agents In The Cold War,Russian Double Agents Executed,Russian Visa Agents Delhi,Russian Travel Agents Directory,Russian Real Estate Agents Dubai,Russian Visa Agents In Dubai,Russian Travel Agents In Dubai,Russian Agents Executed,Russian Agents Executed By Isis,Russian Estate Agents,Russian Estate Agents London,Russian Estate Agents In Cyprus,Russian Estate Agents In Spain,Russian Education Agents,Russian Estate Agents In Paphos,Russian Estate Agents In Limassol,Russian Estate Agents Tenerife,Russian Foreign Agents Law,Russian Football Agents,Russian Fsb Agents,Russian Free Agents,Russian Free Agents Hockey,Russian Fifa Agents,Russian Fsb Agents Killed By Isis,Russian Fsb Agents Executed,Russian Free Agents Nhl,Russian Federal Agents,Russian Gru Agents,Russian Real Estate Agents Greece,Russian Hockey Agents,Russian Hunting Agents,Russian Free Agents Hockey,Russian Holiday Agents,Russian Agents In The Us,Russian Agents Indicted,Russian Agents In America,Russian Agents In The White House,Russian Agents In Uk,Russian Agents Isis,Russian Agents In Ukraine,Russian Agents In Europe,Russian Agents In Syria,Russian Agents In Romania,Russian Agents Killed,Russian Agents Killed By Isis,Russian Agents Killed By Child,Russian Kgb Agents In America,Russian Kgb Agents,Russian Fsb Agents Killed By Isis,Famous Russian Kgb Agents,Russian Visa Agents In Kolkata,Russian Sleeper Agents Movie,Russian Estate Agents Marbella,Russian Travel Agents Melbourne,Russian Real Estate Agents Miami,Russian Visa Agents In Mumbai,Russian Nerve Agents,Russian Free Agents Nhl,Russian Real Estate Agents New York,Russian Agents Of Shield,Russian Agents Of Influence,Russian Travel Agents Outbound,Russian Property Agents,Russian Property Agents London,Russian Property Agents Cyprus,Russian Port Agents,Russian Patent Agents,Russian Agents In Poland,Russian Visa Agents In Pakistan,Russian Estate Agents In Paphos,Russian Estate Agents Selling Property In Spain,Russian Agents In Romania,Russian Sleeper Agents Real,Russian Inteligence Agents Face Risk Of Disclosure,Russian Agents Shot,Russian Agents Series,Russian Sleeper Agents,Russian Sleeper Agents 2010,Russian Sleeper Agents 2014,Russian Secret Agents,Russian Sleeper Agents Tv Series,Russian Secret Agents Arrested In Us,Russian Sleeper Agents 1980s,Russian Special Agents,Russian Agents Trump,Russian Travel Agents,Russian Travel Agents List,Russian Travel Agents Association,Russian Travel Agents Uk,Russian Travel Agents In Dubai,Russian Tour Agents,Russian Travel Agents In Australia,Russian Travel Agents Melbourne,Russian Travel Agents In San Francisco,Russian Undercover Agents,Russian Agents In Us,Russian Agents In Uk,Russian Agents In Ukraine,Russian Travel Agents Uk,Russian Estate Agents In Uk,Russian Agents Voted For Trump,Russian Visa Agents In Delhi,Russian Visa Agents In Mumbai,Russian Visa Agents In Pakistan,Russian Visa Agents In Chennai,Russian Visa Agents In Dubai,Russian Visa Agents,Russian Visa Agents In Islamabad,Russian Visa Agents In India,Russian Visa Agents In Lahore,Russian Agents Were Behind Yahoo Hack,Russian Sleeper Agents Wiki,Russian Sleeper Agents Cold War,Russian Agents Yahoo Hack,Russian Agents Yahoo,Russian Agents Yahoo Breach,

The Shadow Brokers leak – part of a series

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Earlier this week, a group or an individual called the Shadow Brokers published a large set of files containing the computer code for hacking tools. They were said to be from the Equation Group, which is considered part of the NSA’s hacking division TAO.

The leak got quite some media attention, but so far it was not related to some earlier leaks of highly sensitive NSA documents. These show interesting similarities with the Shadow Brokers files, which were also not attributed to Edward Snowden, but seem to come from an unknown second source.


Screenshot of some computer code with instructions
from the Shadow Brokers archive
(click to enlarge)

The Shadow Brokers files

Since August 13, Shadow Brokers posted a manifesto and two large encrypted files onPastebin, on GitHub, on Tumblr and on DropBox (all of them closed or deleted meanwhile).

One of the encrypted files could be decrypted into a 301 MB archive containing a large number of computer codes for server side utility scripts and exploits for a variety of targets like firewalls from Cisco, Juniper, Fortinet and TOPSEC. The files also include different versions of several implants and instructions on how to use them, so they’re not just the malware that could have been found on the internet, but also files that were only used internally.

A full and detailed list of the exploits in this archive can be found here.

Security experts as well as former NSA employees considered the files to be authentic, and earlier today the website The Intercept came with some unpublished Snowden documents that confirm the Shadow Brokers files are real.

Besides the accessible archive, Shadow Brokers also posted a file that is still encrypted, and for which the key would only be provided to the highest bidder in an auction. Would the auction raise 1 million bitcoins (more than 500 million US dollars), then Shadow Brokers said they would release more files to the public. This auction however is likely just meant to attract attention.

Update: Shadow Brokers, or people posing like them, posted an short announcement on Pastebin on August 28, and a third, long message including a “self-interview” on Medium.com on October 1. On October 15, a fourth message was published on Medium, saying that the auction was cancelled.

 


Screenshot of a file tree from the Shadow Brokers archive
(click to enlarge)

From the Snowden documents?

According to security experts Bruce Schneier and Nicholas Weaver the new files aren’t from the Snowden trove. Like most people, they apparently assume that Snowden took mostly powerpoint presentations and internal reports and newsletters, but that’s not the whole picture. The Snowden documents also include various kinds of operational data, but this rarely became public.

Most notable was a large set of raw communications content collected by NSA under FISA and FAA authority, which also included incidentally collected data from Americans, as was reported by The Washington Post on July 5, 2014. The Snowden documents also include technical reports, which are often very difficult to understand and rarely provide a newsworthy story on their own.

Someone reminded me as well that in January 2015, the German magazine Der Spiegel published the full computer code of a keylogger implant codenamed QWERTY, which was a component of the NSA’s WARRIORPRIDE malware framework. So with the Snowden trove containing this one piece of computer code, there’s no reason why it should not contain more.

Contradicting the option that the Shadow Brokers files could come from Snowden is the fact that some of the files have timestamps as late as October 18, 2013, which is five months after Snowden left NSA. Timestamps are easy to modify, but if they are authentic, then these files have to be from another source.

A second source?

This brings us to a number of leaks that occured in recent years and which were also not attributed to Snowden. These leaks involved highly sensitive NSA files and were often more embarrassing than stuff from the Snowden documents – for example the catalog of hacking tools and techniques, the fact that chancellor Merkel was targetedand intelligence reports proving that NSA was actually successful at that.

It is assumed that these and some other documents came from at least one other leaker, a “second source” besides Snowden, which is something that still not many people are aware of. The files that can be attributed to this second source have some interesting similarities with the Shadow Brokers leak. Like the ANT catalog published in December 2013, they are about hacking tools and like the XKEYSCORE rulespublished in 2014 and 2015 they are internal NSA computer code.

This alone doesn’t say much, but it’s the choice of the kind of files that makes these leaks look very similar: no fancy presentations, but plain technical data sets that make it possible to identify specific operations and individual targets – the kind of documents many people are most eager to see, but which were rarely provided through the Snowden reporting.

As mainstream media became more cautious in publishing such files, it is possible that someone who also had access to the Snowden cache went rogue and started leaking documents just for harming NSA and the US – without attributing these leaks to Snowden because he would probably not approve them, and also to suggest that more people followed Snowden’s example.

Of course the Shadow Brokers leak can still be unrelated to the earlier ones. In that case it could have been that an NSA hacker mistakenly uploaded his whole toolkit to a server outside the NSA’s secure networks (also called a “staging server” or “redirector” to mask his true location) and that someone was able to grab the files from there – an option favored by for example Edward Snowden and security researcher the grugq.


Diagram showing the various stages and networks involved
in botnet hacking operations by NSA’s TAO division
(source – click to enlarge)

An insider?

Meanwhile, several former NSA employees have said that the current Shadow Brokers leak might not be the result of a hack from the outside, but that it’s more likely that the files come from an insider, who stole them like Snowden did earlier.

Of course it’s easier for an insider to grab these files than for a foreign intelligence agency, let alone an ordinary hacker, to steal them from the outside. But if that’s the case, it would mean that this insider would still be able to exfiltrate files from NSA premises (something that shouldn’t be possible anymore after Snowden), and that this insider has the intent to embarrass and harm the NSA (Snowden at least said he just wanted to expose serious wrongdoings).

Here we should keep in mind that such an insider is not necessarily just a frustrated individual, but can also be a mole from a hostile foreign intelligence agency.

Update:
On August 21, NSA expert James Bamford also confirmed that TAO’s ANT catalog wasn’t included in the Snowden documents (Snowden didn’t want to talk about it publicly though). Bamford favors the option of a second insider, who may have leaked the documents through Jacob Appelbaum and Julian Assange.

Russian intelligence?

On Twitter, Edward Snowden said that “Circumstantial evidence and conventional wisdom indicates Russian responsibility”, but it’s not clear what that evidence should be. It seems he sees this leak as a kind of warning from the Russians not to take revenge for the hack of the Democratic National Committee (DNC) e-mails, which was attributed to Russian intelligence.

This was also what led Bruce Schneier to think it might be the Russians, because who other than a state actor would steal so much data and wait three years before publishing? Not mentioned by Schneier is that this also applies to the documents that can be attributed to the second source: they also pre-date June 2013.

A related point of speculation is the text that accompanied the Shadow Brokers files, which is in bad English, as if it was written by a Russian or some other non-western individual. This is probably distraction, as it looks much more like a fluent American/English speaker who tried to imitate unexperienced English.

The text also holds accusations against “Elites”, in a style which very much resembles the language used by anarchist hacker groups, but that can also be faked to distract from the real source (it was also noticed that the e-mail address used by Shadow Brokers (userll6gcwaknz@tutanota.com) seems to refer to the manga Code Geass in which an exiled prince takes revenge against the “Britannian Empire”).


Screenshot of some file folders from the Shadow Brokers archive
(click to enlarge)

Conclusion

With the authenticity of the Shadow Brokers files being confirmed, the biggest question is: who leaked them? There’s a small chance that it was a stupid accident in which an NSA hacker uploaded his whole toolkit to a non-secure server and someone (Russians?) found it there.

Somewhat more likely seems the option that they came from an insider, and in that case, this leak doesn’t stand alone, but fits into a series of leaks in which, since October 2013, highly sensitive NSA data sets were published.

So almost unnoticed by the mainstream media and the general public, someone was piggybacking on the Snowden-revelations with leaks that were often more embarrassing for NSA than many reportings based upon the documents from Snowden.

Again, obtaining such documents through hacking into highly secured NSA servers seems less likely than the chance that someone from inside the agency took them. If that person was Edward Snowden, then probably someone with access to his documents could have started his own crusade against NSA.

If that person wasn’t Snowden, then it’s either another NSA employee who was disgruntled and frustrated, or a mole for a hostile foreign intelligence agency. But for an individual without the protection of the public opinion like Snowden, it must be much harder and riskier to conduct these leaks than for a foreign state actor.

Former NSA counterintelligence officer John Schindler also thinks there could have been a (Russian) mole, as the agency has a rather bad track record in finding such spies. If this scenario is true, then it would be almost an even bigger scandal than that of the Snowden-leaks.

Update #1:
During an FBI-led investigation of the ShadowBrokers leak, NSA officialsreportedly said that a former agency operative carelessly left the hacking tool files available on a remote computer, where Russian hackers found them. After this was discovered, NSA tuned its sensors to detect use of any of the tools by other parties, like China and Russia. But as that wasn’t the case, NSA did not feel obligated to warn the US manufacturers.

Update #2:
On October 6, 2016, The New York Times reported that on August 27, 2016, the FBI arrested 51-year old Harold T. Martin III, who worked at NSA as a contractor for Booz Allen Hamilton. In his home in Glen Burnie, Maryland, “many terabytes” of highly classified information was found, from the 1990s until 2014. Hal Martin was described as a hoarder, but so far, investigators are not sure he was also responsible for the various leaks that could not be attributed to Snowden.

Links and Sources
– TheWeek.com: How the NSA got hacked
– EmptyWheel.com: Where Are NSA’s Overseers on the Shadow Brokers Release?
– Observer.com: NSA ‘Shadow Brokers’ Hack Shows SpyWar With Kremlin Is Turning Hot
– TechCrunch.com: Everything you need to know about the NSA hack (but were afraid to Google)
– WashingtonPost.com: Powerful NSA hacking tools have been revealed online
– NYTimes.com: ‘Shadow Brokers’ Leak Raises Alarming Question: Was the N.S.A. Hacked?
– LawfareBlog.com: NSA and the No Good, Very Bad Monday

[contact-field label="Name" type="name" required="1"/][contact-field label="Email" type="email" required="1"/][contact-field label="Website" type="url"/][contact-field label="Comment" type="textarea" required="1"/][/contact-form

Shadow Broker Dlc, Shadow Broker Mass Effect, Shadow Broker Vulnerability, Shadow Broker Nsa, Shadow Broker Dossiers, Shadow Broker Mass Effect 2, Shadow Broker Download, Shadow Broker Ship, Shadow Broker Tools, Shadow Brokers Leak, Shadow Broker Attack, Shadow Broker Andromeda, Shadow Broker Achievements, Shadow Broker After Beating Game, Shadow Broker Agent, Shadow Broker Adalah, Shadow Broker Analysis, Shadow Broker Agent Mass Effect 2, Shadow Broker Arrested, Shadow Broker Archive, Shadow Broker Base, Shadow Broker Base Investment Opportunities, Shadow Broker Book, Shadow Broker Boss Fight, Shadow Broker Before Or After, Shadow Broker Bug, Shadow Broker Base Model, Shadow Brokers Bbc, Shadow Broker Blog, Shadow Broker Base Video Archive, Shadow Broker Crash, Shadow Broker Cve, Shadow Broker Cisco, Shadow Broker Cyber Attack, Shadow Broker Cerberus, Shadow Broker Cyber Threat, Shadow Broker Comments, Shadow Broker Cyber Security, Shadow Broker Comments Squadmates, Shadow Broker Companion Comments, Shadow Broker Dlc, Shadow Broker Dossiers, Shadow Broker Download, Shadow Broker Definition, Shadow Brokers Dump, Shadow Broker Dlc Crash, Shadow Broker Dlc Review, Shadow Broker Dlc Ps3, Shadow Broker Dlc Glitch, Shadow Broker Dlc Cost, Shadow Broker Exploits, Shadow Broker Eternal Blue, Shadow Broker Exploit List, Shadow Broker Equation Group, Shadow Broker Eternal Champion, Shadow Broker Exploits Download, Shadow Broker Effects On Mass Effect 3, Shadow Broker Ending, Shadow Broker Mass Effect 2, Shadow Broker Mass Effect, Shadow Broker Files, Shadow Broker Fight, Shadow Broker Fuzzbunch, Shadow Broker Files Garrus, Shadow Broker Framework, Shadow Broker Fb.py, Shadow Broker Facebook, Shadow Broker Forces Mass Effect 3, Shadow Broker Free Download, Shadow Broker Files Legion, Shadow Broker Github, Shadow Broker Group, Shadow Broker Garrus, Shadow Broker Grunt, Shadow Broker Glitch, Shadow Broker Guide, Shadow Broker Dlc Glitch, Shadow Broker Mission Glitch, Shadow Broker After Beating Game, Cz Shadow Gunbroker, Shadow Broker Hack, Shadow Broker Hackers, Shadow Broker Hack Nsa, Shadow Broker Hug Liara, Shadow Broker Hack Terminals, Shadow Broker Hatch, Shadow Broker Dlc How To Start, Lair Of The Shadow Broker How To Start, Lair Of The Shadow Broker How Long, Lair Of The Shadow Broker Hours, Shadow Broker Investments, Shadow Broker Identity, Shadow Broker Information Terminals, Shadow Broker Pc, Shadow Broker Insanity, Shadow Broker Intel, Shadow Broker Illusive Man, Shadow Broker Ilium, Shadow Broker In Underworld Empire, Giving Shadow Broker Info Cerberus, Shadow Brokers June, Shadow Brokers Juniper, Shadow Brokers July, Shadow Brokers June Dump, Shadow Brokers January, Shadow Brokers June Release, Shadow Brokers June 2017, Shadow Brokers Join, Shadow Broker Jack, Shadow Broker Jak Zainstalowa\u0107, Shadow Broker Kb, Shadow Broker Kahoku, Shadow Broker Keeps Crashing, Liara Shadow Broker Kiss, Shadow Broker Who To Kill, Kasumi Shadow Broker Dossier, Lair Of The Shadow Broker Key, Lair Of The Shadow Broker Keygen, Shadow Broker Leaks, Shadow Broker Liara, Shadow Broker Legion, Shadow Broker Logs, Shadow Brokers Lost In Translation, Shadow Brokers Linux, Shadow Broker List, Shadow Brokers Leak Download, Shadow Brokers Letter To Trump, Shadow Brokers List Of Exploits, Shadow Broker Mass Effect, Shadow Broker Mass Effect 2, Shadow Broker Mass Effect 1, Shadow Broker Malware, Shadow Broker Meaning, Shadow Broker Microsoft, Shadow Broker Microsoft Patch, Shadow Broker Ms17-010, Shadow Broker Morinth, Shadow Broker Model Ship, Shadow Broker Nsa, Shadow Broker News, Shadow Brokers Nsa Tools, Shadow Brokers Nsa Tools Download, Shadow Brokers Nsa Hack, Shadow Brokers Nsa Leaks, Shadow Brokers Nsa Hacking Tools, Shadow Brokers North Korea, Shadow Brokers New Release, Shadow Brokers Nytimes, Shadow Broker Observer, Shadow Broker Oracle, Shadow Broker Oddjob, Shadow Broker Ost, Shadow Broker Investment Opportunities, Shadow Broker Before Or After, Shadow Broker Comments On Squad, Shadow Broker Effects On Mass Effect 3, Shadow Broker Door Wont Open, Origin Shadow Broker, Shadow Broker Patch, Shadow Broker Password, Shadow Broker Paragon Interrupt, Shadow Broker Planet, Shadow Broker Ps3, Shadow Broker Paragon, Shadow Broker Parking Lot, Shadow Broker Dlc Price, Shadow Broker Data Points, Liara Shadow Broker Paragon Interrupt, Shadow Broker Quotes, Shadow Broker Quest, Liara Shadow Broker Quest, Mass Effect Shadow Broker Quotes, Lair Of The Shadow Broker Quotes, Mass Effect 2 Shadow Broker Quotes, Shadow Broker Release, Shadow Broker Race, Shadow Broker Rdp, Shadow Broker Rdp Exploit, Shadow Broker Romance, Shadow Broker Reddit, Shadow Broker Ransomware, Shadow Broker Romance Liara, Shadow Broker Review, Shadow Broker Rapid7, Shadow Broker Ship, Shadow Broker Smb, Shadow Broker Species, Shadow Broker Smb Exploit, Shadow Broker Solaris, Shadow Broker Subscription, Shadow Broker Smb Vulnerability, Shadow Broker Ship Model, Shadow Broker Support Team, Shadow Broker Squad, Shadow Broker Tools, Shadow Broker Twitter, Shadow Broker Terminals, Shadow Broker Tool Dump, Shadow Broker Tali, Shadow Broker Tools Download, Shadow Broker Timeline, Shadow Broker Threat, Shadow Broker Toolkit, Shadow Broker Tutorial, Shadow Broker Unique Dialogue, Shadow Broker Upgrades, Shadow Broker Update, Shadow Broker Underworld Empire, Shadow Broker Upgrades Mass Effect 3, Shadow Broker Dlc Upgrades, Lair Of The Shadow Broker Unique Dialogue, Shadow Broker Dlc Not Showing Up, Underworld Shadow Broker, Lair Of The Shadow Broker Upgrade Locations, Shadow Broker Vulnerability, Shadow Broker Video Archive, Shadow Broker Virus, Shadow Broker Vs Illusive Man, Shadow Broker Voice, Shadow Broker Vasir, Shadow Broker Base Videos, Lair Of The Shadow Broker Vasir Bug, Shadow Broker Windows, Shadow Broker Wiki, Shadow Broker Wannacry, Shadow Broker Wikileaks, Shadow Broker Walkthrough, Shadow Broker Wet Squad, Shadow Broker Website, Shadow Broker Windows 2003, Shadow Broker Windows Exploit, Shadow Broker Windows 10, Shadow Broker Dlc Xbox, Lair Of The Shadow Broker Xbox 360, Shadow Broker Yahg, Shadow Broker Youtube, Shadow Broker Zero Day, Shadow Broker Zcash, Shadow Broker Zaeed, Shadow Broker Jak Zainstalowa\u0107

Revealed – The Gorbachev File by the NSA – TOP SECRET

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

(L to R) Vice President George H. W. Bush, President Ronald Reagan and President Mikhail Gorbachev during the Governor’s Island summit, December 1988. (Credit: Ronald Reagan Presidential Library)

Marking the 85thbirthday of former Soviet leader Mikhail Gorbachev, the National Security Archive at George Washington University (www.nsarchive.org) today posted a series of previously classified British and American documents containing Western assessments of Gorbachev starting before he took office in March 1985, and continuing through the end of the Soviet Union in 1991.

The documents show that conservative British politicians were ahead of the curve predicting great things for rising Soviet star Gorbachev in 1984 and 1985, but the CIA soon caught on, describing the new Soviet leader only three months into his tenure as “the new broom,” while Ronald Reagan greeted Gorbachev’s ascension with an immediate invitation for a summit. The documents posted today include positive early assessments by Margaret Thatcher and MP John Browne, CIA intelligence reports that bookend Gorbachev’s tenure from 1985 to 1991, the first letters exchanged by Reagan and Gorbachev, the American versions of key conversations with Gorbachev at the Geneva, Reykjavik and Malta summits, German chancellor Helmut Kohl’s credit to Gorbachev in 1989 for the fall of the Berlin Wall and the end of the Cold War, and the U.S. transcript of the G-7 summit in 1990 that turned down Gorbachev’s request for financial aid.

The Archive gathered the Gorbachev documentation for two books, the Link-Kuehl-Award-winning “Masterpieces of History”: The Peaceful End of the Cold War in Europe 1989 (Central European University Press, 2010), and the forthcoming Last Superpower Summits: Gorbachev, Reagan and Bush (CEU Press, 2016). The sources include the Margaret Thatcher Foundation, the Ronald Reagan Presidential Library, the George H.W. Bush Presidential Library, and Freedom of Information and Mandatory Declassification Review requests to the CIA and the State Department.

Leading today’s Gorbachev briefing book is British Prime Minister Margaret Thatcher’s “discovery” of Gorbachev in December 1984 during his trip to Britain as head of a Soviet parliamentary delegation. In contrast to his elderly and infirm predecessors who slowly read dry notes prepared for them, Gorbachev launched into animated free discussion and left an indelible impression on Lady Thatcher. The Prime Minister, charmed by the Soviet leader, quickly shared her impressions with her closest ally and friend, Ronald Reagan. She commented famously, “I like Mr. Gorbachev. We can do business together.”


Alexander Yakovlev, Mikhail Gorbachev, Eduard Shevardnadze walking in the Kremlin, 1989 (personal archive of Anatoly Chernyaev)

Soon after Gorbachev became the Soviet General Secretary, a Conservative member of the British parliament, John Browne, who observed Gorbachev during his visit to Britain and then followed information on Gorbachev’s every early step, compared him to “Kennedy in the Kremlin” in terms of his charisma. By June 1985, the CIA told senior U.S. officials in a classified assessment that Gorbachev was “the new broom” that was attempting to clean up the years of debris that accumulated in the Soviet Union during the era of stagnation.

But Reagan had to see for himself. For four years before Gorbachev, as the American president complained in his diary, he had been trying to meet with a Soviet leader face to face, but “they keep dying on me.” In his first letter to Gorbachev, which Vice President George H.W. Bush carried to Moscow for the funeral of Gorbachev’s predecessor, Reagan invited Gorbachev to meet. Gorbachev and Reagan became pen-pals who wrote long letters – sometimes personally dictated, even handwritten – explaining their positions on arms control, strategic defenses, and the need for nuclear abolition.

Their first meeting took place in Geneva in November 1985, where in an informal atmosphere of “fireside chats” they began realizing that the other was not a warmonger but a human being with a very similar dream—to rid the world of nuclear weapons. That dream came very close to a breakthrough during Gorbachev and Reagan’s summit in Reykjavik; but Reagan’s stubborn insistence on SDI and Gorbachev’s stubborn unwillingness to take Reagan at his word on technology sharing prevented them from reaching their common goal.

Through a series of unprecedented superpower summits, Gorbachev made Reagan and Bush understand that the Soviet leader was serious about transforming his country not to threaten others, but to help its own citizens live fuller and happier lives, and to be fully integrated into the “family of nations.” Gorbachev also learned from his foreign counterparts, establishing a kind of peer group with France’s Mitterrand, Germany’s Kohl, Britain’s Thatcher, and Spain’s Gonzalez, which developed his reformist positions further and further. By the time George H.W. Bush as president finally met Gorbachev in Malta, the Soviet Union was having free elections, freedom of speech was blossoming, velvet revolutions had brought reformers to power in Eastern Europe, and the Berlin Wall had fallen to cheers of citizens but severe anxieties in other world capitals.

German Chancellor Helmut Kohl wrote in his letter to Bush at the end of November 1989: “Regarding the reform process in Poland, Hungary, Bulgaria, the CSSR [Czechoslovakia], and not least the GDR [East Germany], we have General Secretary Gorbachev’s policies to thank. His perestroika has let loose, made easier, or accelerated these reforms. He pushed governments unwilling to make reforms toward openness and toward acceptance of the people’s wishes; and he accepted developments that in some instances far surpassed the Soviet Union’s own standards.”

In 1989, the dream of what Gorbachev called “the common European home” was in the air and Gorbachev was the most popular politician in the world. When he was faced with discontent and opposition in his country, he refused to use force, like his Chinese neighbors did at Tiananmen Square. And yet, the West consistently applied harsher standards to Gorbachev’s Soviet Union than to China, resulting in feet dragging on financial aid, credits, and trade. As Francois Mitterrand pointed out during the G-7 summit in Houston in 1990: “the argument put forth for helping China is just the reverse when we are dealing with the USSR. We are too timid […] regarding aid to the USSR. […].”

What Gorbachev started in March 1985 made his country and the world better. In cooperation with Reagan and Bush, he ended the Cold War, pulled Soviet troops out of Afghanistan, helped resolve local conflicts around the globe, and gave Russia the hope and the opportunity to develop as a normal democratic country. As with many great reformers, he did not achieve everything he was striving for – he certainly never intended for the Soviet Union to collapse – but his glasnost, his non-violence, and his “new thinking” for an interdependent world created a legacy that few statesmen or women can match. Happy birthday, Mikhail Sergeyevich!


READ THE DOCUMENTS

Document-01
Memorandum of Conversation between Mikhail Gorbachev and Margaret Thatcher. December 16, 1984, Chequers.
1984-12-16
This face-to-face encounter between British Prime Minister and the leader of a Soviet parliamentary delegation produced a conversation that both Thatcher and Gorbachev would refer to many times in the future. Gorbachev engaged Thatcher on all the issues that she raised, did not duck hard questions, but did not appear combative. He spoke about the low point then evident in East-West relations and the need to stop the arms race before it was too late. He especially expressed himself strongly against the Strategic Defense Initiative promoted by the Reagan administration. Soon after this conversation Thatcher flew to Washington to share her enthusiastic assessment with Gorbachev with Reagan and encourage him to engage the Soviet leader in trying to lower the East-West tensions. She told her friend and ally what she had told the BBC, “I like Mr. Gorbachev. We can do business together” – and described him to Reagan as an “unusual Russian…. [m]uch less constrained, more charming,” and not defensive in the usual Soviet way about human rights.
Document-02
Letter from Reagan to Gorbachev. March 11, 1985
1985-03-11
Vice President George H.W. Bush hand delivered this first letter from President Reagan to the new leader of the Soviet Union, after the state funeral for Konstantin Chernenko in March 1985 (“you die, I fly” as Bush memorably remarked about his job as the ceremonial U.S. mourner for world leaders). The letter contains two especially noteworthy passages, one inviting Mikhail Gorbachev to come to Washington for a summit, and the second expressing Reagan’s hope that arms control negotiations “provide us with a genuine chance to make progress toward our common ultimate goal of eliminating nuclear weapons.” Reagan is reaching for a pen-pal, just as he did as early as 1981, when he hand-wrote a heartfelt letter during his recovery from an assassination attempt, to then-General Secretary Leonid Brezhnev suggesting face-to-face meetings and referring to the existential danger of nuclear weapons – only to get a formalistic reply. Subsequent letters between Reagan and the whole series of Soviet leaders (“they keep dying on me,” Reagan complained) contain extensive language on many of the themes – such as the ultimate threat of nuclear annihilation – that would come up over and over again when Reagan finally found a partner on the Soviet side in Gorbachev. Even Chernenko had received a hand-written add-on by Reagan appreciating Soviet losses in World War II and crediting Moscow with a consequent aversion to war.
Document-03
Gorbachev Letter to Reagan, March 24, 1985
1985-03-24
This lengthy first letter from the new Soviet General Secretary to the U.S. President displays Gorbachev’s characteristic verbal style with an emphasis on persuasion. The Soviet leader eagerly takes on the new mode of communication proposed by Reagan in his March 11 letter, and plunges into a voluminous and wide-ranging correspondence between the two leaders – often quite formal and stiff, occasionally very personal and expressive, and always designed for effect, such as when Reagan would laboriously copy out by hand his official texts. Here Gorbachev emphasizes the need to improve relations between the two countries on the basis of peaceful competition and respect for each other’s economic and social choices. He notes the responsibility of the two superpowers for world peace, and their common interest “not to let things come to the outbreak of nuclear war, which would inevitably have catastrophic consequences for both sides.” Underscoring the importance of building trust, the Soviet leader accepts Reagan’s invitation in the March 11 letter to visit at the highest level and proposes that such a visit should “not necessarily be concluded by signing some major documents.” Rather, “it should be a meeting to search for mutual understanding.”
Document-04
Reagan Letter to Gorbachev. April 30, 1985
1985-04-30
Perhaps as a reflection of the internal debates in Washington (and even in Reagan’s own head), it would take more than a month for the administration to produce a detailed response to Gorbachev’s March 24 letter. The first two pages rehash the issues around the tragic killing of American Major Arthur Nicholson by a Soviet guard, before moving to the sore subject of Afghanistan. Reagan vows, “I am prepared to work with you to move the region toward peace, if you desire”; at the same time, U.S. and Saudi aid to the mujahedin fighting the Soviets was rapidly expanding. Reagan objects to Gorbachev’s unilateral April 7 announcement of a moratorium on deployment of intermediate-range missiles in Europe, since the Soviet deployment was largely complete while NATO’s was still underway. The heart of the letter addresses Gorbachev’s objections to SDI, and Reagan mentions that he was struck by Gorbachev’s characterization of SDI as having “an offensive purpose for an attack on the Soviet Union. I can assure you that you are profoundly mistaken on this point.” Interestingly, the Reagan letter tries to reassure Gorbachev by citing the necessity of “some years of further research” and “further years” before deployment (Reagan could not have suspected decades rather than years). This back-and-forth on SDI would be a constant in the two leaders’ correspondence and conversations at the summits to come, but the consistency of Reagan’s position on this (in contrast to that of Pentagon advocates of “space dominance”), not only to Gorbachev but to Thatcher and to his own staff, suggests some room for Gorbachev to take up the President on his assurances – which never happened.
Document-05
“Mr. Gorbachev-a Kennedy in the Kremlin?” By John Browne (Member of Parliament from Winchester, England). Impressions of the Man, His Style and his Likely Impact Upon East West Relations. May 20, 1985.
1985-05-20
British MP John Browne, member of the Conservative party, was part of the Receiving Committee for Gorbachev’s visit to London in December 1984 and spend considerable time with him during his trips (including to the Lenin museum). This long essay, sent to President Reagan, and summarized for him by his National Security Adviser, describes Gorbachev as an unusual Soviet politician-“intelligent, alert and inquisitive.” Browne notes “that Gorbachev’s charisma was so striking that, if permitted by the Communist Party system, Mr. and Mrs. Gorbachev could well become the Soviet equivalent of the Jack and Jacqueline Kennedy team.” On the basis of his observations in 1984 and after Gorbachev was elected General Secretary, Browne concludes that politicians of Western democracies are likely to face an increasingly sophisticated political challenge from Mr. Gorbachev both at home and abroad.
Document-06
Letter from Gorbachev to Reagan. June 10, 1985
1985-06-10
In this long and wide-ranging response to Reagan’s letter of April 30, the Soviet leader makes a real push for improvement of relations on numerous issues. The date June 10 is significant because on this day in Washington Reagan finally took the action (deactivating a Poseidon submarine) necessary to keep the U.S. in compliance with the unratified (but observed by both sides) SALT II treaty. Here Gorbachev raises the issue of equality and reciprocity in U.S.-Soviet relations, noting that it is the Soviet Union that is “surrounded by American military bases stuffed also by nuclear weapons, rather than the U.S. – by Soviet bases.” He suggests that all previous important treaties between the United States and the Soviet Union were possible on the assumption of parity, and that Reagan’s recent focus on SDI threatens to destabilize the strategic balance – yet again demonstrating Gorbachev’s deep apprehension about Reagan’s position on strategic defenses. The Soviet leader believes that the development of ABM systems would lead to a radical destabilization of the situation and the militarization of space. At the heart of the Soviet visceral rejection of SDI is the image of “attack space weapons capable of performing purely offensive missions.” Gorbachev proposes energizing negotiations on conventional weapons in Europe, chemical weapons, the nuclear test ban, and regional issues, especially Afghanistan. He calls for a moratorium on nuclear tests “as soon as possible” – the Soviets would end up doing this unilaterally, never understanding that the issue is a non-starter in Reagan’s eyes. Here, the Soviet leader also welcomes horizontal exchanges between government ministers and even members of legislatures. However, Gorbachev’s position on human rights remains quite rigid-“we do not intend and will not conduct any negotiations relating to human rights in the Soviet Union.” That would change.
Document-07
Dinner Hosted by the Gorbachevs in Geneva. November 19, 1985.
1985-11-19
In their first face-to-face meeting at Geneva, which both of them anticipated eagerly, Reagan and Gorbachev both spoke about the mistrust and suspicions of the past and of the need to begin a new stage in U.S.-Soviet relations. Gorbachev described his view of the international situation to Reagan, stressing the need to end the arms race. Reagan expressed his concern with Soviet activity in the third world–helping the socialist revolutions in the developing countries. They both spoke about their aversion to nuclear weapons. During this first dinner of the Geneva summit, Gorbachev used a quote from the Bible that there was a time to throw stones and a time to gather stones which have been cast in the past to indicate that now the President and he should move to resolve their practical disagreements in the last day of meetings remaining. In response, Reagan remarked that “if the people of the world were to find out that there was some alien life form that was going to attack the Earth approaching on Halley’s Comet, then that knowledge would unite all peoples of the world.” The aliens had landed, in Reagan’s view, in the form of nuclear weapons; and Gorbachev would remember this phrase, quoting it directly in his famous “new thinking” speech at the 27th Party Congress in February 1986.
Document-08
Last Session of the Reykjavik Summit. October 12, 1986.
1986-10-12
The last session at Reykjavik is the one that inspires Gorbachev’s comment in his memoirs about “Shakespearean passions.” The transcript shows lots of confusion between just proposals on reducing ballistic missiles versus those reducing all nuclear weapons, but finally Reagan says, as he always wanted, nuclear abolition. “We can do that. Let’s eliminate them,” says Gorbachev, and Secretary of State George Shultz reinforces, “Let’s do it.” But then they circle back around to SDI and the ABM Treaty issue, and Gorbachev insists on the word “laboratory” as in testing confined there, and Reagan, already hostile to the ABM Treaty, keeps seeing that as giving up SDI. Gorbachev says he cannot go back to Moscow to say he let testing go on outside the lab, which could lead to a functioning system in the future. The transcript shows Reagan asking Gorbachev for agreement as a personal favor, and Gorbachev saying well if that was about agriculture, maybe, but this is fundamental national security. Finally at around 6:30 p.m. Reagan closes his briefing book and stands up. The American and the Russian transcripts differ on the last words, the Russian version has more detail [see the forthcoming book, Last Superpower Summits], but the sense is the same. Their faces reflect the disappointment, Gorbachev had helped Reagan to say nyet, but Gorbachev probably lost more from the failure.
Document-09
Letter to Reagan from Thatcher About Her Meetings with Gorbachev in Moscow. April 1, 1987
1987-04-01
Again, Margaret Thatcher informs her ally Reagan about her conversations with Gorbachev. The cover note from National Security Advisor Carlucci (prepared by NSC staffer Fritz Ermarth) states that “she has been greatly impressed by Gorbachev personally.” Thatcher describes Gorbachev as “fully in charge,” “determined to press ahead with his internal reform,” and “talk[ing] about his aims with almost messianic fervor.” She believes in the seriousness of his reformist thinking and wants to support him. However, they differ on one most crucial issue, which actually unites Gorbachev and Reagan-nuclear abolition. Thatcher writes, “[h]is aim is patently the denuclearization of Europe. I left him with no doubt that I would never accept that.”
Document-10
Letter to Bush from Chancellor Helmut Kohl. November 28, 1989.
1989-11-28
This remarkable letter arrives at the White House at the very moment when Kohl is presenting his “10 points” speech to the Bundestag about future German unification, much to the surprise of the White House, the Kremlin, and even Kohl’s own coalition partners in Germany (such as his foreign minister). Here, just weeks after the fall of the Berlin Wall, the German leader encourages Bush to engage with Gorbachev across the board and to contribute to peaceful change in Europe. Kohl points that Gorbachev “wants to continue his policies resolutely, consistently and dynamically, but is meeting internal resistance and is dependent on external support.” He hopes Bush’s upcoming meeting with Gorbachev in Malta will “give strong stimulus to the arms control negotiations.” Kohl also reminds Bush that “regarding the reform process in Poland, Hungary, Bulgaria, the CSSR [Czechoslovakia], and not least the GDR [East Germany], we have General Secretary Gorbachev’s policies to thank. His perestroika has let loose, made easier, or accelerated these reforms. He pushed governments unwilling to make reforms toward openness and toward acceptance of the people’s wishes; and he accepted developments that in some instances far surpassed the Soviet Union’s own standards.”
Document-11
Malta First Expanded Bilateral with George Bush. December 2, 1989.
1989-12-02
Being rocked by the waves on the Soviet ship Maxim Gorky, President Bush greets his Russian counterpart for the first time as President. A lot has changed in the world since they last saw each other on Governor’s Island in December 1988-elections had been held in the Soviet Union and in Poland, where a non-communist government came to power, and the Iron Curtain fell together with the Berlin Wall. After Bush’s initial presentation from notes, Gorbachev remarks almost bemusedly that now he sees the American administration has made up its mind (finally) what to do, and that includes “specific steps” or at least “plans for such steps” to support perestroika, not to doubt it. Gorbachev compliments Bush for not sharing the old Cold War thinking that “The only thing the U.S. needs to do is to keep its baskets ready to gather the fruit” from the changes in Eastern Europe and the USSR. Bush responds, “I have been called cautious or timid. I am cautious, but not timid. But I have conducted myself in ways not to complicate your life. That’s why I have not jumped up and down on the Berlin Wall.” Gorbachev says, “Yes, we have seen that, and appreciate that.” The Soviet leader goes on to welcome Bush’s economic and trade points as a “signal of a new U.S. policy” that U.S. business was waiting for. Gorbachev responds positively to each of Bush’s overtures on arms control, chemical weapons, conventional forces, next summits and so forth, but pushes back on Bush’s Cuba and Central America obsessions.
Document-12
First Main Plenary of the G-7 Summit in Houston. July 10, 1990.
1990-07-10
The bulk of discussion at this first session of the summit of the industrialized nations is devoted to the issue of how the club of the rich countries should react to the events unfolding in the Soviet Union and how much aid and investment could be directed to the support of perestroika. The summit is taking place at the time when Gorbachev is engaged in an increasingly desperate search for scenarios for radical economic reform, and fast political democratization, but he needs external financial support and integration into global financial institutions in order to succeed – or even to survive, as the events of August 1991 would show. Just before this 1990 G-7, Gorbachev wrote in a letter to George Bush that he needs “long-term credit assistance, attraction of foreign capital, transfer of managerial experience and personnel training” to create a competitive economy. Yet, the U.S. president throws only a bone or two, like “step up the pace of our negotiations with the Soviets on the Tsarist and Kerensky debts [!] to the U.S. government” (instead of forgiving or at least restructuring the debt), and “expand our existing technical cooperation.” Bush concludes his speech by stating flatly “It is impossible for the U.S. to loan money to the USSR at this time. I know, however, that others won’t agree.” The leaders who do not agree are Helmut Kohl (in the middle of providing billions of deutschmarks to the USSR to lubricate German unification) and Francois Mitterrand. The latter decries the double standards being applied to the Soviet Union and China, even after the Tiananmen massacre. Mitterrand criticizes the proposed political declaration of the G-7 as “timid” and “hesitant,” imposing “harsh political conditions as a preliminary to extending aid.” He believes the EC countries are in favor of contributing aid to the USSR but that other members, like the U.S. and Japan, have effectively vetoed such assistance.
Document-13
CIA Memorandum, The Gorbachev Succession. April 1991.
1991-04-00
On April 10, 1991, the National Security Council staff asked the CIA for an analysis of the Gorbachev succession, who the main actors would be, and the likely scenarios. The assessment opens quite drastically: “The Gorbachev era is effectively over.” The scenarios offered have an eerie resemblance to the actual coup that would come in August 1991. This might be the most prescient of all the CIA analyses of the perestroika years. The report finds that Gorbachev is likely to be replaced either by the reformers or the hard-liners, with the latter being more likely. The authors point out that “there is no love between Gorbachev and his current allies and they could well move to try to dump him.” They then list possible conspirators for such a move– Vice President Yanaev, KGB Chief Kryuchkov, and Defense Minister Yazov, among others, all of whom whom participate in the August coup. The report predicts that the “traditionalists” are likely to find a “legal veneer” for removing Gorbachev: “most likely they would present Gorbachev with an ultimatum to comply or face arrest or death.” If he agreed, Yanaev would step in as president, the conspirators would declare a state of emergency and install “some kind of a National Salvation Committee.” However, the memo concludes that “time is working against the traditionalists.” This turned out to be both prescient and correct – the August coup followed the process outlined in this document and the plot foundered because the security forces themselves were fractured and the democratic movements were gaining strength. But indeed, the coup, the resurgence of Boris Yeltsin as leader of the Russian republic, and the secession of Russia from the Soviet Union during the fall of 1991 did mark the end of the Gorbachev era.

 

Gorbachev Definition, Gorbachev Cold War, Gorbachev Wife, Gorbachev Age, Gorbachev Pizza Hut, Gorbachev Apush, Gorbachev Quotes, Gorbachev Wall, Gorbachev Resigns, Gorbachev Tear Down This Wall, Gorbachev Age, Gorbachev Apush, Gorbachev And Reagan, Gorbachev Ap Euro, Gorbachev And Perestroika, Gorbachev And Yeltsin, Gorbachev And Putin, Gorbachev Accomplishments, Gorbachev And Reagan Meeting, Gorbachev Alive, Gorbachev Berlin Wall, Gorbachev Biography, Gorbachev Birthday, Gorbachev Becomes Leader, Gorbachev Book, Gorbachev Birthmark Jokes, Gorbachev Becomes Premier Of Soviet Union, Gorbachev Becomes President, Gorbachev Brezhnev, Gorbachev Becomes Soviet Leader Date, Gorbachev Cold War, Gorbachev Comes To Power, Gorbachev Coup, Gorbachev Cartoon, Gorbachev Communism, Gorbachev Corn, Gorbachev Chernobyl, Gorbachev Commercial, Gorbachev Came To Power, Gorbachev Comes To Power Date, Gorbachev Definition, Gorbachev Death, Gorbachev Doctrine, Gorbachev Daughter, Gorbachev Definition Quizlet, Gorbachev Detente, Gorbachev Democracy, Gorbachev Domestic Policy, Gorbachev Daily Show, Gorbachev Doll, Gorbachev Economic Reforms, Gorbachev Era, Gorbachev Election, Gorbachev Ended The Cold War, Gorbachev End Of Communism, Gorbachev Effect, Gorbachev End Of Soviet Union, Gorbachev East Germany, Gorbachev Establishes Glasnost And Perestroika, Gorbachev Elected President, Gorbachev Foreign Policy, Gorbachev Facts, Gorbachev Foundation, Gorbachev Freedom Of Speech, Gorbachev Frees Warsaw Pact Nations, Gorbachev Forehead, Gorbachev Funny, Gorbachev Fall Of Ussr, Gorbachev Family, Gorbachev Fun Facts, Gorbachev Glasnost, Gorbachev Grammy, Gorbachev Good Or Bad, Gorbachev Goals, Gorbachev General Secretary, Gorbachev Glasnost Speech, Gorbachev Gif, Gorbachev Granddaughter, Gorbachev Government, Gorbachev Glasnost Perestroika Apush, Gorbachev Head, Gorbachev History, Gorbachev Height, Gorbachev History Definition, Gorbachev Home, Gorbachev Health, Gorbachev How To Pronounce, Gorbachev House, Gorbachev Historiography, Gorbachev Held Hostage, Gorbachev Introduces Perestroika, Gorbachev In Power, Gorbachev In The Cold War, Gorbachev Images, Gorbachev Interview, Gorbachev Importance, Gorbachev Initiative, Gorbachev Is He Still Alive, Gorbachev Ideology, Gorbachev Important Events, Gorbachev Jokes, Gorbachev Jfk, Gorbachev Jason Jones, Gorbachev Jump, Gorbachev John D Clare, Gorbachev John Paul Ii, Gorbachev Yeltsin, Jontron Gorbachev, Gorbachev Birthmark Jokes, Mikhail Gorbachev Job, Gorbachev Khrushchev, Gorbachev Known For, Gorbachev Kgb, Gorbachev Katyn, Gorbachev Knock Down That Wall, Gorbachev Kennedy, Gorbachev Kimdir, Gorbachev Key Policies, Gorbachev Key Dates, Gorbachev Kohl, Gorbachev Louis Vuitton, Gorbachev Legacy, Gorbachev Leadership, Gorbachev Leads Soviet Union, Gorbachev Life, Gorbachev Lives In California, Gorbachev Lithuania, Gorbachev Leader, Gorbachev Lesson Plan, Gorbachev Limousine, Gorbachev Memes, Gorbachev Mikhail, Gorbachev Moves Toward Democracy, Gorbachev Mark, Gorbachev Meaning, Gorbachev Memoirs, Gorbachev Man Of The Year, Gorbachev Moves Toward Democracy Guided Reading, Gorbachev Military Policy, Gorbachev Mask, Gorbachev Nobel Peace Prize, Gorbachev Now, Gorbachev New Thinking, Gorbachev Net Worth, Gorbachev News, Gorbachev Nuclear Disarmament, Gorbachev Newspaper, Gorbachev Nesting Dolls, Gorbachev Nobel Peace Prize Speech, Gorbachev New World Order, Gorbachev On Putin, Gorbachev On Trump, Gorbachev On Reagan, Gorbachev On Stalin, Gorbachev On Reagan Death, Gorbachev Oval Office, Gorbachev On Perestroika, Gorbachev Opposition, Gorbachev On Ronald Reagan, Gorbachev Or Gorbachev, Gorbachev Policies, Gorbachev Pizza Hut, Gorbachev Perestroika, Gorbachev Putin, Gorbachev Political Cartoons, Gorbachev President, Gorbachev Plan, Gorbachev Political Views, Gorbachev Pronounce, Gorbachev Personality, Gorbachev Quotes, Gorbachev Quizlet, Gorbachev Quotes On Perestroika, Gorbachev Quotes On Reagan, Gorbachev Quotes On Glasnost, Gorbachev Quote On Eu, Gorbachev Quora, Gorbachev Quotes On Cold War, Gorbachev Reforms, Gorbachev Resigns, Gorbachev Reagan, Gorbachev Russia, Gorbachev Revolution, Gorbachev Rise To Power, Gorbachev Residence, Gorbachev Resignation Speech, Gorbachev Religion, Gorbachev Reagan Summits, Gorbachev Speech, Gorbachev Significance, Gorbachev Scar, Gorbachev Still Alive, Gorbachev Supermarket, Gorbachev Soviet Union, Khrushchev Shoe, Gorbachev Steps Down, Gorbachev Speech 1988, Gorbachev Summary, Gorbachev Tear Down This Wall, Gorbachev Today, Gorbachev Takes Power, Gorbachev Trump, Gorbachev Twin Peaks, Gorbachev Timeline, Gorbachev Time Magazine, Gorbachev Title, Gorbachev Twitter, Gorbachev Tear Down The Wall, Gorbachev Ussr, Gorbachev Un Speech, Gorbachev Ufo, Gorbachev Us Relations, Gorbachev Ukraine, Gorbachev Us Visit, Gorbachev Us History, Gorbachev Ufo Quote, Gorbachev Urban Dictionary, Gorbachev Us Supermarket, Gorbachev Vs Putin, Gorbachev Vs Reagan, Gorbachev Visits Us, Gorbachev Vodka, Gorbachev Visits Canada, Gorbachev And Yeltsin, Gorbachev Video, Gorbachev Vice President, Gorbachev And Stalin, Gorbachev Visits Grocery Store, Gorbachev Wife, Gorbachev Wall, Gorbachev Wiki, Gorbachev War, Gorbachev Warsaw Pact, Gorbachev Wine Stain, Gorbachev White House, Gorbachev Ww3, Gorbachev With Hair, Gorbachev What Did He Do, Gorbachev Xi Jinping, Xenia Gorbachev, Mikhail Gorbachev, Reagan Gorbachev Xbox One, Gorbachev Deng Xiaoping, Reagan Gorbachev Xbox Review, Reagan Gorbachev Xbox One Walkthrough, Reagan And Gorbachev, Reagan Vs Gorbachev Xbox, Gorbachev Young, Gorbachev Yeltsin, Gorbachev Yeltsin Putin, Gorbachev Youtube, Gorbachev Yahoo, Gorbachev Years Of Presidency, Gorbachev Yeltsin 1991, Gorbachev Yuri, Gorbachev Yugoslavia, Gorbachev Youth, National Security Archive Gwu, National Security Archive Internship, National Security Archive Guatemala, National Security Archive Atomic Bomb, National Security Archive Electronic Briefing Book, National Security Archives Cuban Missile Crisis, National Security Archive Chile, National Security Archive Bay Of Pigs, National Security Archive Iran Contra, National Security Archive Iran, National Security Archive Atomic Bomb, National Security Archive Argentina, National Security Archive At George Washington University, National Security Archive Able Archer, National Security Archive Area 51, National Security Archive Afghanistan, National Security Archive Address, National Security Agency Archive, Scott Armstrong National Security Archive, National Security Archive Bay Of Pigs, National Security Archive Briefing Book No. 598, National Security Archive Blog, National Security Archive Brazil, National Security Archive Berlin Wall, National Security Archive Briefing Books, National Security Archive Bombs, National Archives Security Breach, National Security Archive Atomic Bomb, National Security Archive Tom Blanton, National Security Archive Chile, National Security Archive Chiquita, National Security Archive Colombia, National Security Archives Cuban Missile Crisis, National Security Archive Cuba, National Security Archive Cold War Readers, National Security Archive Cold War, National Security Council Archive, National Security Archive Iran Contra, Carlos Osorio National Security Archive, National Security Archive Documents, National Security Archive Database, National Security Archive Dirty War, National Security Archive Mexico Dirty War, National Security Archive Kate Doyle, National Security Archive Washington Dc, Digital National Security Archive Proquest, How To Cite National Security Archive Documents, Digital National Security Archive Library, Declassified National Security Archive, National Security Archive Electronic Briefing Book, National Security Archive El Salvador, National Security Archive Michael Evans, Emily Willard National Security Archive, East Timor Revisited National Security Archive, Www.gwu.edu National Security Archive, National Security Archive Foia, National Security Archive Fund, National Security Archive Foia Guide, National Security Archive Fund Inc, National Security Archive San Fernando, National Security Archive Gwu, National Security Archive Guatemala, National Security Archive Gulf Of Tonkin, National Security Archive Foia Guide, Georgetown National Security Archive, National Security Archive Hiroshima, Lauren Harper National Security Archive, How To Cite National Security Archive Documents, National Security Archive Internship, National Security Archive Iran Contra, National Security Archive Iran, National Security Archive Iraq War, National Security Archive Iraq, National Security Archive Iran 1953, National Security Archive In Washington, National Security Archive Iran Iraq War, National Security Archive Intern, National Security Internet Archive, National Security Archive Jobs, National Security Archive Nate Jones, Joyce Battle National Security Archive, John Prados National Security Archive, National Security Archive Kate Doyle, National Security Archive Kissinger, Digital National Security Archive Library, Lauren Harper National Security Archive, National Security Archive Mexico, National Security Archive Mexico Dirty War, National Security Archive Michael Evans, National Archives Security Measures, National Security Archives Cuban Missile Crisis, Malcolm Byrne National Security Archive, National Security Archive Nuclear Vault, National Security Archive Nsa, National Security Archive Nate Jones, National Security Archive Operation Northwoods, National Security Archive Operation Northwoods, National Security Archive Of George Washington University, National Security Archive Bay Of Pigs, National Security Archive Gulf Of Tonkin, Carlos Osorio National Security Archive, National Security Archive Pinochet, National Security Archive Polo Step, Digital National Security Archive Proquest, National Security Archive Mexico Project, National Security Archive Bay Of Pigs, Peter Kornbluh National Security Archive, National Security Archive Rwanda, National Security Archive Reykjavik, National Security Archive Cold War Readers, Jeffrey Richelson National Security Archive, East Timor Revisited National Security Archive, National Security Archive Staff, National Security Archive San Fernando, National Security Strategy Archive, National Security Archive El Salvador, National Security Archive United States, National Security Archive Polo Step, National Security Archive Tiananmen Square, National Security Archives Search, National Archives Security System, Scott Armstrong National Security Archive, National Security Archive Twitter, National Security Archive Tlatelolco, National Security Archive Torture, National Security Archive Tom Blanton, National Security Archive Tiananmen Square, National Security Archive At The George Washington University, National Security Archive Gulf Of Tonkin, The National Security Archive, The National Security Archive Atomic Bomb, The National Security Archive Website, National Security Archive Us, National Security Archive United States, National Security Archive Uk, National Security Archive Unredacted, National Security Archive Uribe, National Security Archive Washington University, National Security Council Us Archive, Us Digital National Security Archive, Us National Security Strategy Archive, National Security Archive Vietnam, National Security Archive Venezuela, National Security Archive Nuclear Vault, National Security Archive Washington, National Security Archive Washington Dc, National Security Archive Washington University, National Security Archive Wiki, National Security Archive Iraq War, National Security Archive Cold War Readers, National Security Archive Cold War, National Security Archive Dirty War, National Security Archive Mexico Dirty War, National Security Archive Iran Iraq War

Revealed – NSA Snowden Releases Tally Update – *6,697 Pages

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

7 June 2016. Add 123 pages to The Intercept. Tally now *6,697 pages of The Guardian first reported 58,000 files; caveat: Janine Gibson, The Guardian NY, said on 30 January 2014 “much more than 58,000 files in first part, two more parts” (no numbers) (tally about ~11.5%). DoD claims 1,700,000 files (~.04% of that released). ACLU lists 525 pages released by the press. However, if as The Washington Post reported, a minimum of 250,000 pages are in the Snowden files, then less than 1% have been released. Note Greenwald claim on 13 September 2014 of having “hundreds of thousands” of documents.

 

16 May 2016. Add 252 pages to The Intercept.

16 May 2016. Kudos, at last: The Intercept is broadening access to the Snowden archive. Here’s why: by Glenn Greenwald

https://theintercept.com/2016/05/16/the-intercept-is-broadening-access-to-the-snowden-archive-heres-why/

14 May 2016. Add 4 pages to The Intercept. Tally now *6,322 pages of The Guardian first reported 58,000 files; caveat: Janine Gibson, The Guardian NY,said on 30 January 2014 “much more than 58,000 files in first part, two more parts” (no numbers) (tally about ~10.6%). DoD claims 1,700,000 files (~.04% of that released). ACLU lists 525 pages released by the press. However, if as The Washington Post reported, a minimum of 250,000 pages are in the Snowden files, then less than 1% have been released. Note Greenwald claim on 13 September 2014 of having “hundreds of thousands” of documents. At Snowden current rate it will take 20-620 years to free all documents.

16 February 2016

[Image]

10 February 2016. Add 99 pages to Boing Boing (released 2 February 2016). Tally now *6,318 pages of The Guardian first reported 58,000 files; caveat: Janine Gibson, The Guardian NY, said on 30 January 2014 “much more than 58,000 files in first part, two more parts” (no numbers) (tally about ~10.6%). DoD claims 1,700,000 files (~.04% of that released). ACLU lists 525 pages released by the press. However, if as The Washington Post reported, a minimum of 250,000 pages are in the Snowden files, then less than 1% have been released. Note Greenwald claim on 13 September 2014 of having “hundreds of thousands” of documents. At Snowden current rate it will take 20-620 years to free all documents.

6 February 2016. (±) False Tallies-the Prisoner’s Dilemma? https://vimeo.com/145453201

2 February 2016. Add 14 pages to The Intercept.

23 December 2015. Add 7 pages to The Intercept

20 November 2015. Add 5 pages to Telesurtv and The Intercept.

28 September 2015. Add 21 pages to The Intercept.

24 September 2015. Add 283 pages to The Intercept.

15 August 2015. Add 74 pages to New York Times-Propublica.

11 August 2015. Add 29 pages to The Intercept.

3 August 2015. Add 10 pages to The Intercept.

16 July 2015. Add 8 pages to The Intercept.

1 July 2015. Add 1,240 pages to The Intercept.

26 June 2015. Add 13 pages to The Intercept.

22 June 2015. Add 250 pages to The Intercept.

13 June 2015. Italian journalist provides correspondence with USG on Snowden documents:

2015-1504.pdf offsite Stefania Maurizi-NSA Snowden Correspondence      June 13, 2015
2015-1503.pdf offsite Stefania Maurizi-DoJ Snowden Correspondence      June 13, 2015
2015-1502.pdf offsite Stefania Maurizi-State Snowden Correspondence    June 13, 2015

12 June 2015. Paul and FVEYDOCS tweet:

https://fveydocs.org/IC off the Record:

https://nsa.gov1.info/dni/

12 June 2015. Aeris tweets:

https://nsa.imirhil.fr/OCRized/indexed/full-text-searchable PDF.

12 June 2015. Christopher Parsons writes:

Saw your tweet re: sources for Snowden docs. I’ve compiled all the relevant Canadian documents, along with summary information of the documents’contents along with indexing information, here:https://www.christopher-parsons.com/writings/cse-summaries/

In the coming months I’m hoping to have equivalent summaries for Australia and New Zealand (and will then be moving on to do similar summary work for US- and UK-based documents).

12 June 2015. Snowden documents compilations (plus this one):

https://search.edwardsnowden.com/
https://edwardsnowden.com/revelations/
http://cjfe.org/snowden
https://github.com/nsa-observer/documents/tree/master/files/pdf
https://www.aclu.org/nsa-documents-search
http://freesnowden.is/category/revealed-documents/index.html
https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources
https://www.aclu.org/nsa-documents-released-public-june-2013
http://leaksource.wordpress.com/

If all documents are free somewhere please send pointer to: cryptome[at]earthlink.net

12 June 2015. Add 4 pages to The Intercept.

4 June 2015. Add 91 pages to The New York Times.

28 May 2015. Add 23 pages to The Intercept.

22 May 2015. Add 26 pages to CBC (with The Intercept).

21 May 2015. Edward Snowden was quoted in Forbes on May 10, 2015:

http://www.forbes.com/sites/runasandvik/2015/05/10/what-edward-snowden-said-at-the-nordic-media-festival/2/

“What I did was that I worked in partnership with the journalists who received the material. As a condition of receiving the material they agreed, prior to publication, to run these stories by the government. Not for the government to censor them, but for the government to be able to look at these and go “look, this isn’t going to get anybody killed, this isn’t going to put a human agent behind enemy lines at risk” or something like that. “This isn’t going to make Al Qaeda be able to bomb buildings.” And I think the value of this model has been proven to be quite effective.”

This indicates all stories about document releases have been “run-by governments prior to publication.” Cryptome has filed an FOIA request to NSA for records of these “run-bys.”

https://cryptome.org/2015/05/snowden-media-usg-contacts-4.pdf

21 May 2015. Add 10 pages to The Intercept.

19 May 2015. Add 19 pages to The Intercept.

18 May 2015. Add 6 pages to The Intercept.

8 May 2015. Add 40 pages to The Intercept.

5 May 2015. Add 46 pages to The Intercept.

2 April 2015. Add 7 pages to The Intercept.

30 March 2015. Snowden documents archive by The Courage Foundation:

https://edwardsnowden.com/revelations/

24 March 2015. Add 152 pages to CBC News.

14 March 2015. Add 2 pages to New Zealand Herald.

10 March 2015. Add 12 pages to The Intercept. Add 8 pages to New Zealand Herald.

8 March 2015. Add 35 pages to New Zealand Star Times.

6 March 2015. Add 4 pages to New Zealand Herald.

5 March 2015. Snowden Archive, searchable: http://cjfe.org/snowden

5 March 2015. Add 6 pages to New Zealand Herald.

19 February 2015. Add 32 pages to The Intercept.

10 February 2015. Add 2 pages to The Intercept.

5 February 2015. Add 3 pages to The Intercept.

4 February 2015. Add 5 pages to The Intercept.

30 January 2015. Compilation of Snowden documents:

https://github.com/nsa-observer/documents/tree/master/files/pdf

[Repost] 4 April 2014. ACLU offers NSA documents search: https://www.aclu.org/nsa-documents-search

Also:

http://freesnowden.is/category/revealed-documents/index.html

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013

http://leaksource.wordpress.com/

If more lists please send: cryptome[at]earthlink.net

28 January 2015. Add 21 pages to CBC News.

26 January 2015. Add Citizenfour Snowden Documentary High-Definition, with innumerable images, by Cryptome.

25 January 2015. Add Citizenfour Snowden Documentary by Cryptome, with innumerable images, some 87 extracted by Paul Dietrich in following entry.

22 January 2015. Add 87 pages to Paul Dietrich (via Citizenfour).

17 January 2015. Add 199 pages to Der Spiegel.

28 December 2014. Add 666 pages to Der Spiegel.

22 December 2014. Add 1 page to New York Times.

13 December 2014. Add 67 pages to The Intercept.

4 December 2014. Add 63 pages to The Intercept.

25 November 2014. Add 72 pages to Süddeutsche Zeitung.

6 November 2014. At current rate of release it will take 31 to 908 years for full disclosure.

10 October 2014. Add 69 pages to The Intercept.

17 September 2014. Add 2 pages to The Intercept.

14 September 2014. Add 68 pages to Der Spiegel.

13 September 2014. In video Glenn Greenwald claims to have “hundreds of thousands” of documents (at 9:06 min)

http://www.3news.co.nz/tvshows/thenation/interview-glenn-greenwald-2014091311?ref=video

Audio excerpt: http://youtu.be/xnfIp38AAhM

5 September 2014. Add 32 pages to The Intercept.

31 August 2014. Add 34 pages to Der Spiegel.

25 August 2014. Add 55 pages to The Intercept.

16 August 2014. Add 26 pages to Heise.

12 August 2014. Add 6 pages to The Intercept.

5 August 2014. Add 12 pages to The Intercept.

4 August 2014. Add 23 pages to The Intercept.

25 July 2014. Add 4 pages to The Intercept.

14 July 2014. Add 8 pages to The Intercept.

14 July 2014. “I’m as mad as hell and I’m not going to take this anymore!”

http://en.wikipedia.org/wiki/Network_%28film%29

Cryptome has sent a demand for accounting and public release specifics to holders of the Snowden documents: New York Times, Washington Post, The Guardian, Barton Gellman, Laura Poitrias, Glenn Greenwald, ACLU, EFF and John and Jane Does, US Citizens:

https://cryptome.org/2014/07/snowden-documents-demand-14-0714.pdf

11 July 2014. See related essay, Open the Snowden Files, Krystian Woznicki, 11July 2014:

English: http://berlinergazette.de/wp-content/uploads/Open-the-Snowden-Files_KW_E.pdf
German: http://berlinergazette.de/open-the-snowden-files/

11 July 2014. @PaulMD notes this claim in the Washington Post, 11 July 2014:

We did not have an official NSA list of targets. We had to find them in the pile ourselves. Soltani, an independent researcher, did most of the heavy lifting on that. Because the information was not laid out in rows and columns, the way it might be in a spreadsheet, Soltani wrote computer code to extract what we were looking for from something like a quarter-million pages of unstructured text.

If a minimum of 250,000 pages are in the Snowden files, then less than 1% have been released.

9 July 2014. Add 8 pages to The Intercept.

9 July 2014. Add 1 page to Washington Post.

23 June 2014. Add 9 pages to Der Spiegel.

22 June 2014. Add 41 pages to Information-The Intercept.

Revised. This is included in entry above. 18 June 2014. Add 20 pages to The Intercept.

18 June 2014. Add 200 pages to Der Spiegel.

16 June 2014. Add 4 pages to Der Spiegel.

1 June 2014. Add 4 pages to New York Times.

23 May 2014. Cryptome placed online No Place to Hide, 310 pages, to compensate for failure to release Snowden documents:

https://cryptome.org/2014/05/npth-freed.htm

https://cryptome.org/2014/05/npth.7z (27MB)

19 May 2014. The Intercept released 12 pages.

13 May 2014. Glenn Greenwald released 107 pages, some new, some previously published, some full pages, some page fragments.

http://hbpub.vo.llnwd.net/o16/video/olmk/holt/greenwald/NoPlaceToHide-Documents-Uncompressed.pdf

5 May 2014. Related tally of redactions of Snowden releases:

https://cryptome.org/2014/05/snowden-redactions.htm

30 April 2014. Add 19 pages to The Intercept.

30 April 2014. Add 2 pages to Dagbladet belatedly.

5 April 2014. Add 21 pages to The Intercept.

4 April 2014. ACLU offers NSA documents search: https://www.aclu.org/nsa-documents-search

Also:

http://freesnowden.is/category/revealed-documents/index.html

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013

http://leaksource.wordpress.com/

If more lists please send: cryptome[at]earthlink.net

2 April 2014.

29 March 2014. Add 1 page to Der Spiegel.

22 March 2014. Add 3 pages to Der Spiegel.

22 March 2014. Add 2 pages to New York Times.

21 March 2014. Add 7 pages to Le Monde.

20 March 2014. Add 6 pages to The Intercept.

18 March 2014. Add 4 pages to Washington Post.

13 March 2014. Add 1 page to The Intercept.

12 March 2014. Add 35 pages to The Intercept.

12 March 2014. Add 62 pages to New York Times. Add 2 pages to NRC Handelsblad.

7 March 2014. Add 8 pages to The Intercept.

27 February 2014. Add 3 pages to Guardian.

25 February 2014. Add 11 pages to NBC News.

24 February 2014. Add 4 pages to The Intercept.

24 February 2014. Add *50 pages to The Intercept (7 pages are duplicates of GCHQ Psychology).

18 February 2014. Add *45 pages to The Intercept (37 pages are duplicates of release by NBC News).

Note: Between 10-17 February 2014, The Intercept disclosed fragments of Snowden pages and the New York Times referenced some but as far as known did not release them in full. If available please send link.

10 February 2014. Add 1 page to NRC Handelsblad (via Electrospaces.blogspot.com).

7 February 2014. Add 15 pages NBC News.

5 February 2014. Add 14 pages NBC News.

31 January 2014. Add 27 pages to CBC News.

27 January 2014. Add 47 pages to NBC News.

27 January 2014. Add 18 pages to Anonymous via New York Times.

16 January 2014. Add 8 pages to The Guardian.

* 14 January 2014. Add 21 pages to Information.dk (duplicate).

* 13 January 2014. Add 4 pages to Information.dk (duplicate).

Related Snowden Document and Page Count Assessment:

https://cryptome.org/2014/01/snowden-count.htm

* 5 January 2014. Add 16 pages to Der Spiegel (30 December 2013. No source given for NSA docs). Tally now *962 pages (~1.7%) of reported 58,000. NSA head claims 200,000 (~.50% of that released).

4 January 2014. The source was not identified for *133  pages published by Der Spiegel and Jacob Appelbaum in late December 2013. They are included here but have not been confirmed as provided by Edward Snowden. Thanks to post by Techdirt.

Glenn Greenwald tweeted:

Glenn Greenwald @ggreenwald, 8:05 AM – 29 Dec 13@Cryptomeorg @ioerror I had no involvement in that Spiegel article, ask them – and they don’t say those are Snowden docs.

Matt Blaze tweeted, 11:24 AM – 2 Jan 14

matt blaze @mattblazeIf there are other sources besides Snowden, I hope journalists getting docs are careful to authenticate them (& disclose uncertainty).

3 January 2014. Add 13 pages to Washington Post.

3 January 2014. See also EFF, ACLU and LeakSource accounts:

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013

http://leaksource.wordpress.com/

2 January 2014. Add 1 page to Washington Post published 10 July 2013.

* 31 December 2013. Add 16 pages to Der Spiegel.

* 30 December 2013. Add 50 pages of NSA ANT Catalog by Jacob Appelbaum (no source given for NSA docs).

* 30 December 2013. Add 21 pages from 30C3 video by Jacob Appelbaum (no source given for NSA docs).

* 30 December 2013. Add 42 pages (8 duplicates) to Der Spiegel (no source given for NSA docs).

* 29 December 2013. Add 4 pages to Der Spiegel (no source given for NSA docs).

24 December 2013. Add 2 pages to Washington Post.

23 December 2013

http://www.adn.com/2013/12/22/3243451/pincus-snowden-still-has-a-road.html

We’ve yet to see the full impact of former National Security Agency contractor Edward Snowden’s unauthorized downloading of highly classified intelligence documents.

Among the roughly 1.7 million documents he walked away with — the vast majority of which have not been made public — are highly sensitive, specific intelligence reports, as well as current and historic requirements the White House has given the agency to guide its collection activities, according to a senior government official with knowledge of the situation.

The latter category involves about 2,000 unique taskings that can run to 20 pages each and give reasons for selective targeting to NSA collectors and analysts. These orders alone may run 31,500 pages.

13 December 2013. Add 26 pages to Trojkan (SVT). Tally now 797 pages (~1.4%) of reported 58,000. NSA head claims 200,000 (~.40% of that released). Australia press reports “up to 20,000 Aussie files.”

Rate of release over 6 months, 132.8 pages per month, equals 436 months to release 58,000, or 36.3 years. Thus the period of release has decreased in the past month from 42 years.

12 December 2013. Belatedly add 27 pages to Guardian and 18 pages to Washington Post.


21 November 2013. See also EFF and ACLU accounts:

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013


Timeline of releases:

[See tabulation below for full timeline.]


5 October 2013

26 Years to Release Snowden Docs by The Guardian

Out of reported 15,000 pages, The Guardian has published 192 pages in fourteen releases over four months, an average of 48 pages per month, or 1.28% of the total. At this rate it will take 26 years for full release.


Number Date Title Pages

  The Guardian   276
  27 February 2014 GCHQ Optic Nerve 3
21 16 January 2014 SMS Text Messages Exploit 8
20 9 December 2013 Spying on Games 2
18 18 November 2013 DSD-3G 6
19 1 November 2013 PRISM, SSO
SSO1 Slide
SSO2 Slide
13*
18 4 October 2013 Types of IAT Tor 9
17 4 October 2013 Egotistical Giraffe 20*
16 4 October 2013 Tor Stinks 23
15 11 September 2013 NSA-Israel Spy 5
14 5 September 2013 BULLRUN 6*
13 5 September 2013 SIGINT Enabling 3*
12 5 September 2013 NSA classification guide 3
11 31 July 2013 XKeyscore 32
10 27 June 2013 DoJ Memo on NSA 16
9 27 June 2013 Stellar Wind 51
8 21 June 2013 FISA Certification 25
7 20 June 2013 Minimization Exhibit A 9
6 20 June 2013 Minimization Exhibit B 9
5 16 June 2013 GCHQ G-20 Spying 4
4 8 June 2013 Boundless Informant FAQ 3
3 8 June 2013 Boundless Informant Slides 4
2 7 June 2013 PPD-20 18
1 5 June 2013 Verizon 4

  Washington Post   297
  9 July 2014 NSA Emails 1
  18 March 2014 NSA SCALAWAG 2
  18 March 2014 NSA MYSTIC 2
  2 January 2014 Quantum Computer 2 10
  2 January 2014 Quantum Computer 3
  23 December 2013 NSA/CSS Mission 2
  11 December 2013 Excessive Collection 9
  11 December 2013 SCISSORS 2 7
  11 December 2013 SCISSORS 1 4
  11 December 2013 Yahoo-Google Exploit 6
  11 December 2013 Cable Spying Types 7
  11 December 2013 WINDSTOP 1
  11 December 2013 Co-Traveler 24
  11 December 2013 GSM Tracking 2
  11 December 2013 SIGINT Successes 4
  11 December 2013 GHOSTMACHINE 4
  5 December 2013 Target Location 1
  4 December 2013 FASCIA 2
  4 December 2013 CHALKFUN 1
  26 November 2013 Microsoft a Target? 4
  4 November 2013 WINDSTOP, SSO, Yahoo-Google 14
  30 October 2013 MUSCULAR-INCENSOR Google and Yahoo 4
  14 October 2013 SSO Overview 4
  14 October 2013 SSO Slides 7
  14 October 2013 SSO Content Slides 9
  4 October 2013 Tor 49
  4 October 2013 EgotisticalGiraffe 20*
  4 October 2013 GCHQ MULLENIZE 2
  4 October 2013 Roger Dingledine 2
  30 August 2013 Budget 17
  10 July 2013 PRISM Slide 1
  29 June 2013 PRISM 8
  20 June 2013 Warrantless Surveillance 25*
  7 June 2013 PPD-20 18*
  6 June 2013 PRISM 1

  Der Spiegel   * 1,278
  17 January 2015 NSA Prepares for Cyber Battle 199
  28 December 2014 NSA Attacks on VPN, SSL, TLS, SSH, Tor 197MB 666
  14 September 2014 GCHQ STELLAR 26
  14 September 2014 NSA Treasure Map 38
  14 September 2014 NSA Treasure Map New 4
  31 August 2014 NSA GCHQ Spy Turkey 34
  23 June 2014 NSA German SIGADs 9
  18 June 2014 NSA German Spying-2 200
  16 June 2014 NSA German Spying 4
  29 March 2014 NSA Spy Chiefs of State 1
  22 March 2014 NSA SHOTGIANT 2NSA SHOTGIANT 1 21
  31 December 2013 QFIRE * 16
  30 December 2013 TAO Introduction * 16
  30 Deceber 2013 QUANTUM Tasking (8 duplicates of QUANTUMTHEORY) 28*
  30 December 2013 QUANTUMTHEORY 14
  29 December 2013 TAO ANT COTTONMOUTH (images)
TAO ANT COTTONMOUTH
(DE article)
4
  17 November 2013 ROYAL CONCIERGE (DE)ROYAL CONCIERGE (EN) 2
  29 October 2013 NSA-CIA SCS 3
  27 October 2013 NSA-CIA SCS 2
  20 October 2013 Mexico President 1
  20 September 2013 Belgacom 3
  16 September 2013 SWIFT 3
  9 September 2013 Smartphones 5
  1 September 2013 French Foreign Ministry 0
  31 August 2013 Al Jazeera 0

  O Globo Fantastico   ~87
  7 October 2013 CSE Brazil Ministry 7
  8 September 2013 Petrobas ~60
  3 September 2013 Brazil and Mexico 20

  New York Times   216
  15 August 2015 NSA SSO Fairview Stormbrew Blarney (with Propublica) 74
  4 June 2015
4 June 2015
NSA Expands Phone Spying at Borders
NSA Expands Phone Spying at Borders 2
90
1
  22 December 2014 NSA Tracks Zarrar Shah 1
  1 June 2014 NSA Identity Spying 4
  22 March 2014 NSA Huawei SHOTGIANT 2
  12 March 2014 NSA Stellarwind Classification
NSA FISA FAA Classification
AG Dissemination
NSA Cryptanalyist FISA Database
NSA Spying Timeline
37
18
2
4
1
  9 December 2013 Spying on Games 82*
  23 November 2013 SIGINT Strategy 2012-2016 5
  3 November 2013 SIGINT Mission 2013SIGINT Mission 2017 22
  28 September 2013 Contact Chaining Social Networks 1
  28 September 2013 SYANPSE 1
  5 September 2013 BULLRUN 4*
  5 September 2013 SIGINT Enabling 3*
 

  ProPublica   163*
  15 August 2015 NSA SSO Fairview Stormbrew Blarney (with NY Times) 74*
  9 December 2013 Spying on Games 82*
  5 September 2013 BULLRUN 4*
  5 September 2103 SIGINT Enabling 3*

  Le Monde   20
  21 March 2014 CSE SNOWGLOBE 7
  25 October 2013 NSA Hosts FR Spies 4
  22 October 2013 Wanadoo-Alcatel 1
  22 October 2013 Close Access Sigads 2
  22 October 2013 Boundless Informant 2
  22 October 2013 PRISM 11

  Dagbladet   15
  April 2014
December 2013
Norway Assistance 2
  19 November 2013 BOUNDLESSINFORMANT 13

  NRC Handelsblad   7
  12 March 2014 NSA Aids Dutch Anti-Piracy 2
  8 February 2014 MIVD BoundlessInformant
Cryptome mirror
1
  30 November 2013 Dutch SIGINT 3
  23 November 2013 SIGINT Cryptologic Platform 1

  Huffington Post   3
  27 November 2013 Muslim Porn Viewing 3

  CBC   214
  22 May 2015 US-UK-CA-AU-NZ Cellphone Spying 26*
  24 March 2015 CSEC Cyber Threats 152
  28 January 2015 CSE LEVITATION-FFU Project 21
  30 January 2014 CSEC IP Profiling 27
  10 December 2013 NSA-CSEC Partnership 1
  10 December 2013 G8-G20 Spying 4*
  2 December 2013 G8-G20 Spying 3
  29 November 2013 G8-G20 Spying 1

  The Globe and Mail   18
  30 November 2013 CSEC Brazil Spying 18*

  SVT (Swedish TV)   2
  5 December 2013 Sweden Spied Russia for NSA 2

  L’Espresso   3
  6 December 2013 NSA Spies Italy 3

  Trojkan (SVT)   29
  11 December 2013 NSA Sweden FRA Relationship 1*
  11 December 2013 NSA 5 Eyes Partners 1
  11 December 2013 NSA Sweden FRA Agenda 8
  11 December 2013 NSA Sweden FRA RU Baltic 1
  11 December 2013 NSA GCHQ Sweden FRA COMINT 1
  11 December 2013 NSA Sweden FRA  XKeyscore Plan 5
  11 December 2013 NSA Sweden FRA XKeyscore Sources 1
  11 December 2013 NSA Sweden FRA XKeyscore Tor et al 3
  11 December 2013 NSA Sweden FRA XKeyscore Slide 1
  11 December 2013 NSA Sweden FRA Quantum 1 1
  11 December 2013 GCHQ Sweden FRA Quantum 1
  11 December 2013 NSA Sweden FRA Quantum Accomplishments 2
  9 December 2013 NSA and Sweden Pact 3*

  Jacob Appelbaum   * 71
  30 December 2013 NSA Catalog * 50
  30 December 2013 NSA Catalog Video Clips * 21

  Information.dk   63*
  19 June 2014 NSA Partners 41*
  14 January 2014 SSO (duplicate) 7*
  14 January 2014 PRISM (duplicate) 11*
  13 January 2014 5-Eyes Spy G8-G20 (duplicate) 4*

  Anonymous/
New York Times
  18
  27 January 2014 NSA Smartphones Analysis 14
  27 January 2014 GCHQ Mobile Theme 4

  NBC News   87
  25 February 2014 GCHQ Cyber Effects 11
  7 February 2014 GCHQ Cyber Attack 15
  5 February 2014 GCHQ Anonymous 14
  27 January 2014 GCHQ Squeaky Dolphin 47

  The Intercept   3,083*
  7 June 2016 GCHQ Preston, Digint, Milkwhite, CCD, et al 123
  16 May 2016 NSA SID Today 178 files 252
  14 May 2016 NSA SIGINT to HUMINT 4
  2 February 2016 UAV Programs 14
  23 December 2015 NSA-GCHQ Juniper 7
  17 November 2015 NSA SCS Venezuela 5
  28 September 2015 NSA Rogue Olympics 21
  24 September 2015 NSA-GCHQ 29 Documents 283
  11 August NSA SIGINT Philosopher 29
  3 August 2015 NSA ECHELONGCHQ COMSAT 73
  16 July 2015 NSA Manhunting 8
  1 July 2015 NSA XKeyscore and More 1,264
  26 June 2015 NSA on NYT Warrantless Wiretap Story 13
  22 June 2015 GCHQ 11 Filles 250
  12 June 2015 NSA SID Hacker Interview 4
  28 May 2015 NSA SID Today 23
  22 May 2015 US-UK-CA-AU-NZ Cellphone Spying 26*
  21 May 2015 NSA Medical Spying 10
  19 May 2015 NSA SID NATO 19
  18 May 2015 JTAC Attack Methodology 3
  18 May 2015 NCTC Major Terrorism Figures 1
  18 May 2015 Black Budget Bin Laden Raid 2
  8 May 2015 NSA SKYNET 40
  5 May 2015 NSA Black Budget SID RT10 WG Language 46
  2 April 2015 NSA GCHQ JTRIG Argentina-Iran 7
  10 March 2015 NSA Apple DPA Cryptanalysis 12
  19 February 2015 GCHQ PCS Harvesting At Scale 32
  10 February 2015 NSA Iran GCHQ 2
  5 February 2015 DNI NATO Cyber Panel 3
  4 February 2015 GCHQ Lovely Horse et al 5*
  13 December 2014 GCHQ Belgacom Hack 67
  4 December 2014 NSA AURORA GOLD et al 63
  10 October 2014 10 NSA Releases
Computer Network Exploitation Declass
National Initiative Task Security 2
National Initiative Task Security 1
Exceptionally Controlled Info Compartments
Exceptionally Controlled Info Pawleys
Exceptionally Controlled Information
Sentry Eagle 2
Sentry Eagle 1
Tarex Classification Guide
Whipgenie Classification Guide
69
  17 September 2014 NSA Visit by NZ Spy 2
  5 September 2014 Masterspy Quadrennial Report 2009 32
  25 August 2014 NSA ICREACH 55
  12 August 2014 GCHQ Covert Mobile Phones Policy 6
  5 August 2014 NCTC Terrorist Identifies 12
  4 August 2014 US-NSA Pays Israel $500,000 2
  4 August 2014 NSA-Israel Spying Pact 2013 3
  4 August 2014 Israel-US Spying Pact 1999 16
  25 July 2014 NSA Saudi Arabia 4
  14 July 2014 NSA JTRIG Tools-Techniques 8
  9 July 2014 NSA FISA Accounts 8
  19 June 2014 NSA Partners 41*
  19 May 2014 12 Various Pages 12
  30 April 2014 GHOSTMACHINE-ECHOBASE
NSA Visit by GCHQ Lobban
PRISM with Olympics
14:6+8
4:1+3
1:
  4 April 2014 GCHQ Full Spectrum Cyber
NSA 5-Eyes SIGDEV Conference
19
2
  20 March 2014 NSA Hunt Sysadmins 6
  13 March 2014 NSA Third Party 1
  12 March 2014 NSA HammerchantNSA UK on Mikey and Ibake

 

NSA Turbine and Turmoil

NSA Thousands of Implants

NSA More Than One Way

NSA GCHQ Quantumtheory

NSA Selector Types

NSA Quantum Insert

NSA Analysis of Converged Data

NSA Phishing and MTM Attacks

NSA Menwith Hill xKeyscore

NSA Industry Exploit

NSA 5 Eyes Hacking

43

 

2

1

1

11

1

5

1

3

1

1

1

  7 March 2014 NSA Ask Zelda 8
  24 February 2014 GCHQ Disruption 4
  24 February 2014 GCHQ Online Deception
(7 pages duplicates of GCHQ Psychology)
*50
  18 February 2014 GCHQ Psychology37 Duplicates of NBC News *44
  18 February 2014 NSA-GCHQ Discovery 1
       
  Glenn Greenwald    
  13 May 2014 A variety of documents 107
       
  Cryptome   310
  26 January 2015 Citizenfour Snowden Documentary High Definition (7-Zip MP4) (3.6GB) ~
  25 January 2015 Citizenfour Snowden Documentary (7-Zipped MP4) (1.2GB) ~
  23 May 2014 No Place to Hide (27MB) 310
       
  Heise   26
  16 August 2014 NSA GCHQ CSEC HACIENDA 26
       
  Süddeutsche Zeitung   7
  25 November 2014 Vodafone GCHQ Cables List and Slides 72
       
  Paul Dietrich
@Paulmd199
  87
  22 January 2015 87 Citizenfour Screengrabs 87
       
  New Zealand Herald   20
  14 March 2015 GCSB Targets Solomons 2
  10 March 2015 NSA-New Zealand Relationship 8
  6 March 2015 GCSB XKeyscore 2 4
  5 March 2015 GCSB XKeyscore 6
       
  New Zealand Star Times   35
  8 March 2015 GCSB XKeyscore 3 35
       
  Telesurtv    
  17 November 2015 NSA SCS Venezuela 5*
       
  Boing Boing    
  2 February 2016 GCHQ Malware 99
       

                             
 

 

 

Edward Snowden Wife, Edward Snowden Movie, Edward Snowden Twitter, Edward Snowden Dead, Edward Snowden Quotes, Edward Snowden Interview, Edward Snowden Wiki, Edward Snowden Russia, Edward Snowden Net Worth, Edward Snowden 2017, Edward Snowden Age, Edward Snowden Antarctica, Edward Snowden Articles, Edward Snowden Actor, Edward Snowden And Trump, Edward Snowden And Julian Assange, Edward Snowden And Wikileaks, Edward Snowden Apush, Edward Snowden Ama, Edward Snowden And Lindsay Mills, Edward Snowden Biography, Edward Snowden Book, Edward Snowden Bin Laden, Edward Snowden Booz Allen, Edward Snowden Birthday, Edward Snowden Bbc, Edward Snowden Blog, Edward Snowden Birth Chart, Edward Snowden Bernie Sanders, Edward Snowden Bitcoin, Edward Snowden Cia, Edward Snowden Cnn, Edward Snowden Cast, Edward Snowden Chelsea Manning, Edward Snowden Current News, Edward Snowden Citizen 4, Edward Snowden Conservative, Edward Snowden China, Edward Snowden Chemtrails, Edward Snowden Contact, Edward Snowden Dead, Edward Snowden Documentary, Edward Snowden Definition, Edward Snowden Documentary Netflix, Edward Snowden Doc, Edward Snowden Donald Trump, Edward Snowden Dell, Edward Snowden Documentary Hbo, Edward Snowden Date, Edward Snowden David Hoffman, Edward Snowden Essay, Edward Snowden Email, Edward Snowden Ethics, Edward Snowden Ethics Essay, Edward Snowden Early Life, Edward Snowden Effect, Edward Snowden Ecuador, Edward Snowden Education, Edward Snowden Everything About Donald Trump, Edward Snowden Event, Edward Snowden Facts, Edward Snowden Family, Edward Snowden Film, Edward Snowden First Interview, Edward Snowden Facebook, Edward Snowden Father, Edward Snowden Full Movie, Edward Snowden Flat Earth, Edward Snowden First Tweet, Edward Snowden Fox News, Edward Snowden Guardian, Edward Snowden Glenn Greenwald, Edward Snowden Glasses, Edward Snowden Global Warming, Edward Snowden Gif, Edward Snowden Google, Edward Snowden Girlfriend Movie, Edward Snowden Good, Edward Snowden Grandfather, Edward Snowden Genius, Edward Snowden Hero, Edward Snowden Height, Edward Snowden House, Edward Snowden Hawaii, Edward Snowden High School, Edward Snowden Hong Kong, Edward Snowden History, Edward Snowden Heartbeat, Edward Snowden Haarp, Edward Snowden Hbo, Edward Snowden Interview, Edward Snowden Iq, Edward Snowden Instagram, Edward Snowden Interview 2013, Edward Snowden Imdb, Edward Snowden Interview 2017, Edward Snowden Images, Edward Snowden Interview 2016, Edward Snowden Income, Edward Snowden Iphone, Edward Snowden Job, Edward Snowden Journalist, Edward Snowden Japan, Edward Snowden Julian Assange Bradley Manning, Edward Snowden Java, Edward Snowden Journalism, Edward Snowden Joseph Gordon-levitt, Edward Snowden Julian Assange, Edward Snowden John Oliver Passwords, Edward Snowden Jean Michel Jarre, Edward Snowden Kunia, Edward Snowden Kimdir, Edward Snowden Katie Couric Interview, Edward Snowden Katie Couric, Edward Snowden Kaskus, Edward Snowden Kim, Edward Snowden Kasus, Edward Snowden Kfc, Edward Snowden Kim Jest, Edward Snowden Koenig, Edward Snowden Location, Edward Snowden Lindsay Mills Moscow, Edward Snowden Laptop, Edward Snowden Lindsay Mills, Edward Snowden Living, Edward Snowden Lawyer, Edward Snowden Life, Edward Snowden Latest News, Edward Snowden Latest, Edward Snowden Live Stream, Edward Snowden Movie, Edward Snowden Movie Netflix, Edward Snowden Movie Cast, Edward Snowden Military, Edward Snowden Movie Online, Edward Snowden Memes, Edward Snowden Middlebury College, Edward Snowden Married, Edward Snowden Moscow, Edward Snowden Medical Condition, Edward Snowden Net Worth, Edward Snowden Now, Edward Snowden News, Edward Snowden New York Times, Edward Snowden Netflix, Edward Snowden Natal Chart, Edward Snowden Nobel Prize, Edward Snowden Nsa Salary, Edward Snowden Npr, Edward Snowden Nationality, Edward Snowden On Trump, Edward Snowden Osama Bin Laden, Edward Snowden Obama, Edward Snowden Oscar, Edward Snowden On Movie, Edward Snowden On Twitter, Edward Snowden Openstack, Edward Snowden On Antarctica, Edward Snowden Os, Edward Snowden Original Interview, Edward Snowden Parents, Edward Snowden Political Views, Edward Snowden Privacy Tips, Edward Snowden Political Party, Edward Snowden Patriot Act, Edward Snowden Pictures, Edward Snowden Podcast, Edward Snowden Phone Case, Edward Snowden Poll, Edward Snowden Putin, Edward Snowden Quotes, Edward Snowden Quizlet, Edward Snowden Questions, Edward Snowden Quien Es, Edward Snowden Quote About Privacy, Edward Snowden Quotes Citizenfour, Edward Snowden Quick Facts, Edward Snowden Qualifications, Edward Snowden Russia, Edward Snowden Reddit, Edward Snowden Research Paper, Edward Snowden Real Name, Edward Snowden Residence, Edward Snowden Resume, Edward Snowden Robot, Edward Snowden Recommended Apps, Edward Snowden Reporter, Edward Snowden Russian, Edward Snowden Story, Edward Snowden Salary, Edward Snowden Status, Edward Snowden Signal, Edward Snowden Speech, Edward Snowden Security Tips, Edward Snowden Shirt, Edward Snowden Siblings, Edward Snowden Special Forces, Edward Snowden Still Alive, Edward Snowden Twitter, Edward Snowden Today, Edward Snowden Trump, Edward Snowden Timeline, Edward Snowden Ted Talk, Edward Snowden The Guardian, Edward Snowden Trailer, Edward Snowden The Movie, Edward Snowden T Shirt, Edward Snowden Tor, Edward Snowden Update, Edward Snowden Ufo, Edward Snowden Us Army, Edward Snowden University Of Michigan, Edward Snowden Used Tails, Edward Snowden Umich, Edward Snowden University Of Maryland, Edward Snowden Ufo Wikileaks, Edward Snowden Ufo Video, Edward Snowden Urban Dictionary, Edward Snowden Video, Edward Snowden Vpn, Edward Snowden Vice, Edward Snowden And Julian Assange, Edward Snowden Voice, Edward Snowden And Bradley Manning, Edward Snowden Vault 7, Edward Snowden Visa, Edward Snowden And Wikileaks, Edward Snowden Vanity Fair, Edward Snowden Wife, Edward Snowden Wiki, Edward Snowden Wired, Edward Snowden William And Mary, Edward Snowden Washington Post, Edward Snowden Who Is He, Edward Snowden Website, Edward Snowden Worth, Edward Snowden Wikileak, Edward Snowden Washington Post 2013, Edward Snowden Youtube, Edward Snowden Young, Edward Snowden Yahoo Answers, Edward Snowden Youtube Channel, Edward Snowden Youtube Documentary, Edward Snowden Yokota, Edward Snowden And Lindsay Mills, Edward Snowden Yify, Edward Snowden Zodiac Sign, Edward Snowden Zcash, Edward Snowden Zuckerberg, Edward Snowden Zoho, Edward Snowden Zizek, Edward Snowden Zimbabwe, Edward Snowden Zitate, Edward Snowden Zusammenfassung, Edward Snowden Zivilisation, Edward Snowden Zvi\u017eda\u010d

 

TOP SECRET from CRYPTOME – 1 Snowden Email Disclosed to 26 Emails & 31 Docs

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

 

Cryptome Eyeball, Cryptome Twitter, Cryptome Wikileaks, Cryptome Archive, Cryptome Trump, Cryptome Wikipedia, Cryptome Secret Service, Cryptome Down, Cryptome Payment Technologies, Cryptome Pharmaceuticals Ltd, Cryptome Archive, Cryptome Area 51, Cryptome Air Force One, Cryptome Archive Download, Cryptome Alien, Cryptome Albania, Cryptome Assange, Cryptome Alternatives, Cryptome Pharmaceuticals Australia, Cryptome Mi6 Agents, Cryptome Boston Marathon, Cryptome Benghazi, Cryptome Bitcoin, Cryptome Brazil, Cryptome Cn, Cryptome Cia, Cryptome China, Cryptome Charlie Hebdo, Cryptome Contact, Crypto Code, Cryptome Citizenfour Download, Citizenfour Cryptome Mirror, Cryptome Down, Cryptome Download, Cryptome Drones, Cryptome Definition, Cryptome Deep Web, Define Cryptome, Cryptome Archive Download, Cryptome Full Disclosure, Cryptome Site Down, Cryptome Citizenfour Download, Cryptome Eyeball, Cryptome Edward Snowden, Cryptome Eyeballing Presidential Protection, Cryptome Que Es, Cryptome Fru, Cryptome Fukushima, Cryptome For Sale, Cryptome Facebook, Cryptome Femen, Cryptome Full Disclosure, Cryptome Feed, Cryptome Free List, Cryptome Fukushima Daiichi, Cryptome Rss Feed, Cryptome Gchq, Cryptome Gang Stalking, Giganews Cryptome, Cryptome Microsoft Spy Guide, Cryptome Hacked, Cryptome White House, Cryptome Sandy Hook, Cryptome Jade Helm, Cryptome Ira Members, Cryptome Ira, Cryptome Isis, Cryptome Iraq, Cryptome Ireland, Cryptome Inspire, Cryptome India, Cryptome Interview, Cryptome Israel, Cryptome Improvised Munitions, Cryptome Jade Helm, Cryptome North Korea, Cryptome Like Sites, Cryptome Legal, Cryptome Libya, Cryptome List, Cryptome Le Siecle, Like Cryptome, Cryptome Pharmaceuticals Ltd, Cryptome Mi6, Cryptome Mirror, Cryptome Microsoft, Cryptome Microsoft Spy Guide, Cryptome Mirror Sites, Cryptome Mk Ultra, Cryptome Boston Marathon, Cryptome Ira Members, Cryptome Improvised Munitions, Citizenfour Cryptome Mirror, Cryptome North Korea, Cryptome Nuclear, Cryptome Northern Ireland, Cryptome Nsa, Cryptome-nov 2015, Cryptome Nedir, Cryptome.org Wikipedia, Cryptome Obama Protection, Cryptome.org Down, Cryptome.org Eyeball, Cryptome Org Fukushima, Cryptome.org Parastoo, Cryptome.org Rss, Cryptome.org Femen, Cryptome.org 9\/11, Cryptome.org 911, Cryptome Photos, Cryptome Payment Technologies, Cryptome Pharmaceuticals Ltd, Cryptome Protection, Cryptome Pgp, Cryptome Parastoo, Cryptome Pharmaceuticals Australia, Cryptome Pdf, Cryptome Prism, Cryptome Pictures, Cryptome Que Es, Cryptome Rss, Cryptome Rheinland Pfalz, Cryptome Secret Service, Cryptome Search, Cryptome Snowden, Cryptome Sandy Hook, Cryptome Satellite, Cryptome Similar Sites, Cryptome Saudi, Cryptome Syria, Cryptome Site, Cryptome Stingray, Cryptome Twitter, Cryptome Trump, Cryptome Tempest, Cryptome Tor, Cryptome Tunisia, Crypto Tool, Cryptome Fukushima Tepco, Cryptome Payment Technologies, Similar To Cryptome, Cryptome Turkey, Cryptome Ufo, Cryptome Ukraine, Cryptome Vs Wikileaks, Cryptome Venezuela, Cryptome Videos, Cryptome Wikileaks, Cryptome Wikipedia, Cryptome White House, Cryptome Vs Wikileaks, Cryptome Deep Web, Edward Snowden Wife, Edward Snowden Movie, Edward Snowden Twitter, Edward Snowden Dead, Edward Snowden Quotes, Edward Snowden Interview, Edward Snowden Wiki, Edward Snowden Russia, Edward Snowden Net Worth, Edward Snowden 2017, Edward Snowden Age, Edward Snowden Antarctica, Edward Snowden Articles, Edward Snowden Actor, Edward Snowden And Trump, Edward Snowden And Julian Assange, Edward Snowden And Wikileaks, Edward Snowden Apush, Edward Snowden Ama, Edward Snowden And Lindsay Mills, Edward Snowden Biography, Edward Snowden Book, Edward Snowden Bin Laden, Edward Snowden Booz Allen, Edward Snowden Birthday, Edward Snowden Bbc, Edward Snowden Blog, Edward Snowden Birth Chart, Edward Snowden Bernie Sanders, Edward Snowden Bitcoin, Edward Snowden Cia, Edward Snowden Cnn, Edward Snowden Cast, Edward Snowden Chelsea Manning, Edward Snowden Current News, Edward Snowden Citizen 4, Edward Snowden Conservative, Edward Snowden China, Edward Snowden Chemtrails, Edward Snowden Contact, Edward Snowden Dead, Edward Snowden Documentary, Edward Snowden Definition, Edward Snowden Documentary Netflix, Edward Snowden Doc, Edward Snowden Donald Trump, Edward Snowden Dell, Edward Snowden Documentary Hbo, Edward Snowden Date, Edward Snowden David Hoffman, Edward Snowden Essay, Edward Snowden Email, Edward Snowden Ethics, Edward Snowden Ethics Essay, Edward Snowden Early Life, Edward Snowden Effect, Edward Snowden Ecuador, Edward Snowden Education, Edward Snowden Everything About Donald Trump, Edward Snowden Event, Edward Snowden Facts, Edward Snowden Family, Edward Snowden Film, Edward Snowden First Interview, Edward Snowden Facebook, Edward Snowden Father, Edward Snowden Full Movie, Edward Snowden Flat Earth, Edward Snowden First Tweet, Edward Snowden Fox News, Edward Snowden Guardian, Edward Snowden Glenn Greenwald, Edward Snowden Glasses, Edward Snowden Global Warming, Edward Snowden Gif, Edward Snowden Google, Edward Snowden Girlfriend Movie, Edward Snowden Good, Edward Snowden Grandfather, Edward Snowden Genius, Edward Snowden Hero, Edward Snowden Height, Edward Snowden House, Edward Snowden Hawaii, Edward Snowden High School, Edward Snowden Hong Kong, Edward Snowden History, Edward Snowden Heartbeat, Edward Snowden Haarp, Edward Snowden Hbo, Edward Snowden Interview, Edward Snowden Iq, Edward Snowden Instagram, Edward Snowden Interview 2013, Edward Snowden Imdb, Edward Snowden Interview 2017, Edward Snowden Images, Edward Snowden Interview 2016, Edward Snowden Income, Edward Snowden Iphone, Edward Snowden Job, Edward Snowden Journalist, Edward Snowden Japan, Edward Snowden Julian Assange Bradley Manning, Edward Snowden Java, Edward Snowden Journalism, Edward Snowden Joseph Gordon-levitt, Edward Snowden Julian Assange, Edward Snowden John Oliver Passwords, Edward Snowden Jean Michel Jarre, Edward Snowden Kunia, Edward Snowden Kimdir, Edward Snowden Katie Couric Interview, Edward Snowden Katie Couric, Edward Snowden Kaskus, Edward Snowden Kim, Edward Snowden Kasus, Edward Snowden Kfc, Edward Snowden Kim Jest, Edward Snowden Koenig, Edward Snowden Location, Edward Snowden Lindsay Mills Moscow, Edward Snowden Laptop, Edward Snowden Lindsay Mills, Edward Snowden Living, Edward Snowden Lawyer, Edward Snowden Life, Edward Snowden Latest News, Edward Snowden Latest, Edward Snowden Live Stream, Edward Snowden Movie, Edward Snowden Movie Netflix, Edward Snowden Movie Cast, Edward Snowden Military, Edward Snowden Movie Online, Edward Snowden Memes, Edward Snowden Middlebury College, Edward Snowden Married, Edward Snowden Moscow, Edward Snowden Medical Condition, Edward Snowden Net Worth, Edward Snowden Now, Edward Snowden News, Edward Snowden New York Times, Edward Snowden Netflix, Edward Snowden Natal Chart, Edward Snowden Nobel Prize, Edward Snowden Nsa Salary, Edward Snowden Npr, Edward Snowden Nationality, Edward Snowden On Trump, Edward Snowden Osama Bin Laden, Edward Snowden Obama, Edward Snowden Oscar, Edward Snowden On Movie, Edward Snowden On Twitter, Edward Snowden Openstack, Edward Snowden On Antarctica, Edward Snowden Os, Edward Snowden Original Interview, Edward Snowden Parents, Edward Snowden Political Views, Edward Snowden Privacy Tips, Edward Snowden Political Party, Edward Snowden Patriot Act, Edward Snowden Pictures, Edward Snowden Podcast, Edward Snowden Phone Case, Edward Snowden Poll, Edward Snowden Putin, Edward Snowden Quotes, Edward Snowden Quizlet, Edward Snowden Questions, Edward Snowden Quien Es, Edward Snowden Quote About Privacy, Edward Snowden Quotes Citizenfour, Edward Snowden Quick Facts, Edward Snowden Qualifications, Edward Snowden Russia, Edward Snowden Reddit, Edward Snowden Research Paper, Edward Snowden Real Name, Edward Snowden Residence, Edward Snowden Resume, Edward Snowden Robot, Edward Snowden Recommended Apps, Edward Snowden Reporter, Edward Snowden Russian, Edward Snowden Story, Edward Snowden Salary, Edward Snowden Status, Edward Snowden Signal, Edward Snowden Speech, Edward Snowden Security Tips, Edward Snowden Shirt, Edward Snowden Siblings, Edward Snowden Special Forces, Edward Snowden Still Alive, Edward Snowden Twitter, Edward Snowden Today, Edward Snowden Trump, Edward Snowden Timeline, Edward Snowden Ted Talk, Edward Snowden The Guardian, Edward Snowden Trailer, Edward Snowden The Movie, Edward Snowden T Shirt, Edward Snowden Tor, Edward Snowden Update, Edward Snowden Ufo, Edward Snowden Us Army, Edward Snowden University Of Michigan, Edward Snowden Used Tails, Edward Snowden Umich, Edward Snowden University Of Maryland, Edward Snowden Ufo Wikileaks, Edward Snowden Ufo Video, Edward Snowden Urban Dictionary, Edward Snowden Video, Edward Snowden Vpn, Edward Snowden Vice, Edward Snowden And Julian Assange, Edward Snowden Voice, Edward Snowden And Bradley Manning, Edward Snowden Vault 7, Edward Snowden Visa, Edward Snowden And Wikileaks, Edward Snowden Vanity Fair, Edward Snowden Wife, Edward Snowden Wiki, Edward Snowden Wired, Edward Snowden William And Mary, Edward Snowden Washington Post, Edward Snowden Who Is He, Edward Snowden Website, Edward Snowden Worth, Edward Snowden Wikileak, Edward Snowden Washington Post 2013, Edward Snowden Youtube, Edward Snowden Young, Edward Snowden Yahoo Answers, Edward Snowden Youtube Channel, Edward Snowden Youtube Documentary, Edward Snowden Yokota, Edward Snowden And Lindsay Mills, Edward Snowden Yify, Edward Snowden Zodiac Sign, Edward Snowden Zcash, Edward Snowden Zuckerberg, Edward Snowden Zoho, Edward Snowden Zizek, Edward Snowden Zimbabwe, Edward Snowden Zitate, Edward Snowden Zusammenfassung, Edward Snowden Zivilisation, Edward Snowden Zvi\u017eda\u010d

TOP-SECRET – NSA SHARKSEER Program Zero-Day Net Defense Presentation

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Page Count: 12 pages
Date: September 2015
Restriction: None
Originating Organization: National Security Agency
File Type: pdf
File Size: 1,653,564 bytes
File Hash (SHA-256): 156ED749C29E087C5698C8843C3FB39458A7F960C616EE12FE60818968DB068D

Download File

SHARKSEER

Program Definition: Detects and mitigates web-based malware Zero-Day and Advanced Persistent Threats using COTS technology by leveraging, dynamically producing, and enhancing global threat knowledge to rapidly protect the networks.

SHARKSEER’s GOALS

IAP Protection: Provide highly available and reliable automated sensing and mitigation capabilities to all 10 DOD IAPs. Commercial behavioral and heuristic analytics and threat data enriched with NSA unique knowledge, through automated data analysis processes, form the basis for discovery and mitigation.

Cyber Situational Awareness and Data Sharing: Consume public malware threat data, enrich with NSA unique knowledge and processes. Share with partners through automation systems, for example the SHARKSEER Global Threat Intelligence (GTI) and SPLUNK systems. The data will be shared in real time with stakeholders and network defenders on UNCLASSIFIED, U//FOUO, SECRET, and TOP SECRET networks.

NSA-Sharkseer_Page_04 NSA-Sharkseer_Page_05 NSA-Sharkseer_Page_06 NSA-Sharkseer_Page_07 NSA-Sharkseer_Page_08 NSA-Sharkseer_Page_09

Cryptome unveils Assange in Embassy Eyeball

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Julian Assange’s Life Inside A Converted Women’s Toilet At The Ecuadorian Embassy

 

Assange works 17-hour days and has always been a night owl, keeping “hackers’ hours” of late night nights and sleeping in. He is a light sleeper, and the location of the embassy in the heart of Kensington has been a problem for him. Harrods is close by 3 Hans Crescent and the early morning deliveries played havoc with his sleep.

“I couldn’t sleep because of the Harrods loading bay and the cops always doing shift changes outside,” Assange told the Australian magazine Who.

“And the quietest room is the women’s bathroom, the only room that’s easy to sleep in. So I thought I’d try and somehow get hold of it and renovate it. Eventually, somewhat reluctantly, the staff relented. They ripped out the toilet. They’ve been very generous.”

Assange’s converted bathroom-office has modest living quarters, with a bed, a small kitchenette, a computer with internet connections and a shower.


 
Principle windows in the embassy in which Assange appears.[Image]
Speculative Floor Plan of Assange Suite at Window 3[Image]
2012/08/17. Window 3[Image]

 

[Image]

2012/10/01. Fireplace mantle 1[Image]
2012/11/14 Bookshelf 1. Treadmill 1.[Image]
2012/11/29. Fireplace mantle 2. Bookshelf 1.[Image]
 
2013/02/?? Fireplace mantle 2. Bookshelf 1.[Image]
 
2013/04/?? Window 1. Bookshelf 4 behind Assange.[Image]
2013/04/12. Window 3[Image]
2013/05/29. Window ? behind bookshelves 2, 3, 4, booshelf 1 at right.[Image]
2013/06/17 Bookshelf 4[Image]
2013/06/19. Window ? Bookshelf 6.[Image]

 

[Image]

2013/08/01. Bookshelf 1.[Image]
2013/08/01.[Image]

 

Fireplace mantle 3. Bookshelf 1 partial at left; bookshelf 4 partial at right

[Image]

Bookshelf 4.

[Image]

2013/08/02. Bookshelf 5 (may be bookshelf 1 relocated). Door 1.[Image]

 

Bookshelf 5 (may be bookshelf 1 relocated).

[Image]

 
 
2014/01/xx Bookshelf 6.[Image]
 
2014/03/28. Door 2.[Image]
2014/04/23. Bookshelf 6 at right. Window 3 at right.[Image]

 

Door 2 at right.

[Image]

2014/06/18. Bookshelf 6. Fireplace mantle 2. Treadmill 1.[Image]

 

Window ? behind bookshelf 6. Fireplace mantle 2. Treadmill 1.

[Image]

Bookshelf 6. Fireplace mantel 2.

[Image]

 
2014/06/19. Table 2.[Image]
2014/07/14. Window ? Treadmill 1.[Image]
2014/07/19. Bookshelf 6. Apparent radiator cover 1.[Image]
2014/08/?? This fireplace mantle does not appear in other photos.[Image]
2014/08/18. Bookshelf 6. Window 3.[Image]

 

Window 3. Fireplace mantle 1.

[Image]

Bookshelf 6. Window 3. Fireplace mantel 1.

[Image]

Doors 2 and 3.

[Image]

Window 3.

[Image]

Window 3.

[Image]

2014/11/21 (File photo, no date) Bookshelf 1.[Image]
2014/12/01. Window 3. Fireplace mantle 1.[Image]

 

Table 2. Door 2.

[Image]

Date? Fireplace mantle 3. Bookshelf 4. Door ? partial at right.[Image]
 

 Principle windows in the embassy in which Assange appears.[Image]Speculative Floor Plan of Assange Suite at Window 3[Image]2012/08/17. Window 3[Image]

 

[Image]

2012/10/01. Fireplace mantle 1[Image]2012/11/14 Bookshelf 1. Treadmill 1.[Image]2012/11/29. Fireplace mantle 2. Bookshelf 1.[Image] 2013/02/?? Fireplace mantle 2. Bookshelf 1.[Image] 2013/04/?? Window 1. Bookshelf 4 behind Assange.[Image]2013/04/12. Window 3[Image]2013/05/29. Window ? behind bookshelves 2, 3, 4, booshelf 1 at right.[Image]2013/06/17 Bookshelf 4[Image]2013/06/19. Window ? Bookshelf 6.[Image]

 

[Image]

2013/08/01. Bookshelf 1.[Image]2013/08/01.[Image]

 

Fireplace mantle 3. Bookshelf 1 partial at left; bookshelf 4 partial at right

[Image]

Bookshelf 4.

[Image]

2013/08/02. Bookshelf 5 (may be bookshelf 1 relocated). Door 1.[Image]

 

Bookshelf 5 (may be bookshelf 1 relocated).

[Image]

  2014/01/xx Bookshelf 6.[Image] 2014/03/28. Door 2.[Image]2014/04/23. Bookshelf 6 at right. Window 3 at right.[Image]

 

Door 2 at right.

[Image]

2014/06/18. Bookshelf 6. Fireplace mantle 2. Treadmill 1.[Image]

 

Window ? behind bookshelf 6. Fireplace mantle 2. Treadmill 1.

[Image]

Bookshelf 6. Fireplace mantel 2.

[Image]

 2014/06/19. Table 2.[Image]2014/07/14. Window ? Treadmill 1.[Image]2014/07/19. Bookshelf 6. Apparent radiator cover 1.[Image]2014/08/?? This fireplace mantle does not appear in other photos.[Image]2014/08/18. Bookshelf 6. Window 3.[Image]

 

Window 3. Fireplace mantle 1.

[Image]

Bookshelf 6. Window 3. Fireplace mantel 1.

[Image]

Doors 2 and 3.

[Image]

Window 3.

[Image]

Window 3.

[Image]

2014/11/21 (File photo, no date) Bookshelf 1.[Image]2014/12/01. Window 3. Fireplace mantle 1.[Image]

 

Table 2. Door 2.

[Image]

Date? Fireplace mantle 3. Bookshelf 4. Door ? partial at right.[Image] 
 
Principle windows in the embassy in which Assange appears.[Image]
Speculative Floor Plan of Assange Suite at Window 3[Image]
2012/08/17. Window 3[Image]

 

[Image]

2012/10/01. Fireplace mantle 1[Image]
2012/11/14 Bookshelf 1. Treadmill 1.[Image]
2012/11/29. Fireplace mantle 2. Bookshelf 1.[Image]
 
2013/02/?? Fireplace mantle 2. Bookshelf 1.[Image]
 
2013/04/?? Window 1. Bookshelf 4 behind Assange.[Image]
2013/04/12. Window 3[Image]
2013/05/29. Window ? behind bookshelves 2, 3, 4, booshelf 1 at right.[Image]
2013/06/17 Bookshelf 4[Image]
2013/06/19. Window ? Bookshelf 6.[Image]

 

[Image]

2013/08/01. Bookshelf 1.[Image]
2013/08/01.[Image]

 

Fireplace mantle 3. Bookshelf 1 partial at left; bookshelf 4 partial at right

[Image]

Bookshelf 4.

[Image]

2013/08/02. Bookshelf 5 (may be bookshelf 1 relocated). Door 1.[Image]

 

Bookshelf 5 (may be bookshelf 1 relocated).

[Image]

 
 
2014/01/xx Bookshelf 6.[Image]
 
2014/03/28. Door 2.[Image]
2014/04/23. Bookshelf 6 at right. Window 3 at right.[Image]

 

Door 2 at right.

[Image]

2014/06/18. Bookshelf 6. Fireplace mantle 2. Treadmill 1.[Image]

 

Window ? behind bookshelf 6. Fireplace mantle 2. Treadmill 1.

[Image]

Bookshelf 6. Fireplace mantel 2.

[Image]

 
2014/06/19. Table 2.[Image]
2014/07/14. Window ? Treadmill 1.[Image]
2014/07/19. Bookshelf 6. Apparent radiator cover 1.[Image]
2014/08/?? This fireplace mantle does not appear in other photos.[Image]
2014/08/18. Bookshelf 6. Window 3.[Image]

 

Window 3. Fireplace mantle 1.

[Image]

Bookshelf 6. Window 3. Fireplace mantel 1.

[Image]

Doors 2 and 3.

[Image]

Window 3.

[Image]

Window 3.

[Image]

2014/11/21 (File photo, no date) Bookshelf 1.[Image]
2014/12/01. Window 3. Fireplace mantle 1.[Image]

 

Table 2. Door 2.

[Image]

Date? Fireplace mantle 3. Bookshelf 4. Door ? partial at right.[Image]
 

Julian Assange Twitter, Julian Assange Dead, Julian Assange Pamela Anderson, Julian Assange Movie, Julian Assange Wikileaks, Julian Assange Russia, Julian Assange Documentary, Julian Assange Missing, Julian Assange Trump, Julian Assange News, Julian Assange And Pamela Anderson, Julian Assange Age, Julian Assange And Pamela, Julian Assange Amal Clooney, Julian Assange And Russia, Julian Assange Alive, Julian Assange And Wikileaks, Julian Assange Ama, Julian Assange And Edward Snowden, Julian Assange Aliens, Julian Assange Biography, Julian Assange Bio, Julian Assange Book, Julian Assange Birthday, Julian Assange Breaking News, Julian Assange Birth Chart, Julian Assange Bill Hader, Julian Assange Bitcoin, Julian Assange Biografia, Julian Assange Born, Julian Assange Children, Julian Assange Cat, Julian Assange Clinton, Julian Assange Citizenship, Julian Assange Chelsea Manning, Julian Assange Cgi, Julian Assange Comey, Julian Assange Contact, Julian Assange Conference, Julian Assange Chelsea Manning Tweet, Julian Assange Dead, Julian Assange Documentary, Julian Assange Dancing, Julian Assange Democracy Now, Julian Assange Documentary Risk, Julian Assange Death, Julian Assange Doc, Julian Assange Daniel Berg, Julian Assange Dnc, Julian Assange Daughter, Julian Assange Ecuador, Julian Assange Embassy Cat, Julian Assange Education, Julian Assange Edward Snowden, Julian Assange Ecuador Election, Julian Assange Election, Julian Assange Early Life, Julian Assange Email Address, Julian Assange Essay, Julian Assange Ethics, Julian Assange Film, Julian Assange Facebook, Julian Assange Family, Julian Assange Free, Julian Assange Father, Julian Assange Found, Julian Assange Found Dead, Julian Assange Facts, Julian Assange Free Speech, Julian Assange Fbi, Julian Assange Geralt, Julian Assange Wikileaks, Julian Assange Google, Julian Assange Gif, Julian Assange Guitar Center, Julian Assange Genius, Julian Assange Wife, Julian Assange Guardian, Julian Assange Witcher, Julian Assange Wikileaks Twitter, Julian Assange Home, Julian Assange Hannity, Julian Assange History, Julian Assange Haircut, Julian Assange Horoscope, Julian Assange Holds News Conference, Julian Assange Hologram, Julian Assange Height, Julian Assange Hacks, Julian Assange Huffington Post, Julian Assange Interview, Julian Assange Images, Julian Assange Is Dead, Julian Assange Iq, Julian Assange Interview Seth Rich, Julian Assange Interview Hannity, Julian Assange Is Dating, Julian Assange Income, Julian Assange Iceland, Julian Assange Imdb, Julian Assange Journalist, Julian Assange Jared Kushner, Julian Assange Jeremy Scahill, Julian Assange Julia Ka Mange Le, Julian Assange Jeremy Corbyn, Julian Assange John Pilger, Julian Assange Julia Ka Mangal, Julian Assange John Inman, Julian Assange Kim Dotcom, Julian Assange Kushner, Julian Assange Kimdir, Julian Assange Kenya, Julian Assange Kenya Election, Julian Assange Location, Julian Assange Latest News, Julian Assange Lady Gaga, Julian Assange Lawyer, Julian Assange Lives, Julian Assange Laura Poitras, Julian Assange London, Julian Assange Life, Julian Assange Long Hair, Julian Assange Latest Interview, Julian Assange Movie, Julian Assange Missing, Julian Assange Memes, Julian Assange Married, Julian Assange Movie Risk, Julian Assange Manning, Julian Assange Macron, Julian Assange Mendax, Julian Assange May 2017, Julian Assange Mark Zuckerberg, Julian Assange News, Julian Assange Net Worth, Julian Assange Nationality, Julian Assange News Conference, Julian Assange News Today, Julian Assange Now, Julian Assange Net Worth 2017, Julian Assange Natal Chart, Julian Assange Netflix, Julian Assange Noam Chomsky, Julian Assange On Seth Rich, Julian Assange On Trump, Julian Assange On Twitter, Julian Assange Offers Reward, Julian Assange On Syria, Julian Assange On Russia, Julian Assange Obama, Julian Assange On Donald Trump, Julian Assange October Surprise, Julian Assange On Reality Winner, Julian Assange Pamela Anderson, Julian Assange Pamela, Julian Assange Press Conference, Julian Assange Pictures, Julian Assange Photos, Julian Assange Proof Of Life, Julian Assange Podcast, Julian Assange Parents, Julian Assange Pronunciation, Julian Assange Partner, Julian Assange Quotes, Julian Assange Quotes About Truth, Julian Assange Quien Es, Julian Assange Qualifications, Julian Assange Quote Injustice, Julian Assange Q, Julian Assange Quotes Mark Zuckerberg, Julian Assange Qc, Julian Assange Quick Facts, Julian Assange Quantum Mechanics, Julian Assange Russia, Julian Assange Reddit, Julian Assange Rt, Julian Assange Risk Movie, Julian Assange Residence, Julian Assange Russian Hacking, Julian Assange Reward, Julian Assange Released, Julian Assange Room, Julian Assange Rich, Julian Assange Son, Julian Assange Sean Hannity, Julian Assange Salary, Julian Assange Story, Julian Assange Showtime, Julian Assange Snl, Julian Assange Seth Rich Interview, Julian Assange Syria, Julian Assange Simpsons, Julian Assange Snowden, Julian Assange Twitter, Julian Assange Trump, Julian Assange Today, Julian Assange The Unauthorised Autobiography, Julian Assange Ted Talk, Julian Assange Twitter Verified, Julian Assange Tv Show, Julian Assange Time Magazine, Julian Assange The Simpsons, Julian Assange This Is How It Ends, Julian Assange Update, Julian Assange Usa Today, Julian Assange Ufo, Julian Assange Un, Julian Assange Uk, Julian Assange Usa, Julian Assange United Nations, Julian Assange Ultimas Noticias, Julian Assange Update News, Julian Assange Underground, Julian Assange Video, Julian Assange Vault 7, Julian Assange Verified Twitter, Julian Assange Vice, Julian Assange Vs Edward Snowden, Julian Assange Venezuela, Julian Assange Vs Mark Zuckerberg, Julian Assange Vigil, Julian Assange Vikipedi, Julian Assange Vegetarian, Julian Assange Wikileaks, Julian Assange Wife, Julian Assange Witcher, Julian Assange Website, Julian Assange Washington Post, Julian Assange Worth, Julian Assange Wikileaks Twitter, Julian Assange Wikileaks Seth Rich, Julian Assange Where Is, Julian Assange Wikileaks Founder, Julian Assange Young, Julian Assange Youtube, Julian Assange Youtube 2017, Julian Assange Youth, Julian Assange Young Pictures, Julian Assange You’re The Voice, Julian Assange Yahoo, Julian Assange Yes Campaign, Julian Assange Youtube 2015, Julian Assange Yoko Ono, Julian Assange Zodiac, Julian Assange Zizek, Julian Assange Zoolander, Julian Assange Zimbabwe, Julian Assange Zivotopis, Julian Assange Mark Zuckerberg, Julian Assange Slavoj Zizek Interview, Julian Assange Mark Zuckerberg Quote, Julian Assange Mark Zuckerberg Snl, Julian Assange Vs Mark Zuckerberg,

 
 

Revealed – NSA Snowden Releases Tally Update – *2,694 Pages

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

8 December 2014

 

4 December 2014. Add 63 pages to The Intercept. Tally now *2,627 pages of The Guardian first reported 58,000 files; caveat: Janine Gibson, The Guardian NY, said on 30 January 2014 “much more than 58,000 files in first part, two more parts” (no numbers) (tally now less than ~4.3%). DoD claims 1,700,000 files (~.015% of that released). ACLU lists 525 pages released by the press. However, if as The Washington Post reported, a minimum of 250,000 pages are in the Snowden files, then less than 1% have been released. Note Greenwald claim on 13 September 2014 of having “hundreds of thousands” of documents.

25 November 2014. Add 72 pages to Süddeutsche Zeitung.

17 November 2014, charts by Cryptome:

[Image]

6 November 2014. At current rate of release it will take 31 to 908 years for full disclosure.

10 October 2014. Add 69 pages to The Intercept.

17 September 2014. Add 2 pages to The Intercept.

14 September 2014. Add 68 pages to Der Spiegel.

13 September 2014. In video Glenn Greenwald claims to have “hundreds of thousands” of documents (at 9:06 min)

http://www.3news.co.nz/tvshows/thenation/interview-glenn-greenwald-2014091311?ref=video

Audio excerpt: http://youtu.be/xnfIp38AAhM

5 September 2014. Add 32 pages to The Intercept. Tally now *2,293 pages of The Guardian first reported 58,000 files; caveat: Janine Gibson, The Guardian NY, said on 30 January 2014 “much more than 58,000 files in first part, two more parts” (no numbers) (tally now less than ~3.5%). DoD claims 1,700,000 files (~.012% of that released). ACLU lists 525 pages released by the press. However, if as The Washington Post reported, a minimum of 250,000 pages are in the Snowden files, then less than 1% have been released.

31 August 2014. Add 34 pages to Der Spiegel.

25 August 2014. Add 55 pages to The Intercept.

16 August 2014. Add 26 pages to Heise.

12 August 2014. Add 6 pages to The Intercept.

5 August 2014. Add 12 pages to The Intercept.

4 August 2014. Add 23 pages to The Intercept.

25 July 2014. Add 4 pages to The Intercept.

14 July 2014. Add 8 pages to The Intercept.

14 July 2014. “I’m as mad as hell and I’m not going to take this anymore!”

http://en.wikipedia.org/wiki/Network_%28film%29

Cryptome has sent a demand for accounting and public release specifics to holders of the Snowden documents: New York Times, Washington Post, The Guardian, Barton Gellman, Laura Poitrias, Glenn Greenwald, ACLU, EFF and John and Jane Does, US Citizens:

http://cryptome.org/2014/07/snowden-documents-demand-14-0714.pdf

11 July 2014. See related essay, Open the Snowden Files, Krystian Woznicki, 11July 2014:

English: http://berlinergazette.de/wp-content/uploads/Open-the-Snowden-Files_KW_E.pdf
German: http://berlinergazette.de/open-the-snowden-files/

11 July 2014. @PaulMD notes this claim in the Washington Post, 11 July 2014:

We did not have an official NSA list of targets. We had to find them in the pile ourselves. Soltani, an independent researcher, did most of the heavy lifting on that. Because the information was not laid out in rows and columns, the way it might be in a spreadsheet, Soltani wrote computer code to extract what we were looking for from something like a quarter-million pages of unstructured text.

If a minimum of 250,000 pages are in the Snowden files, then less than 1% have been released.

9 July 2014. Add 8 pages to The Intercept.

9 July 2014. Add 1 page to Washington Post.

23 June 2014. Add 9 pages to Der Spiegel.

22 June 2014. Add 41 pages to Information-The Intercept.

Revised. This is included in entry above. 18 June 2014. Add 20 pages to The Intercept.

18 June 2014. Add 200 pages to Der Spiegel.

16 June 2014. Add 4 pages to Der Spiegel.

1 June 2014. Add 4 pages to New York Times.

23 May 2014. Cryptome placed online No Place to Hide, 310 pages, to compensate for failure to release Snowden documents:

http://cryptome.org/2014/05/npth-freed.htm

http://cryptome.org/2014/05/npth.7z (27MB)

19 May 2014. The Intercept released 12 pages.

13 May 2014. Glenn Greenwald released 107 pages, some new, some previously published, some full pages, some page fragments.

http://hbpub.vo.llnwd.net/o16/video/olmk/holt/greenwald/NoPlaceToHide-Documents-Uncompressed.pdf

5 May 2014. Related tally of redactions of Snowden releases:

http://cryptome.org/2014/05/snowden-redactions.htm

30 April 2014. Add 19 pages to The Intercept.

30 April 2014. Add 2 pages to Dagbladet belatedly.

5 April 2014. Add 21 pages to The Intercept.

4 April 2014. ACLU offers NSA documents search: https://www.aclu.org/nsa-documents-search

Also:

http://freesnowden.is/category/revealed-documents/index.html

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013

http://leaksource.wordpress.com/

If more lists please send: cryptome[at]earthlink.net

2 April 2014.

29 March 2014. Add 1 page to Der Spiegel.

22 March 2014. Add 3 pages to Der Spiegel.

22 March 2014. Add 2 pages to New York Times.

21 March 2014. Add 7 pages to Le Monde.

20 March 2014. Add 6 pages to The Intercept.

18 March 2014. Add 4 pages to Washington Post.

13 March 2014. Add 1 page to The Intercept.

12 March 2014. Add 35 pages to The Intercept.

12 March 2014. Add 62 pages to New York Times. Add 2 pages to NRC Handelsblad.

7 March 2014. Add 8 pages to The Intercept.

27 February 2014. Add 3 pages to Guardian.

25 February 2014. Add 11 pages to NBC News.

24 February 2014. Add 4 pages to The Intercept.

24 February 2014. Add *50 pages to The Intercept (7 pages are duplicates of GCHQ Psychology).

18 February 2014. Add *45 pages to The Intercept (37 pages are duplicates of release by NBC News).

Note: Between 10-17 February 2014, The Intercept disclosed fragments of Snowden pages and the New York Times referenced some but as far as known did not release them in full. If available please send link.

10 February 2014. Add 1 page to NRC Handelsblad (via Electrospaces.blogspot.com).

7 February 2014. Add 15 pages NBC News.

5 February 2014. Add 14 pages NBC News.

31 January 2014. Add 27 pages to CBC News.

27 January 2014. Add 47 pages to NBC News.

27 January 2014. Add 18 pages to Anonymous via New York Times.

16 January 2014. Add 8 pages to The Guardian.

* 14 January 2014. Add 21 pages to Information.dk (duplicate).

* 13 January 2014. Add 4 pages to Information.dk (duplicate).

Related Snowden Document and Page Count Assessment:

http://cryptome.org/2014/01/snowden-count.htm

* 5 January 2014. Add 16 pages to Der Spiegel (30 December 2013. No source given for NSA docs). Tally now *962 pages (~1.7%) of reported 58,000. NSA head claims 200,000 (~.50% of that released).

4 January 2014. The source was not identified for *133  pages published by Der Spiegel and Jacob Appelbaum in late December 2013. They are included here but have not been confirmed as provided by Edward Snowden. Thanks to post by Techdirt.

Glenn Greenwald tweeted:

Glenn Greenwald @ggreenwald, 8:05 AM – 29 Dec 13@Cryptomeorg @ioerror I had no involvement in that Spiegel article, ask them – and they don’t say those are Snowden docs.

Matt Blaze tweeted, 11:24 AM – 2 Jan 14

matt blaze @mattblazeIf there are other sources besides Snowden, I hope journalists getting docs are careful to authenticate them (& disclose uncertainty).

3 January 2014. Add 13 pages to Washington Post.

3 January 2014. See also EFF, ACLU and LeakSource accounts:

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013

http://leaksource.wordpress.com/

2 January 2014. Add 1 page to Washington Post published 10 July 2013.

* 31 December 2013. Add 16 pages to Der Spiegel.

* 30 December 2013. Add 50 pages of NSA ANT Catalog by Jacob Appelbaum (no source given for NSA docs).

* 30 December 2013. Add 21 pages from 30C3 video by Jacob Appelbaum (no source given for NSA docs).

* 30 December 2013. Add 42 pages (8 duplicates) to Der Spiegel (no source given for NSA docs).

* 29 December 2013. Add 4 pages to Der Spiegel (no source given for NSA docs).

24 December 2013. Add 2 pages to Washington Post.

23 December 2013

http://www.adn.com/2013/12/22/3243451/pincus-snowden-still-has-a-road.html

We’ve yet to see the full impact of former National Security Agency contractor Edward Snowden’s unauthorized downloading of highly classified intelligence documents.

Among the roughly 1.7 million documents he walked away with — the vast majority of which have not been made public — are highly sensitive, specific intelligence reports, as well as current and historic requirements the White House has given the agency to guide its collection activities, according to a senior government official with knowledge of the situation.

The latter category involves about 2,000 unique taskings that can run to 20 pages each and give reasons for selective targeting to NSA collectors and analysts. These orders alone may run 31,500 pages.

13 December 2013. Add 26 pages to Trojkan (SVT). Tally now 797 pages (~1.4%) of reported 58,000. NSA head claims 200,000 (~.40% of that released). Australia press reports “up to 20,000 Aussie files.”

Rate of release over 6 months, 132.8 pages per month, equals 436 months to release 58,000, or 36.3 years. Thus the period of release has decreased in the past month from 42 years.

12 December 2013. Belatedly add 27 pages to Guardian and 18 pages to Washington Post.


21 November 2013. See also EFF and ACLU accounts:

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013


3 November 2013

47 42 Years to Release Snowden Documents

Out of reported 50,000 pages (or files, not clear which), about 446 514 pages (>1% 1%) have been released over 5 months beginning June 5, 2012. At this rate, 89 100 pages per month, it will take 47 42 years for full release. Snowden will be 77 72 years old, his reporters hoarding secrets all dead.

NY Times, 3 November 2013:

Whatever reforms may come, Bobby R. Inman, who weathered his own turbulent period as N.S.A. director from 1977 to 1981, offers his hyper-secret former agency a radical suggestion for right now. “My advice would be to take everything you think Snowden has and get it out yourself,” he said. “It would certainly be a shock to the agency. But bad news doesn’t get better with age. The sooner they get it out and put it behind them, the faster they can begin to rebuild.”


Timeline of releases:

[See tabulation below for full timeline.]


5 October 2013

26 Years to Release Snowden Docs by The Guardian

Out of reported 15,000 pages, The Guardian has published 192 pages in fourteen releases over four months, an average of 48 pages per month, or 1.28% of the total. At this rate it will take 26 years for full release.

Edward Snowden will be 56 years old.
Glenn Greenwald will be 72.
Laura Poitras will be 75.
Alan Rusbridger will be 86.
Barton Gellman will be 78.
Julian Assange will be 68.
Chelsea Manning will be 52.
Keith Alexander will be 88.
Barack Obama will be 78.
Daniel Ellsberg will be 108.
This author will be 103.


Number Date Title Pages

  The Guardian   276
  27 February 2014 GCHQ Optic Nerve 3
21 16 January 2014 SMS Text Messages Exploit 8
20 9 December 2013 Spying on Games 2
18 18 November 2013 DSD-3G 6
19 1 November 2013 PRISM, SSO
SSO1 Slide
SSO2 Slide
13*
18 4 October 2013 Types of IAT Tor 9
17 4 October 2013 Egotistical Giraffe 20*
16 4 October 2013 Tor Stinks 23
15 11 September 2013 NSA-Israel Spy 5
14 5 September 2013 BULLRUN 6*
13 5 September 2013 SIGINT Enabling 3*
12 5 September 2013 NSA classification guide 3
11 31 July 2013 XKeyscore 32
10 27 June 2013 DoJ Memo on NSA 16
9 27 June 2013 Stellar Wind 51
8 21 June 2013 FISA Certification 25
7 20 June 2013 Minimization Exhibit A 9
6 20 June 2013 Minimization Exhibit B 9
5 16 June 2013 GCHQ G-20 Spying 4
4 8 June 2013 Boundless Informant FAQ 3
3 8 June 2013 Boundless Informant Slides 4
2 7 June 2013 PPD-20 18
1 5 June 2013 Verizon 4

  Washington Post   297
  9 July 2014 NSA Emails 1
  18 March 2014 NSA SCALAWAG 2
  18 March 2014 NSA MYSTIC 2
  2 January 2014 Quantum Computer 2 10
  2 January 2014 Quantum Computer 3
  23 December 2013 NSA/CSS Mission 2
  11 December 2013 Excessive Collection 9
  11 December 2013 SCISSORS 2 7
  11 December 2013 SCISSORS 1 4
  11 December 2013 Yahoo-Google Exploit 6
  11 December 2013 Cable Spying Types 7
  11 December 2013 WINDSTOP 1
  11 December 2013 Co-Traveler 24
  11 December 2013 GSM Tracking 2
  11 December 2013 SIGINT Successes 4
  11 December 2013 GHOSTMACHINE 4
  5 December 2013 Target Location 1
  4 December 2013 FASCIA 2
  4 December 2013 CHALKFUN 1
  26 November 2013 Microsoft a Target? 4
  4 November 2013 WINDSTOP, SSO, Yahoo-Google 14
  30 October 2013 MUSCULAR-INCENSOR Google and Yahoo 4
  14 October 2013 SSO Overview 4
  14 October 2013 SSO Slides 7
  14 October 2013 SSO Content Slides 9
  4 October 2013 Tor 49
  4 October 2013 EgotisticalGiraffe 20*
  4 October 2013 GCHQ MULLENIZE 2
  4 October 2013 Roger Dingledine 2
  30 August 2013 Budget 17
  10 July 2013 PRISM Slide 1
  29 June 2013 PRISM 8
  20 June 2013 Warrantless Surveillance 25*
  7 June 2013 PPD-20 18*
  6 June 2013 PRISM 1

  Der Spiegel   * 413
  14 September 2014 GCHQ STELLAR 26
  14 September 2014 NSA Treasure Map 38
  14 September 2014 NSA Treasure Map New 4
  31 August 2014 NSA GCHQ Spy Turkey 34
  23 June 2014 NSA German SIGADs 9
  18 June 2014 NSA German Spying-2 200
  16 June 2014 NSA German Spying 4
  29 March 2014 NSA Spy Chiefs of State 1
  22 March 2014 NSA SHOTGIANT 2NSA SHOTGIANT 1 21
  31 December 2013 QFIRE * 16
  30 December 2013 TAO Introduction * 16
  30 Deceber 2013 QUANTUM Tasking (8 duplicates of QUANTUMTHEORY) 28*
  30 December 2013 QUANTUMTHEORY 14
  29 December 2013 TAO ANT COTTONMOUTH (images)
TAO ANT COTTONMOUTH
(DE article)
4
  17 November 2013 ROYAL CONCIERGE (DE)ROYAL CONCIERGE (EN) 2
  29 October 2013 NSA-CIA SCS 3
  27 October 2013 NSA-CIA SCS 2
  20 October 2013 Mexico President 1
  20 September 2013 Belgacom 3
  16 September 2013 SWIFT 3
  9 September 2013 Smartphones 5
  1 September 2013 French Foreign Ministry 0
  31 August 2013 Al Jazeera 0

  O Globo Fantastico   ~87
  7 October 2013 CSE Brazil Ministry 7
  8 September 2013 Petrobas ~60
  3 September 2013 Brazil and Mexico 20

  New York Times   124
  1 June 2014 NSA Identity Spying 4
  22 March 2014 NSA Huawei SHOTGIANT 2
  12 March 2014 NSA Stellarwind Classification
NSA FISA FAA Classification
AG Dissemination
NSA Cryptanalyist FISA Database
NSA Spying Timeline
37
18
2
4
1
  9 December 2013 Spying on Games 82*
  23 November 2013 SIGINT Strategy 2012-2016 5
  3 November 2013 SIGINT Mission 2013SIGINT Mission 2017 22
  28 September 2013 Contact Chaining Social Networks 1
  28 September 2013 SYANPSE 1
  5 September 2013 BULLRUN 4*
  5 September 2013 SIGINT Enabling 3*
 

  ProPublica   89
  9 December 2013 Spying on Games 82*
  5 September 2013 BULLRUN 4*
  5 September 2103 SIGINT Enabling 3*

  Le Monde   20
  21 March 2014 CSE SNOWGLOBE 7
  25 October 2013 NSA Hosts FR Spies 4
  22 October 2013 Wanadoo-Alcatel 1
  22 October 2013 Close Access Sigads 2
  22 October 2013 Boundless Informant 2
  22 October 2013 PRISM 11

  Dagbladet   15
  April 2014
December 2013
Norway Assistance 2
  19 November 2013 BOUNDLESSINFORMANT 13

  NRC Handelsblad   7
  12 March 2014 NSA Aids Dutch Anti-Piracy 2
  8 February 2014 MIVD BoundlessInformant
Cryptome mirror
1
  30 November 2013 Dutch SIGINT 3
  23 November 2013 SIGINT Cryptologic Platform 1

  Huffington Post   3
  27 November 2013 Muslim Porn Viewing 3

  CBC   36
  30 January 2014 CESC IP Profiling 27
  10 December 2013 NSA-CSEC Partnership 1
  10 December 2013 G8-G20 Spying 4*
  2 December 2013 G8-G20 Spying 3
  29 November 2013 G8-G20 Spying 1

  The Globe and Mail   18
  30 November 2013 CSEC Brazil Spying 18*

  SVT (Swedish TV)   2
  5 December 2013 Sweden Spied Russia for NSA 2

  L’Espresso   3
  6 December 2013 NSA Spies Italy 3

  Trojkan (SVT)   29
  11 December 2013 NSA Sweden FRA Relationship 1*
  11 December 2013 NSA 5 Eyes Partners 1
  11 December 2013 NSA Sweden FRA Agenda 8
  11 December 2013 NSA Sweden FRA RU Baltic 1
  11 December 2013 NSA GCHQ Sweden FRA COMINT 1
  11 December 2013 NSA Sweden FRA  XKeyscore Plan 5
  11 December 2013 NSA Sweden FRA XKeyscore Sources 1
  11 December 2013 NSA Sweden FRA XKeyscore Tor et al 3
  11 December 2013 NSA Sweden FRA XKeyscore Slide 1
  11 December 2013 NSA Sweden FRA Quantum 1 1
  11 December 2013 GCHQ Sweden FRA Quantum 1
  11 December 2013 NSA Sweden FRA Quantum Accomplishments 2
  9 December 2013 NSA and Sweden Pact 3*

  Jacob Appelbaum   * 71
  30 December 2013 NSA Catalog * 50
  30 December 2013 NSA Catalog Video Clips * 21

  Information.dk   63*
  19 June 2014 NSA Partners 41*
  14 January 2014 SSO (duplicate) 7*
  14 January 2014 PRISM (duplicate) 11*
  13 January 2014 5-Eyes Spy G8-G20 (duplicate) 4*

  Anonymous/
New York Times
  18
  27 January 2014 NSA Smartphones Analysis 14
  27 January 2014 GCHQ Mobile Theme 4

  NBC News   87
  25 February 2014 GCHQ Cyber Effects 11
  7 February 2014 GCHQ Cyber Attack 15
  5 February 2014 GCHQ Anonymous 14
  27 January 2014 GCHQ Squeaky Dolphin 47

  The Intercept   522*
  4 December 2014 NSA AURORA GOLD et al 63
  10 October 2014 10 NSA Releases
Computer Network Exploitation Declass
National Initiative Task Security 2
National Initiative Task Security 1
Exceptionally Controlled Info Compartments
Exceptionally Controlled Info Pawleys
Exceptionally Controlled Information
Sentry Eagle 2
Sentry Eagle 1
Tarex Classification Guide
Whipgenie Classification Guide
69
  17 September 2014 NSA Visit by NZ Spy 2
  5 September 2014 Masterspy Quadrennial Report 2009 32
  25 August 2014 NSA ICREACH 55
  12 August 2014 GCHQ Covert Mobile Phones Policy 6
  5 August 2014 NCTC Terrorist Identifies 12
  4 August 2014 US-NSA Pays Israel $500,000 2
  4 August 2014 NSA-Israel Spying Pact 2013 3
  4 August 2014 Israel-US Spying Pact 1999 16
  25 July 2014 NSA Saudi Arabia 4
  14 July 2014 NSA JTRIG Tools-Techniques 8
  9 July 2014 NSA FISA Accounts 8
  19 June 2014 NSA Partners 41*
  19 May 2014 12 Various Pages 12
  30 April 2014 GHOSTMACHINE-ECHOBASE
NSA Visit by GCHQ Lobban
PRISM with Olympics
14:6+8
4:1+3
1:
  4 April 2014 GCHQ Full Spectrum Cyber
NSA 5-Eyes SIGDEV Conference
19
2
  20 March 2014 NSA Hunt Sysadmins 6
  13 March 2014 NSA Third Party 1
  12 March 2014 NSA HammerchantNSA UK on Mikey and Ibake

 

NSA Turbine and Turmoil

NSA Thousands of Implants

NSA More Than One Way

NSA GCHQ Quantumtheory

NSA Selector Types

NSA Quantum Insert

NSA Analysis of Converged Data

NSA Phishing and MTM Attacks

NSA Menwith Hill xKeyscore

NSA Industry Exploit

NSA 5 Eyes Hacking

43

 

2

1

1

11

1

5

1

3

1

1

1

  7 March 2014 NSA Ask Zelda 8
  24 February 2014 GCHQ Disruption 4
  24 February 2014 GCHQ Online Deception
(7 pages duplicates of GCHQ Psychology)
*50
  18 February 2014 GCHQ Psychology37 Duplicates of NBC News *44
  18 February 2014 NSA-GCHQ Discovery 1
       
  Glenn Greenwald    
  13 May 2014 A variety of documents 107
       
  Cryptome   310
  23 May 2014 No Place to Hide (27MB) 310
       
  Heise   26
  16 August 2014 NSA GCHQ CSEC HACIENDA 26
       
  Süddeutsche Zeitung   7
  25 November 2014 Vodafone GCHQ Cables List and Slides 72
       

 

Edward Snowden Wife, Edward Snowden Movie, Edward Snowden Twitter, Edward Snowden Dead, Edward Snowden Quotes, Edward Snowden Interview, Edward Snowden Wiki, Edward Snowden Russia, Edward Snowden Net Worth, Edward Snowden 2017, Edward Snowden Age, Edward Snowden Antarctica, Edward Snowden Articles, Edward Snowden Actor, Edward Snowden And Trump, Edward Snowden And Julian Assange, Edward Snowden And Wikileaks, Edward Snowden Apush, Edward Snowden Ama, Edward Snowden And Lindsay Mills, Edward Snowden Biography, Edward Snowden Book, Edward Snowden Bin Laden, Edward Snowden Booz Allen, Edward Snowden Birthday, Edward Snowden Bbc, Edward Snowden Blog, Edward Snowden Birth Chart, Edward Snowden Bernie Sanders, Edward Snowden Bitcoin, Edward Snowden Cia, Edward Snowden Cnn, Edward Snowden Cast, Edward Snowden Chelsea Manning, Edward Snowden Current News, Edward Snowden Citizen 4, Edward Snowden Conservative, Edward Snowden China, Edward Snowden Chemtrails, Edward Snowden Contact, Edward Snowden Dead, Edward Snowden Documentary, Edward Snowden Definition, Edward Snowden Documentary Netflix, Edward Snowden Doc, Edward Snowden Donald Trump, Edward Snowden Dell, Edward Snowden Documentary Hbo, Edward Snowden Date, Edward Snowden David Hoffman, Edward Snowden Essay, Edward Snowden Email, Edward Snowden Ethics, Edward Snowden Ethics Essay, Edward Snowden Early Life, Edward Snowden Effect, Edward Snowden Ecuador, Edward Snowden Education, Edward Snowden Everything About Donald Trump, Edward Snowden Event, Edward Snowden Facts, Edward Snowden Family, Edward Snowden Film, Edward Snowden First Interview, Edward Snowden Facebook, Edward Snowden Father, Edward Snowden Full Movie, Edward Snowden Flat Earth, Edward Snowden First Tweet, Edward Snowden Fox News, Edward Snowden Guardian, Edward Snowden Glenn Greenwald, Edward Snowden Glasses, Edward Snowden Global Warming, Edward Snowden Gif, Edward Snowden Google, Edward Snowden Girlfriend Movie, Edward Snowden Good, Edward Snowden Grandfather, Edward Snowden Genius, Edward Snowden Hero, Edward Snowden Height, Edward Snowden House, Edward Snowden Hawaii, Edward Snowden High School, Edward Snowden Hong Kong, Edward Snowden History, Edward Snowden Heartbeat, Edward Snowden Haarp, Edward Snowden Hbo, Edward Snowden Interview, Edward Snowden Iq, Edward Snowden Instagram, Edward Snowden Interview 2013, Edward Snowden Imdb, Edward Snowden Interview 2017, Edward Snowden Images, Edward Snowden Interview 2016, Edward Snowden Income, Edward Snowden Iphone, Edward Snowden Job, Edward Snowden Journalist, Edward Snowden Japan, Edward Snowden Julian Assange Bradley Manning, Edward Snowden Java, Edward Snowden Journalism, Edward Snowden Joseph Gordon-levitt, Edward Snowden Julian Assange, Edward Snowden John Oliver Passwords, Edward Snowden Jean Michel Jarre, Edward Snowden Kunia, Edward Snowden Kimdir, Edward Snowden Katie Couric Interview, Edward Snowden Katie Couric, Edward Snowden Kaskus, Edward Snowden Kim, Edward Snowden Kasus, Edward Snowden Kfc, Edward Snowden Kim Jest, Edward Snowden Koenig, Edward Snowden Location, Edward Snowden Lindsay Mills Moscow, Edward Snowden Laptop, Edward Snowden Lindsay Mills, Edward Snowden Living, Edward Snowden Lawyer, Edward Snowden Life, Edward Snowden Latest News, Edward Snowden Latest, Edward Snowden Live Stream, Edward Snowden Movie, Edward Snowden Movie Netflix, Edward Snowden Movie Cast, Edward Snowden Military, Edward Snowden Movie Online, Edward Snowden Memes, Edward Snowden Middlebury College, Edward Snowden Married, Edward Snowden Moscow, Edward Snowden Medical Condition, Edward Snowden Net Worth, Edward Snowden Now, Edward Snowden News, Edward Snowden New York Times, Edward Snowden Netflix, Edward Snowden Natal Chart, Edward Snowden Nobel Prize, Edward Snowden Nsa Salary, Edward Snowden Npr, Edward Snowden Nationality, Edward Snowden On Trump, Edward Snowden Osama Bin Laden, Edward Snowden Obama, Edward Snowden Oscar, Edward Snowden On Movie, Edward Snowden On Twitter, Edward Snowden Openstack, Edward Snowden On Antarctica, Edward Snowden Os, Edward Snowden Original Interview, Edward Snowden Parents, Edward Snowden Political Views, Edward Snowden Privacy Tips, Edward Snowden Political Party, Edward Snowden Patriot Act, Edward Snowden Pictures, Edward Snowden Podcast, Edward Snowden Phone Case, Edward Snowden Poll, Edward Snowden Putin, Edward Snowden Quotes, Edward Snowden Quizlet, Edward Snowden Questions, Edward Snowden Quien Es, Edward Snowden Quote About Privacy, Edward Snowden Quotes Citizenfour, Edward Snowden Quick Facts, Edward Snowden Qualifications, Edward Snowden Russia, Edward Snowden Reddit, Edward Snowden Research Paper, Edward Snowden Real Name, Edward Snowden Residence, Edward Snowden Resume, Edward Snowden Robot, Edward Snowden Recommended Apps, Edward Snowden Reporter, Edward Snowden Russian, Edward Snowden Story, Edward Snowden Salary, Edward Snowden Status, Edward Snowden Signal, Edward Snowden Speech, Edward Snowden Security Tips, Edward Snowden Shirt, Edward Snowden Siblings, Edward Snowden Special Forces, Edward Snowden Still Alive, Edward Snowden Twitter, Edward Snowden Today, Edward Snowden Trump, Edward Snowden Timeline, Edward Snowden Ted Talk, Edward Snowden The Guardian, Edward Snowden Trailer, Edward Snowden The Movie, Edward Snowden T Shirt, Edward Snowden Tor, Edward Snowden Update, Edward Snowden Ufo, Edward Snowden Us Army, Edward Snowden University Of Michigan, Edward Snowden Used Tails, Edward Snowden Umich, Edward Snowden University Of Maryland, Edward Snowden Ufo Wikileaks, Edward Snowden Ufo Video, Edward Snowden Urban Dictionary, Edward Snowden Video, Edward Snowden Vpn, Edward Snowden Vice, Edward Snowden And Julian Assange, Edward Snowden Voice, Edward Snowden And Bradley Manning, Edward Snowden Vault 7, Edward Snowden Visa, Edward Snowden And Wikileaks, Edward Snowden Vanity Fair, Edward Snowden Wife, Edward Snowden Wiki, Edward Snowden Wired, Edward Snowden William And Mary, Edward Snowden Washington Post, Edward Snowden Who Is He, Edward Snowden Website, Edward Snowden Worth, Edward Snowden Wikileak, Edward Snowden Washington Post 2013, Edward Snowden Youtube, Edward Snowden Young, Edward Snowden Yahoo Answers, Edward Snowden Youtube Channel, Edward Snowden Youtube Documentary, Edward Snowden Yokota, Edward Snowden And Lindsay Mills, Edward Snowden Yify, Edward Snowden Zodiac Sign, Edward Snowden Zcash, Edward Snowden Zuckerberg, Edward Snowden Zoho, Edward Snowden Zizek, Edward Snowden Zimbabwe, Edward Snowden Zitate, Edward Snowden Zusammenfassung, Edward Snowden Zivilisation, Edward Snowden Zvi\u017eda\u010d,


                             
 
 

The Shevardnadze File by The National Security Archive

Become a Patron!
True Information is the most valuable resource and we ask you to give back.


Eduard Shevardnadze. (photographer unknown)

 

Compiled and edited by Svetlana Savranskaya and Thomas Blanton

For more information contact:
202/994-7000 or nsarchiv@gwu.edu

Related Links


“Masterpieces of History:” The Peaceful End of the Cold War in Europe, 1989
A National Security Archive Cold War Reader
By Svetlana Savranskaya, Thomas Blanton and Vladislav Zubok

Eduard Shevardnadze, Foreign Minister Under Gorbachev, Dies at 86
By Douglas Martin, New York Times, July 7, 2014


Sign Up for NSARCHIVE
Email Alerts!
Click here to receive email alerts on all the latest releases from the National Security Archive

Eduard Shevardnadze (seated second from right, next to George Shultz) listens to conversation between President Reagan and General Secretary Gorbachev at Geneva, November 20, 1985. (Source: Ronald Reagan Presidential Library)

Washington, DC, July 24, 2014 – Former Soviet foreign minister Eduard Shevardnadze, who passed away on July 7, brought a new diplomatic style and candor to bear in changing U.S.-Soviet relations in the late 1980s and ending the Cold War, according to Soviet and U.S. declassified documents posted today by the National Security Archive at George Washington University (www.nsarchive.org).

The posting includes the 1985 Politburo minutes of Shevardnadze’s surprise selection as foreign minister, contrasted with the behind-the-scenes account from senior Central Committee official Anatoly Chernyaev in his diary. The e-book also includes the transcripts of Shevardnadze’s remarkable first conversations with his American counterparts, George Shultz (in the Reagan administration) and James Baker (in the George H.W. Bush administration); other memcons featuring Shevardnadze’s leading role in summit meetings between Soviet leader Mikhail Gorbachev and American presidents Ronald Reagan and George H.W. Bush, and Shevardnadze’s last conversation with Bush before the end of the Soviet Union in 1991.


President Ronald Reagan and Soviet Foreign Minister Eduard Shevardnadze in the Oval Office, September 23, 1988. (photographer unknown)

Shevardnadze’s rise to leadership of the Foreign Ministry in 1985, only months after Gorbachev became general secretary, was a “bolt from the blue,” in Chernyaev’s words. Shevardnadze’s talks with Shultz brought a whole new tone to U.S.-Soviet discourse, while the Soviet minister’s growing friendship with Baker, including 1989’s fly-fishing outing in Wyoming, led to actual partnership between the former Cold War adversaries by the time of Iraq’s invasion of Kuwait in 1990. But the memcons also reflect Shevardnadze’s frustration with American “pauses” and missed opportunities for dramatic arms reductions across the board, and for earlier domestic political transformation in the Soviet Union.

The National Security Archive obtained the Shevardnadze documents through Freedom of Information Act requests to the Reagan and Bush presidential libraries and to the U.S. State Department, and through generous donations from Anatoly Chernyaev. Additional material comes from the files of the Gorbachev Foundation, the Russian State Archive of Contemporary History, and the former Communist Party (SED) archives in Germany.


General Secretary Mikhail Gorbachev and Foreign Minister Eduard Shevardnadze at a meeting of European leaders, November 21, 1990. (photographer unknown)

Two key aides to Shevardnadze played leading roles in developing the new Soviet foreign policy during the 1980s, and deserve mention for helping scholars afterwards understand the end of the Cold War. Experienced diplomat Sergei Tarasenko had already served in the Soviet embassy in Washington and provided Shevardnadze with expert advice on relations with the U.S., including in most of the U.S.-Soviet meetings transcribed here. Tarasenko also participated in the seminal 1998 Musgrove discussion published in the award-winning book, Masterpieces of History: The Peaceful End of the Cold War in Europe, 1989 (Budapest/New York: Central European University Press, 2010). Teimuraz Stepanov-Mamaladze served as Shevardnadze’s chief of staff, having come with him from Georgia to the Foreign Ministry, and subsequently donated his invaluable diaries and notes of the period to the Hoover Institution Archives at Stanford University.

 


THE DOCUMENTS

DOCUMENT 1: Excerpt of Official Minutes of the Politburo CC CPSU Session, June 29, 1985

Source: Russian State Archive of Contemporary History (RGANI), Fond 89. Translated by Svetlana Savranskaya.

Perhaps the most audacious personnel change made by Gorbachev came very early, only four months into his leadership, when longtime Foreign Minister Andrei Gromyko (known to the Americans as “Mr. Nyet”) retired upwards to the job of chairman of the Presidium of the Supreme Soviet — the titular head of state— as part of the deal that earlier had featured Gromyko advocating for Gorbachev’s election as general secretary. Gromyko understood that his successor would be his carefully-groomed deputy, Georgi Kornienko — so there was shock-and-awe throughout the Central Committee and the Foreign Ministry when Gorbachev instead proposed as foreign minister the ambitious first secretary of the Georgian Communist Party, Eduard Shevardnadze. During the Politburo session on June 29, 1985, Gorbachev stepped down from his position as chairman of the Presidium of the Supreme Soviet, which he held together with his position as general secretary (Leonid Brezhnev had merged the two jobs in 1977). By kicking Gromyko upstairs, Gorbachev opened a key position-Minister of Foreign Affairs — where he wanted to place his close ally, whom he already knew shared his reformist thinking on both international and domestic policy. This official record of the Politburo session shows Gorbachev nominating Shevardnadze, ostensibly after discussing several alternative candidates with Gromyko and jointly coming to the conclusion that Shevardnadze was the best choice. All Politburo members express their full support for Gorbachev’s candidate— testament to the power of the general secretary.

 


Secretary of State James Baker and Foreign Minister Eduard Shevardnadze fly-fishing in Wyoming, September 24, 1989. (photographer unknown)

DOCUMENT 2: Diary of Anatoly Chernyaev, July 1, 1985

Source: Diary of Anatoly S Chernyaev, donated to the National Security Archive.

Translated by Anna Melyakova.

Anatoly Chernyaev, who at the time was first deputy head of the International Department of the Central Committee (CC CPSU), describes in his diary the nominations of Gromyko and Shevardnadze as they were announced at the CC CPSU Plenum. The Plenum had to approve the nominations that the Supreme Soviet would confirm the next day. Shevardnadze’s nomination was like a “bolt from the blue,” Chernyaev writes. The diary relates how Boris Ponomarev, head of the International Department, told Chernyaev what had actually happened at the Politburo, an account that differs substantially from the official minutes (see Document 1). According to Ponomarev, the Shevardnadze nomination was a total surprise to other Politburo members, and Gromyko and Ponomarev tried to protest by suggesting career diplomat Yuli Vorontsov as a candidate, but Gorbachev disregarded their protest completely. Chernyaev concludes that Gorbachev’s nomination of Shevardnadze is “very indicative of the end of Gromyko’s monopoly and the power of the MFA’s staff over foreign policy.”

 

DOCUMENT 3: Record of Conversation between George Shultz and Eduard Shevardnadze in Helsinki, July 31, 1985

Source: Freedom of Information Act (FOIA) request to the Department of State.

This U.S. State Department memcon records the meeting with the U.S. secretary of state during Shevardnadze’s first foreign trip in office — to Helsinki for a meeting of CSCE foreign ministers on the tenth anniversary of the Helsinki Final Act. In this first meeting with George Shultz, the Soviet foreign minister mainly reads from his notes, giving the American a tour d’horizon of the Soviet positions on arms control. However, his tone is strikingly different from previous meetings when Andrei Gromyko had represented the Soviet side. Even on questions of human rights, Shevardnadze reacts not with “indignation or rage” (as Shultz comments in his memoirs) but asks Shultz jokingly, “When I come to the United States, should I talk about unemployment and blacks?” In the second part of the conversation, where Shultz and Shevardnadze are accompanied only by translators, Shevardnadze urges his counterpart to move fast on arms control, indicating that the Soviets are willing to reassess their positions — “there is no time now to postpone solutions.” He ends the conversation with the statement: “you have experience but we have the truth,” a remark that would win him some positive points from the Politburo.

 

DOCUMENT 4: Minutes of Politburo discussion of Shultz-Shevardnadze talks in Vienna, November 13, 1986

Source: Archive of the Gorbachev Foundation. Translated by Svetlana Savranskaya.

Shevardnadze was an active participant at the historic summit between Gorbachev and Reagan in Reykjavik in October 1986, where the two leaders almost agreed to abolish nuclear weapons. Just after the summit, the Soviets, trying to build on the momentum of Reykjavik, tried to offer the U.S. side concessions on laboratory testing for the missile defense program so close to Reagan’s heart – a change in position that might have made a difference at Reykjavik. But it was too late. Enmeshed in the growing Iran-contra scandal and under attack from allies like Margaret Thatcher for nuclear heresy, the Reagan administration had already retreated from the Reykjavik positions. Here the Politburo reviews the results of the November Shevardnadze-Shultz talks in Geneva, where Shultz refused even to discuss Shevardnadze’s new proposals concerning what testing would be allowed and not allowed under the ABM treaty. Shultz’s position notwithstanding, Gorbachev emphasizes the need to press the U.S. to move forward on the basis of Reykjavik. He stresses that “we have not yet truly understood what Reykjavik means,” referring to its significance as a new level of disarmament dialogue and reduction of the sense of nuclear threat.

 

DOCUMENT 5: Record of Shultz-Shevardnadze Conversation in Moscow, April 21, 1988

Source: FOIA request to the Department of State.

This State Department memorandum of conversation records the third set of negotiations between the U.S. secretary of state and the Soviet foreign minister leading up to the 1988 Moscow summit (February in Moscow, March in Washington, now April back in Moscow). Shevardnadze presses for progress on the START treaty aimed at reducing nuclear weapons, but Shultz responds that still-unresolved issues like sea-launched cruise missiles (SLCMs) would not “reach full closure during the next month,” so agreement would be unlikely for the summit. Arguments over these nuclear-armed cruise missiles would hold up START negotiations for years, pushed by the parochial interests of the U.S. Navy rather than a consideration of the national interest, but by 1991 their lack of strategic value would lead to President George H. W. Bush’s unilateral decision to withdraw all tactical nuclear weapons from U.S. ships.

The bulk of the discussion here concerns human rights issues, including an interesting exchange about the Vienna follow-up meeting on the Helsinki Final Act. Shultz raises his “disappointment with the performance of the Soviet delegation” at Vienna, which “was not prepared to go as far in its statements as what the Soviet leadership was saying in Moscow.” Shevardnadze responds, “We have a hard delegation” in Vienna; we tell them one thing, “They do something different.”

 

DOCUMENT 6: Minutes of the Politburo discussion of Mikhail Gorbachev’s United Nations speech, December 27-28, 1988

Source: RGANI. Published in “Istochnik” 5-6, 1993. Translated by Vladislav Zubok.

The December 27-28 Politburo meeting was the first following Gorbachev’s return from the United States after his historic announcement at the United Nations of massive unilateral Soviet withdrawals of forces from Eastern Europe. Observers in the United States ranging from Sen. Daniel Moynihan to Gen. Andrew Goodpaster hailed the speech as marking the end of the Cold War; but incoming Bush administration “hawks” such as Brent Scowcroft did not agree (as Gorbachev would only find out later, with the 1989 “pause”). Part of the context here in the Politburo for Gorbachev’s lengthy monologues and Shevardnadze’s proposals for a “businesslike” withdrawal of Soviet troops from Eastern Europe is the growing bewilderment of certain military and KGB leaders who were not fully informed in advance about the scale and tempo of Gorbachev’s announced unilateral arms cuts.

Still, there is no trace of real opposition to the new course. The Soviet party leader has learned a lesson from the military’s lack of a strong reaction to previous discussions of “sufficiency” as a national security strategy, and he is now ramming change down their throats. Ever obedient, Defense Minister Dmitri Yazov states, “everyone reacted with understanding,” even after Shevardnadze’s aggressive attacks against the military for retrograde thinking, for directly contradicting the U.N. speech, and for proposing only “admissible” openness rather than true glasnost. Ironically, however, when Shevardnadze and Ligachev suggest announcing the size of Soviet reductions “publicly,” it is Gorbachev who objects: if the Soviet people and party learn how huge Soviet defense expenditures really are, it will undermine the propaganda effect of his U.N. speech.

 

DOCUMENT 7: Record of Conversation between Erich Honecker and Eduard Shevardnadze, June 9, 1989

Source: Stiftung Archiv der Parteien und Massenorganisationen der DDR-Bundesarchiv, SED, ZK, JIV2/2A/3225. Translated by Christiaan Hetzner.

This is one of many documents that became available in the Communist party archives of the former East Germany (GDR) after the fall of the Berlin Wall and the unification of Germany. Less than a week after Solidarity had swept the Polish elections, to the dismay of the Polish Communists, the hard-line GDR leader Erick Honecker is rapidly becoming a dinosaur on the verge of extinction. At this moment in mid-1989, only Nicolae Ceausescu of Romania surpasses Honecker in his resistance to Gorbachev’s perestroika and the new thinking in Moscow represented in this meeting by Shevardnadze. Honecker has even banned some of the new Soviet publications from distribution in the GDR. The conversation reveals Honecker’s deep ideological concerns, and his understanding of the geostrategic realities in Central Europe. He reminds Shevardnadze that “socialism cannot be lost in Poland” because through Poland run the communications lines between the Soviet Union and the Soviet troops in the GDR facing NATO’s divisions.

This same consideration led Honecker and his predecessor, Walter Ulbricht, to urge Soviet military intervention to suppress previous East European uprisings such as the Prague Spring in 1968 or the strikes in Poland in 1980-1981. But here Honecker is most dismayed by Gorbachev’s upcoming trip to West Germany (FRG), which threatens Honecker’s own political “balancing act,” which in turn depends on poor relations between the Soviets and the West Germans. Shevardnadze has an impossible mission here, to assuage the East German leader’s concerns about all the changes taking place in Poland, Hungary and inside the Soviet Union. Shevardnadze’s opening words — “our friends in the GDR need not worry” — sound more than ironic today. In fact, Shevardnadze does not believe in Honecker’s concept of East German “socialism,” and in only a few months, the Moscow leadership would signal to Honecker’s colleagues it was time for him to go.

 

DOCUMENT 8: Memorandum of Conversation between George Bush and Eduard Shevardnadze in Washington, September 21, 1989

Source: FOIA request to the George H.W. Bush presidential library.

This meeting in Washington marks the start of Shevardnadze’s trip to the United States that will culminate with his fly-fishing expeditions with James Baker in Wyoming, where the two men established a close personal connection. This was also Shevardnadze’s first meeting with George H.W. Bush as president of the United States. He tells Bush about the progress of domestic perestroika and democratization in the Soviet Union, the work on economic reform, and the new tenor of U.S.-Soviet relations. However, Shevardnadze laments that the desired progress toward a 50% reduction in strategic nuclear weapons is not on the horizon, and he urges his U.S. counterparts to pick up the pace. He also enumerates other Soviet arms control proposals, including banning fissionable materials and eliminating short-range nuclear weapons.

 

DOCUMENT 9: Memorandum of Conversation between George Bush and Eduard Shevardnadze in Washington, April 6, 1990

Source: FOIA request to the George H.W. Bush presidential library.

Shevardnadze is in Washington for this meeting, working out arrangements for the long-planned summit meeting between Bush and Gorbachev that will take place at the end of May. The Lithuania crisis has created a rift in U.S.-Soviet relations, “lost momentum” in Bush’s phrase, as the independence demands of Lithuanian nationalists build on the long-standing American position of non-recognition of Soviet incorporation of the Baltics, as well as domestic U.S. political pressures from émigré groups. Gorbachev’s own lack of understanding for Baltic nationalism has produced an inconsistent Soviet policy alternating between crackdowns, threats of an embargo, and attempts at dialogue. Shevardnadze tries to explain to the Americans why the Soviets needed “Presidential authority” to deal with the problems between ethnic groups in Lithuania, not to mention Soviet claims to ownership of the factories there. But when Bush says the Soviets have backtracked on arms control agreements (such as how to count air-launched cruise missiles, or ACLMs), Shevardnadze is quick to point out how the Americans have reneged on their on-site inspection pledges.

Perhaps most remarkably, Shevardnadze describes the Soviet argument for a nuclear test ban as based on domestic political pressures from mass demonstrations (such as in Kazakhstan against the Semipalatinsk test range). The Soviet foreign minister also makes a plea for partnership in international financial institutions such as the European Bank for Reconstruction and Development, saying the Soviets are “not looking for your help.” This would change within a year. On the American side, the conversation reveals a clear expression of Bush’s vision when he reports he is often asked, “Who is the enemy?” Bush’s answer: “unpredictability.” And perhaps it is just diplo-speak, but it is all the same music to Shevardnadze’s ears, when the American president combines his own “Europe whole and free” phrase with Gorbachev’s “common European home” and remarks that the latter idea is “very close to our own.”

 

DOCUMENT 10: Memorandum of Conversation between George Bush and Eduard Shevardnadze in Washington, May 6, 1991

Source: FOIA request to the George H.W. Bush presidential library.

This is Shevardnadze’s last meeting with President Bush, and he appears only in his unofficial capacity as president of the Moscow-based Foreign Policy Association. Shevardnadze resigned as foreign minister in December 1990, warning against the coming dictatorship, and protesting Gorbachev’s turn toward the hard-liners. But here Shevardnadze comes to Washington asking for support for the embattled reform still underway in the Soviet Union. He describes the dismal situation in his country, pointing specifically to economic instability, the nationalities crisis, and the rising conservative opposition. He regrets delays on every important issue, especially the Union treaty that would precipitate the hard-line coup in August 1991: “if we had offered this treaty in 1987 or even 1988, all would have signed it.” But most of all, the former foreign minister is “concerned, indeed frightened, by the pause in our relations.” He urges Bush not to delay the planned Moscow summit (it would ultimately happen at the very end of July) and to keep engaging with Gorbachev. In effect, progress in U.S.-Soviet relations has become the only strong card Gorbachev has left to play in the context of his domestic crises.

Bush and Shevardnadze talk about Gorbachev’s relationship with Russian leader Boris Yeltsin and wonder why they cannot find a way to work together. Shevardnadze appeals to Bush to move fast on reductions in conventional forces (CFE) and in nuclear weapons (START) because “demilitarization is the best way to help the Soviet Union.” For Bush, however, completing these two treaties remains a precondition for even holding the 1991 summit. Shevardnadze’s plea for farm credits is especially poignant; a year earlier, he sought economic partnership, but now he says, “We must let people [in the Soviet Union] feel something tangible. I know it is hard, but if it is possible, give the credits.” Prophetically, Shevardnadze remarks, “Even if we can’t maintain a single Soviet Union, reform will continue.”

The National Security Archive – NSA Retaining “Useless” and Highly Personal Information of Ordinary Internet Users, Spying …

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

by

Snowden did get the FISA data, contrary to Keith Alexander's insistence to the contrary. Photo: EPA

Ordinary internet activity accounts for the overwhelming majority of communications collected and maintained by the National Security Agency (NSA). A recent report by The Washington Post, based on communications leaked by former contractor Edward Snowden, revealed that nine out of 10 communications collected belonged to average American and non-American internet users who were not the targets of investigations. Much of the highly personal communications –including baby pictures and revealing webcam photos– provide little intelligence value and are described as useless, yet are retained under Section 702 of the FISA Amendments. The Post’s findings clearly contradict former NSA head Keith Alexander’s assertions that there was no way Snowden could “touch the FISA data,” and give credence to the argument that “the NSA has been proven incapable of safeguarding” the intelligence it collects, irrespective of its value.

In one 2005 document, intelligence community personnel are instructed how to properly format internal memos to justify FISA surveillance. In the place where the target’s real name would go, the memo offers a fake name as a placeholder: “Mohammed Raghead.”

Glenn Greenwald and Murtaza Hussain’s latest Intercept expose reveals that the NSA, along with the FBI, covertly monitors the communications of prominent, upstanding Muslim-Americans under provisions of the FISA intended to target terrorists and foreign spies, ostensibly solely because of their religion. The FISA provision that seemingly codifies the surveillance requires that “the Justice Department must convince a judge with the top-secret Foreign Intelligence Surveillance Court that there is probable cause to believe that American targets are not only agents of an international terrorist organization or other foreign power, but also ‘are or may be’ engaged in or abetting espionage, sabotage, or terrorism.” In practice, however, the agencies monitored the emails of Nihad Awad, the executive director of the Council on American-Islamic Relations (CAIR), the largest Muslim civil rights organization in the country, Asim Ghafoor, a prominent attorney who has represented clients in terrorism-related cases, and other civically inclined American Muslims.

Why did the CIA take a chance on a BND employee naive enough to volunteer to spy for Russia via email?

White House officials are questioning why President Obama was left in the dark about the CIA’s German intelligence informant and his recent arrest, a somewhat baffling omission in the wake of revelations the NSA monitored the private communications of Chancellor Merkel and the resulting state of US-German relations. “A central question, one American official said, is how high the information about the agent went in the C.I.A.’s command — whether it was bottled up at the level of the station chief in Berlin or transmitted to senior officials, including the director, John O. Brennan, who is responsible for briefing the White House.” Of further interest is why the CIA made use of the German intelligence official in the first place, who not only walked into the agency’s Berlin office in 2012 and offered to spy, but also volunteered his spying services to Russia via email.

The internal affairs division of Customs and Border Patrol (CBP) is being investigated again, this time for mishandling the personal information of the agency’s 60,000 employees. Under investigation are defunct CBP programs that shared employees’ Social Security numbers with the FBI and that “automatically scanned the Social Security numbers of all the agency’s employees in a Treasury Department financial records database.” Both programs were part of the agency’s response to the Obama administration’s Insider Threat initiative.

Cause of Action’s latest “FOIA Follies” provides some insight on what qualifies for a (b)(5) “withhold because you want to” FOIA exemption at the IRS, and reinforces Archive FOIA Coordinator Nate Jones’ arguments of how the FOIA Improvement Act of 2014 would address this overused exemption and help ordinary requesters. Cause of Action submitted a FOIA request to the IRS seeking records related to any requests from the President for individual or business tax returns in 2012, after which the IRS released 790 heavily redacted pages. Cause of Action filed suit in 2013 challenging the IRS’ use of exemption (b)(5) to withhold large portions of the records, prompting the IRS to “reconsider” some of its withholdings. The newly-released portions of documents reveal the agency was using the (b)(5) exemption to withhold mundane information contrary to Attorney General Holder’s 2009 guidance that “an agency should not withhold information simply because it may do so legally.”

"Allegations of Torture in Brazil."

The Brazilian military regime employed a “sophisticated and elaborate psychophysical duress system” to “intimidate and terrify” suspected leftist militants in the early 1970s, according to a State Department report dated in April 1973 and made public last week. Peter Kornbluh, who directs the National Security Archive’s Brazil Documentation Project, called the document “one of the most detailed reports on torture techniques ever declassified by the U.S. government.” This document, and 42 others, were given to Brazilian President Dilma Rousseff by Vice President Joe Biden and were made available for use by the Brazilian Truth Commission, which is in the final phase of a two-year investigation of human rights atrocities during the military dictatorship which lasted from 1964 to 1985.

The Pentagon and the Justice Department are going after the money made by former Navy Seal Matt Bissonnette from his book on the raid to capture Osama bin Laden, No Easy Day, for failing to submit the book for pre-publication review to avoid disclosing any top secret information about the raid. It’s worth noting that while the government goes after Bissonnette for releasing his book without pre-publication review, both the CIA and DOD provided unprecedented access to Hollywood filmmakers Kathryn Bigelow and Mark Boal for their bin Laden raid blockbuster, Zero Dark Thirty, while simultaneously refusing to release the same information to FOIA requesters

A partially redacted 29-page report recently found low morale at the US government’s Office of Cuba Broadcasting, which is responsible for Radio and TV Marti. “Some of the reasons cited for low morale included the lack of transparency in decision-making, the inability to offer suggestions, and the lack of effective communication. Others were concerned about raising any issues to the inspection team because of fear of retaliation by management.”

 

Inside the biological weapons factory at Stepnogorsk, Kazakhstan, where the Soviet Union was prepared to make tons of anthrax if the orders came from Moscow [Photo courtesy Andy Weber]

Finally this week, our #tbt document picks concern Eduard Shevardnadze, the ex-Georgian president and Soviet foreign minster who recently died at the age of 86. The documents themselves comes from a 2010 Archive posting on high-level Soviet officials debates during the final years of the Cold War about covering-up the illicit Soviet biological weapons program in the face of protests from the United States and Great Britain. The documents show that Eduard Shevardnadze, along with defense minister Dmitri Yazov, and the Politburo member overseeing the military-industrial complex, Lev Zaikov, were aware of the concealment and were actively involved in discussing it in the years when Soviet leader Mikhail Gorbachev was advancing his glasnost reforms and attempting to slow the nuclear arms race. Check out the documents here.

Happy FOIA-ing!

DHS-FBI-NCTC: Building Security Measures May Hinder Emergency Response Efforts

Building Security Measures May Impact Emergency Response to Attacks by Violent Extremists

  • 1 page
  • For Official Use Only
  • December 6, 2013

Download

(U//FOUO) Facility security measures, such as interior control points or exterior barriers, may require first responders to adjust normal protocols and procedures to operate rapidly during emergencies. The timeline below is an overview of attacks and plots against US-based facilities with varying levels of security. The diversity of tactics and targets used underscores the need for interagency exercises and training that incorporates multiple scenarios to account for building security measures likely to be encountered.

(U) First Responder Response Considerations:

(U//FOUO) Conducting periodic exercises with building authorities and interagency partners will help responders tailor a coordinated response to the unique security characteristics of the site
and increase efficiency during an emergency. Engagement with partners may address a number of issues including:

»» (U//FOUO) Building emergency response plans that identify the key staff members to assist and advise first responders as well as their roles and responsibilities during crisis;
»» (U//FOUO) Interior building control points which may limit responder access to areas and affect the rapid deployment of tools and equipment;
»» (U//FOUO) Building access control systems: the availability of master keys or swipe cards to provide full access and/or entry into restricted areas;
»» (U//FOUO) The existence of exterior building security measures which may affect the placement of response vehicles or the ability to ventilate building and rescue victims;
»» (U//FOUO) Closed circuit television (CCTV) monitors to maintain situational awareness and to assist with accountability and evacuation of building occupants; and
»» (U//FOUO) Suspicious activity reporting training to building staff and tenants to help identify and disrupt potential preoperational activity or actual attacks.

Cryptome – 9/11 Secrecy Prolongs Warmaking and NSA Excess

9/11 Secrecy Prolongs Warmaking and NSA Excess

 


At 09:08 PM 2/20/2014, A wrote:

Mr. Young,

I’m curious about your opinion about what really happened on 9/11. I was reading one of your FOIA posts and was curious about your opinion. Please don’t waste too much time on this. I’m working an 80-hour per week job and am married. So, I don’t have as much time as I would like to research. A simple copy-and-paste job will do with a few different links.

Thank you for your time and for all the documents you post,

A

_____

21 February 2014

A,

These are some of my comments on WTC.

http://cryptome.org/wtc-collapse.htm

9/11 is a much larger issue than WTC which I am still brooding about. There is still a lot of information which the USG has not released, and until that is done it will be difficult to do more than speculate.

It is a great shame, likely criminal, that the USG refuses to release all material it has, for that perpetuates suspicion of a cover-up of those at fault and sets yet another precedent for using official secrecy to avoid accountability.

A somewhat lesser but related shame is that there has been no person or persons in the USG held accountable or punished for 9/11, leaving the false impression nothing could have been done to prevent it.

Our view is that public pressure should be continued, and increased, for full release of the USG material, both classified and unclassified. Withholding this material will undermine trust in government, and worse, leave government free to avoid responsibility to the public for war and peace. So long as that fundamental responsibility to the public is avoided we think continuous war is inevitable for unnecessary loss of life and limb and unforgiveable waste of national resources.

Behind the avoidance of public responsibility is the ever increasing use of unjustified secretkeeping, prolongation of exaggerated threats to national security, and as Ike warned the perpetuation of the lucrative military-industry-media complex hidden by official secrecy. It is this secrecy which breeds suspicion of the USA at home and overseas and will almost surely lead to more 9/11s.

NSA excess is directly attributable to 9/11 secrecy about lack of government accountability.

Regards,

John

Unveiled – Edward Lucas DMCA Notice for Snowden Plot

Edward Lucas DMCA Notice for Snowden Plot

 


Date: Mon, 17 Feb 2014 13:56:57 +0000
From: “Edward Lucas” <edwardlucas[at]economist.com>
To: <cryptome[at]earthlink.net>
Cc: <Andrew Rosenheim <androsen[at]amazon.co.uk>
Subject: DCMA notice

Mr John Young
Cryptome, 251 West 89th Street, New York, NY 10024

Dear Mr Young

I am the copyright owner of the article being infringed at:

http://cryptome.org/2014/02/lucas-snowden.htm

It is a Kindle Single available for sale on the Amazon website

This letter is official notification under the provisions of Section 512* of the Digital Millennium Copyright Act (*DMCA*) to effect removal of the above-reported infringements. I request that you immediately issue a cancellation message as specified in RFC 1036 for the specified postings and prevent the infringer, who is identified by its web address, from posting the infringing content to your servers in future. Please be advised that the law requires you, as a service provider, to *expeditiously remove or disable access to* the infringing content upon receipt of this notice. Non-compliance may result in a loss of immunity for liability under the DMCA.

Use of the material in the manner complained of here is not authorized by me, the copyright holder, or the law. The information provided here is accurate to the best of my knowledge. I swear under penalty of perjury that I am the copyright holder.

Please send me, at the address noted below, a prompt response indicating the actions you have taken to resolve this matter.

Yours faithfully

Edward Lucas

+44 207 576 xxxx (direct)
+44 7770 380 xxx (mobile)

edwardlucas[at]economist.com
The Economist
25 St James St
London SW1A 1HG
www.edwardlucas.com

This e-mail may contain confidential material. If you are not an intended recipient, please notify the sender and delete all copies. It may also contain personal views which are not the views of The Economist Group. We may monitor e-mail to and from our network.

Sent by a member of The Economist Group. The Group’s parent company is The Economist Newspaper Limited, registered in England with company number 236383 and registered office at 25 St James’s Street, London, SW1A 1HG. For Group company registration details go to http://legal.economistgroup.com


	

Cryptome – NSA Snowden Releases Tally Update – *1,159 Pages

18 February 2014. Add *45 pages to The Intercept (37 pages are duplicates of release by NBC News). Tally now *1,159 pages of The Guardian first reported 58,000 files; caveat: Janine Gibson, The Guardian NY, said on 30 January 2014 “much more than 58,000 files in first part, two more parts” (no numbers) (tally now less than ~1.8%). DoD claims 1,700,000 files (~.0062% of that released).

Note: Between 10-17 February 2014, The Intercept disclosed fragments of Snowden pages and the New York Times referenced some but as far as known did not release them in full. If available please send link.

10 February 2014. Add 1 page to NRC Handelsblad (via Electrospaces.blogspot.com).

7 February 2014. Add 15 pages NBC News.

5 February 2014. Add 14 pages NBC News.

31 January 2014. Add 27 pages to CBC News.

27 January 2014. Add 47 pages to NBC News.

27 January 2014. Add 18 pages to Anonymous via New York Times.

16 January 2014. Add 8 pages to The Guardian.

* 14 January 2014. Add 21 pages to Information.dk (duplicate).

* 13 January 2014. Add 4 pages to Information.dk (duplicate).

Related Snowden Document and Page Count Assessment:

http://cryptome.org/2014/01/snowden-count.htm

* 5 January 2014. Add 16 pages to Der Spiegel (30 December 2013. No source given for NSA docs). Tally now *962 pages (~1.7%) of reported 58,000. NSA head claims 200,000 (~.50% of that released).

4 January 2014. The source was not identified for *133  pages published by Der Spiegel and Jacob Appelbaum in late December 2013. They are included here but have not been confirmed as provided by Edward Snowden. Thanks to post by Techdirt.

Glenn Greenwald tweeted:

Glenn Greenwald @ggreenwald, 8:05 AM – 29 Dec 13@Cryptomeorg @ioerror I had no involvement in that Spiegel article, ask them – and they don’t say those are Snowden docs.

Matt Blaze tweeted, 11:24 AM – 2 Jan 14

matt blaze @mattblazeIf there are other sources besides Snowden, I hope journalists getting docs are careful to authenticate them (& disclose uncertainty).

3 January 2014. Add 13 pages to Washington Post.

3 January 2014. See also EFF, ACLU and LeakSource accounts:

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013

http://leaksource.wordpress.com/

2 January 2014. Add 1 page to Washington Post published 10 July 2013.

* 31 December 2013. Add 16 pages to Der Spiegel.

* 30 December 2013. Add 50 pages of NSA ANT Catalog by Jacob Appelbaum (no source given for NSA docs).

* 30 December 2013. Add 21 pages from 30C3 video by Jacob Appelbaum (no source given for NSA docs).

* 30 December 2013. Add 42 pages (8 duplicates) to Der Spiegel (no source given for NSA docs).

* 29 December 2013. Add 4 pages to Der Spiegel (no source given for NSA docs).

24 December 2013. Add 2 pages to Washington Post.

23 December 2013

http://www.adn.com/2013/12/22/3243451/pincus-snowden-still-has-a-road.html

We’ve yet to see the full impact of former National Security Agency contractor Edward Snowden’s unauthorized downloading of highly classified intelligence documents.

Among the roughly 1.7 million documents he walked away with — the vast majority of which have not been made public — are highly sensitive, specific intelligence reports, as well as current and historic requirements the White House has given the agency to guide its collection activities, according to a senior government official with knowledge of the situation.

The latter category involves about 2,000 unique taskings that can run to 20 pages each and give reasons for selective targeting to NSA collectors and analysts. These orders alone may run 31,500 pages.

13 December 2013. Add 26 pages to Trojkan (SVT). Tally now 797 pages (~1.4%) of reported 58,000. NSA head claims 200,000 (~.40% of that released). Australia press reports “up to 20,000 Aussie files.”

Rate of release over 6 months, 132.8 pages per month, equals 436 months to release 58,000, or 36.3 years. Thus the period of release has decreased in the past month from 42 years.

12 December 2013. Belatedly add 27 pages to Guardian and 18 pages to Washington Post.

 


21 November 2013. See also EFF and ACLU accounts:

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013

 


3 November 2013

47 42 Years to Release Snowden Documents

Out of reported 50,000 pages (or files, not clear which), about 446 514 pages (>1% 1%) have been released over 5 months beginning June 5, 2012. At this rate, 89 100 pages per month, it will take 47 42 years for full release. Snowden will be 77 72 years old, his reporters hoarding secrets all dead.

NY Times, 3 November 2013:

Whatever reforms may come, Bobby R. Inman, who weathered his own turbulent period as N.S.A. director from 1977 to 1981, offers his hyper-secret former agency a radical suggestion for right now. “My advice would be to take everything you think Snowden has and get it out yourself,” he said. “It would certainly be a shock to the agency. But bad news doesn’t get better with age. The sooner they get it out and put it behind them, the faster they can begin to rebuild.”

 


 

Outlet Pages
The Guardian 273
Washington Post 216
Der Spiegel * 97
O Globo Fantastico ~87
New York Times
Anonymous
118 (82 joint)
18
ProPublica 89 (82 joint)
Le Monde 20
Dagbladet 13
NRC Handelsblad 5
Huffington Post 3
CBC 36
The Globe and Mail 18
SVT 2
L’Espresso 3
Trojkan (SVT) 29
Jacob Appelbaum * 71
Information.dk 22*
Anonymous/New York Times 18
NBC News 76
The Intercept *45

 


Timeline of releases:

18 February 2014. Add 45 pages to The Intercept.

10 February 2014. Add 1 page to NRC Handelsblad (via Electrospaces.blogspot.com).

7 February 2014. Add 15 pages NBC News.

5 February 2014. Add 14 pages NBC News.

31 January 2014. Add 27 pages CBC News.

27 January 2014. Add 47 pages to NBC News.

27 January 2014. Add 18 pages to Anonymous.

16 January 2014. Add 8 pages to The Guardian.

* 14 January 2014. Add 21 pages to Information.dk (duplicate).

* 13 January 2014. Add 4 pages to Information.dk (duplicate).

3 January 2014. Add 13 pages to Washington Post.

2 January 2014. Add 1 page to Washington Post published 10 July 2013.

* 31 December 2013. Add 16 pages to Der Spiegel.

* 30 Decebmer 2013. Add 50 pages of NSA ANT Catalog by Jacob Appelbaum.

* 30 December 2013. Add 21 pages from 30C3 video by Jacob Appelbaum.

* 30 December 2013. Add 16 pages to Der Spiegel.

* 30 December 2013. Add 42 pages to Der Spiegel.

* 29 December 2013. Add 4 pages to Der Spiegel.

24 December 2013. Add 2 pages to Washington Post.

13 December 2013. Add 26 pages to Trojkan (SVT).

12 December 2013. Belatedly add 27 pages to Guardian and 18 pages to Washington Post.

11 December 2013. Belatedly add 25 pages to Guardian.

11 December 2013. Belatedly add 74 pages to Washington Post.

10 December 2013. Add 2 pages to CBC.

10 December 2013. Add 4 pages to CBC (duplicate of previous source).

9 December 2013. Add 3 pages to Trojkan. Add 2 pages to Guardian. Add 82 pages to New York Times and ProPublica (joint).

6 December 2013. Add 3 pages to L’Espresso.

5 December 2013. Add 2 pages to SVT (Swedish TV).

5 December 2013. Add 1 page to Washington Post.

4 December 2013. Add 3 pages to Washington Post.

2 December 2013. Add 3 pages to CBC.

30 November 2013. Add 18 pages to The Globe and Mail.

30 November 2013. Add 3 pages to NRC Handelsblad.

29 November 2013. Add 1 page to CBC.

27 November 2013. Add 3 pages to Huffington Post.

26 November 2013. Add 4 pages to Washington Post.

23 November 2013. Add 1 page to NRC Handelsblad.

23 November 2013. Add 5 pages to New York Times.

22 November 2013. Add 10 pages to Dagbladet.

18 November 2013. Add 6 pages to The Guardian.

17 November 2013. Add two images to Der Spiegel.

4 November 2013. Add 14 pages to Washington Post.

3 November 2013. A reports an additional 54 slides for O Globo Petrobas.

3 November 2013. Add 22 pages to New York Times.

2 November 2013. Add 13 pages to Guardian, 11 are duplicates.

31 October 2013. Add 4 pages to Washington Post.

29 October 2013. Add 3 pages to Der Spiegel

27 October 2013. Add 2 pages to Der Spiegel.

25 October 2013. Add 4 pages to Le Monde.

22 October 2013. Add 5 pages to Le Monde.

21 October 2013. Add 11 pages to Le Monde, 8 are duplicates.

20 October 2013. Add 1 page to Der Spiegel.

13 October 2013. Add 4, 7 and 9 pages to Washington Post.

8 October 2013. Add 7 pages to O Globo: CSE spying on Brazilian ministry, reported 7 October 2013.

6 October 2013. Add Snowden pages published by Washington Post, Der Spiegel, O Globo Fantastico, New York Times, ProPublica. Some are duplicates(*).

 


5 October 2013

26 Years to Release Snowden Docs by The Guardian

Out of reported 15,000 pages, The Guardian has published 192 pages in fourteen releases over four months, an average of 48 pages per month, or 1.28% of the total. At this rate it will take 26 years for full release.

Edward Snowden will be 56 years old.
Glenn Greenwald will be 72.
Laura Poitras will be 75.
Alan Rusbridger will be 86.
Barton Gellman will be 78.
Julian Assange will be 68.
Chelsea Manning will be 52.
Keith Alexander will be 88.
Barack Obama will be 78.
Daniel Ellsberg will be 108.
This author will be 103.

 


 

Number Date Title Pages

The Guardian 273
21 16 January 2014 SMS Text Messages Exploit 8
20 9 December 2013 Spying on Games 2
18 18 November 2013 DSD-3G 6
19 1 November 2013 PRISM, SSO
SSO1 Slide
SSO2 Slide
13*
18 4 October 2013 Types of IAT Tor 9
17 4 October 2013 Egotistical Giraffe 20*
16 4 October 2013 Tor Stinks 23
15 11 September 2013 NSA-Israel Spy 5
14 5 September 2013 BULLRUN 6*
13 5 September 2013 SIGINT Enabling 3*
12 5 September 2013 NSA classification guide 3
11 31 July 2013 XKeyscore 32
10 27 June 2013 DoJ Memo on NSA 16
9 27 June 2013 Stellar Wind 51
8 21 June 2013 FISA Certification 25
7 20 June 2013 Minimization Exhibit A 9
6 20 June 2013 Minimization Exhibit B 9
5 16 June 2013 GCHQ G-20 Spying 4
4 8 June 2013 Boundless Informant FAQ 3
3 8 June 2013 Boundless Informant Slides 4
2 7 June 2013 PPD-20 18
1 5 June 2013 Verizon 4

Washington Post 216
2 January 2014 Quantum Computer 2 10
2 January 2014 Quantum Computer 3
23 December 2013 NSA/CSS Mission 2
11 December 2013 Excessive Collection 9
11 December 2013 SCISSORS 2 7
11 December 2013 SCISSORS 1 4
11 December 2013 Yahoo-Google Exploit 6
11 December 2013 Cable Spying Types 7
11 December 2013 WINDSTOP 1
11 December 2013 Co-Traveler 24
11 December 2013 GSM Tracking 2
11 December 2013 SIGINT Successes 4
11 December 2013 GHOSTMACHINE 4
5 December 2013 Target Location 1
4 December 2013 FASCIA 2
4 December 2013 CHALKFUN 1
26 November 2013 Microsoft a Target? 4
4 November 2013 WINDSTOP, SSO, Yahoo-Google 14
30 October 2013 MUSCULAR-INCENSOR Google and Yahoo 4
14 October 2013 SSO Overview 4
14 October 2013 SSO Slides 7
14 October 2013 SSO Content Slides 9
4 October 2013 Tor 49
4 October 2013 EgotisticalGiraffe 20*
4 October 2013 GCHQ MULLENIZE 2
4 October 2013 Roger Dingledine 2
30 August 2013 Budget 17
10 July 2013 PRISM Slide 1
29 June 2013 PRISM 8
20 June 2013 Warrantless Surveillance 25*
7 June 2013 PPD-20 18*
6 June 2013 PRISM 1

Der Spiegel * 97
31 December 2013 QFIRE * 16
30 December 2013 TAO Introduction * 16
30 Deceber 2013 QUANTUM Tasking (8 duplicates of QUANTUMTHEORY) 28*
30 December 2013 QUANTUMTHEORY 14
29 December 2013 TAO ANT COTTONMOUTH (images)
TAO ANT COTTONMOUTH
(DE article)
4
17 November 2013 ROYAL CONCIERGE (DE)ROYAL CONCIERGE (EN) 2
29 October 2013 NSA-CIA SCS 3
27 October 2013 NSA-CIA SCS 2
20 October 2013 Mexico President 1
20 September 2013 Belgacom 3
16 September 2013 SWIFT 3
9 September 2013 Smartphones 5
1 September 2013 French Foreign Ministry 0
31 August 2013 Al Jazeera 0

O Globo Fantastico ~87
7 October 2013 CSE Brazil Ministry 7
8 September 2013 Petrobas ~60
3 September 2013 Brazil and Mexico 20

New York Times 118
9 December 2013 Spying on Games 82*
23 November 2013 SIGINT Strategy 2012-2016 5
3 November 2013 SIGINT Mission 2013SIGINT Mission 2017 22
28 September 2013 Contact Chaining Social Networks 1
28 September 2013 SYANPSE 1
5 September 2013 BULLRUN 4*
5 September 2013 SIGINT Enabling 3*

ProPublica 89
9 December 2013 Spying on Games 82*
5 September 2013 BULLRUN 4*
5 September 2103 SIGINT Enabling 3*

Le Monde 20
25 October 2013 NSA Hosts FR Spies 4
22 October 2013 Wanadoo-Alcatel 1
22 October 2013 Close Access Sigads 2
22 October 2013 Boundless Informant 2
22 October 2013 PRISM 11

Dagbladet 13
19 November 2013 BOUNDLESSINFORMANT 13

NRC Handelsblad 5
8 February 2014 MIVD BoundlessInformant
Cryptome mirror
1
30 November 2013 Dutch SIGINT 3
23 November 2013 SIGINT Cryptologic Platform 1

Huffington Post 3
27 November 2013 Muslim Porn Viewing 3

CBC 36
30 January 2014 CESC IP Profiling 27
10 December 2013 NSA-CSEC Partnership 1
10 December 2013 G8-G20 Spying 4*
2 December 2013 G8-G20 Spying 3
29 November 2013 G8-G20 Spying 1

The Globe and Mail 18
30 November 2013 CSEC Brazil Spying 18*

SVT (Swedsh TV) 2
5 December 2013 Sweden Spied Russia for NSA 2

L’Espresso 3
6 December 2013 NSA Spies Italy 3

Trojkan (SVT) 29
11 December 2013 NSA Sweden FRA Relationship 1*
11 December 2013 NSA 5 Eyes Partners 1
11 December 2013 NSA Sweden FRA Agenda 8
11 December 2013 NSA Sweden FRA RU Baltic 1
11 December 2013 NSA GCHQ Sweden FRA COMINT 1
11 December 2013 NSA Sweden FRA  XKeyscore Plan 5
11 December 2013 NSA Sweden FRA XKeyscore Sources 1
11 December 2013 NSA Sweden FRA XKeyscore Tor et al 3
11 December 2013 NSA Sweden FRA XKeyscore Slide 1
11 December 2013 NSA Sweden FRA Quantum 1 1
11 December 2013 GCHQ Sweden FRA Quantum 1
11 December 2013 NSA Sweden FRA Quantum Accomplishments 2
9 December 2013 NSA and Sweden Pact 3*

Jacob Appelbaum * 71
30 December 2013 NSA Catalog * 50
30 December 2013 NSA Catalog Video Clips * 21

Information.dk 22*
14 January 2014 SSO (duplicate) 7*
14 January 2014 PRISM (duplicate) 11*
13 January 2014 5-Eyes Spy G8-G20 (duplicate) 4*

Anonymous/
New York Times
18
27 January 2014 NSA Smartphones Analysis 14
27 January 2014 GCHQ Mobile Theme 4

NBC News 76
7 February 2014 GCHQ Cyber Attack 15
5 February 2014 GCHQ Anonymous 14
27 January 2014 GCHQ Squeaky Dolphin 47

The Intercept *45
18 February 2014 GCHQ Psychology37 Duplicates of NBC News *44
18 February 2014 NSA-GCHQ Discovery 1

 

 


 

 

Cryptome – Sliming Snowden

Sliming Snowden

 


http://www.amazon.com/gp/cdp/member-reviews/A3J1JL75Q0E4VD/ref=pdp_new_
read_full_review_link?ie=UTF8&page=1&sort_by=MostRecentReview#RSR0O1O4HLAZ3

5.0 out of 5 stars Sliming Snowden, February 9, 2014

By

John Young “Cryptome” (New York, NY)

This review is from: The Snowden Files: The Inside Story of the World’s Most Wanted Man (Vintage) (Kindle Edition)

Luke Harding wraps the Snowden story in shades of patriotism, conveying compromised journalism pretending opposition to government while seeking its approval for titillating stories of national security expose, editors redacting as commanded, airbrushing embarassments, withholding details needed to combat the global spying disease while helping spread it by self-serving like spies.

Harding self-serves his mendacious industry: valorous, vainglorious Guardian, New York Times, Washington Post, varieties of global media, headlining gravest news of NSA violations of public trust only after careful consultation with national authorities, thereby doubling public trust infidelities.

Harding embellishes protestations of resistance to government control, but does not reveal the extent of self-censorship the news outlets have engaged in: only a tiny number of Snowden documents — between .0062% (of 1.7 million by USG), and 1.7% (of 58,000 by the Guardian) — have been released, with thousands of melodramatic stories written about the near total censorship of what Snowden called his gift to the public.

Worst fault: there are no Snowden documents in the book, total censorship of credible evidence, instead only rhetorical blather composed of rewrites of news accounts and a bit of inside-the-Guardian gossip and much self-congratulation.

This is a sales brochure for the Guardian, characteristically bloviated by editor Alan Rusbridger, puffed-up with profiles of daring journalists — Ewan MacAskill, Laura Poitras, Glenn Greenwald — hyper-aroused at the unexpected Snowden windfall, dancing and laughing at their good fortune, of journalism’s, rescue for a declining industry beaten by truly courageous unjournalistic initiatives.

(Harding smears Julian Assange for his arch-enemies Guardian and New York Times, only glancingly mentions Baron Gellman’s seasoned, superior and less flamboyant reports on Snowden.)

Editors of the Guardian and the New York Times are portrayed without blemishes, valiant, brave, stalwart, while cultivating governments to participate in a mutually beneficial campaign of the illusion of risk and assurance long practiced by the press and officials at lunches and private conferences here amply admitted as if just wonderful buddies giving a hand to bollix the public.

Snowden is praised for speaking exactly like a perfect hybrid of Guardian-NY Times-lawyerly journalism and official press officers oozing concern for the public interest while relishing controversy and public attention by explaining (with ample redactions and omissions) what spies do to save nations. Pacts are set among all parties for roles to play, words to say, actions to take, increased profits and budgets to be enjoyed. Harding crows it will takes years, even decades, for the story to run, run and run some more. In synchronicity, Jill Abramson, NYTimes editor, said recently at a public gathering titled “Journalism After Snowden,” “thank god for Snowden, we want more stories, we need more stories.”

Harding has provided a tawdry romance of illusory national security journalism, sweaty and heavy breathing of adrenaline rush on airliners, breast and chest baring videoed in Hong Kong hotels for later private showings, bountiful informaton copulation in the rathole salons of London, New York, Washington, DC, and Rio de Janeiro.

With books, videos, films, TV, news cascading endless Snowden gush, no wonder billionaire Omidyar leaped to fund a $250 million bordello to service this natsec investment adventure with exciting jaunts to Rio to sit at the feet of Marquis de Greenwald (amidst leg-humping dogs) for instructions in the sexiest of journalism following the slimy Internet pornography industry.

Maryland Lawmakers Push to Cut Water, Electricity to NSA Spy Agency Headquarters

NSA nerve center in Fort Meade targeted by bill.

This undated photo provided by the National Security Agency (NSA) shows its headquarters in Fort Meade, Maryland. The NSA has been secretly collecting the phone call records of millions of Americans, using data provided by telecom firms AT&T, Verizon and BellSouth, the newspaper USA Today reported on May 11, 2006. The National Security Agency is based in Fort Meade, Md., and is currently building a new computer center there that will be cooled with recycled wastewater from Howard County, Md.

By פבר. 10, 2014 86 Comments SHARE

The National Security Agency’s headquarters in Ft. Meade, Md., will go dark if a cohort of Maryland lawmakers has its way.

Eight Republicans in the 141-member Maryland House of Delegates introduced legislation Thursday that would deny the electronic spy agency “material support, participation or assistance in any form” from the state, its political subdivisions or companies with state contracts.

The bill would deprive NSA facilities water and electricity carried over public utilities, ban the use of NSA-derived evidence in state courts and prevent state universities from partnering with the NSA on research.

[BROWSE: Editorial Cartoons About NSA Surveillance]

State or local officials ignoring the NSA sanctions would be fired, local governments refusing to comply would lose state grant funds and companies would be forever barred from state contracts.

The bill was filed as emergency legislation and requires support of three-fifths of delegates to pass. It was referred to the chamber’s judiciary committee.

NSA facilities in Maryland use a massive amount of water and electricity, the supply of which might be jeopardized by the legislation.

[RELATED: California Legislators Propose Bill to Banish NSA]

The agency signed a contract with Howard County, Md., for water to cool a computer center under construction at Fort Meade, The Washington Post reported Jan. 2. The deal reportedly involves up to 5 million gallons of water a day for nearly $2 million a year. As of 2006 the agency headquarters purchased as much electricity from Baltimore Gas & Electric as the city of Annapolis, The Baltimore Sun reported.

The proposal is the latest in a series of state bills aiming to cut off the NSA one jurisdiction at a time for allegedly ignoring the Fourth Amendment with its dragnet collection of phone and Internet records.

The legislative wave is spearheaded by the Tenth Amendment Center, which along with the Bill of Rights Defense Committee launched the OffNow coalition last year seeking to cut off water to the NSA’s just-built Utah Data Center.

[READ: Rand Paul’s NSA Lawsuit May Be Heard Alongside Klayman’s]

Legislation hasn’t yet been introduced in Utah, but lawmakers in Arizona, California, Tennessee, Washington and other states have filed bills based on model legislation from the Tenth Amendment Center.

Several of those bills were introduced with bipartisan sponsorship. The Arizona bill has been the most successful to date, winning 4-2 approval by the state Senate Government and Environment Committee on Feb. 3.

 

Exposed – Jean-Jacques Quisquater on Alleged NSA-GCHQ Hack

Jean-Jacques Quisquater on Alleged NSA-GCHQ Hack

Thanks to Jean-Jacques Quisquater.

 


Comments about “NSA-GCHQ Allegedly Hack Cryptographer Quisquater”

More info written by Jean-Jacques Quisquater.

This text was updated on February 6, 2014 in the afternoon (Belgian time).

Since February 1st 2014 many papers appeared in the newspapers and on internet concerning  the hack of the personal portable computer of Jean-Jacques Quisquater (JJQ). See

http://www.pcworld.com/article/2093700/prominent-cryptographer-victim-of-malware-attack-related-to-belgacom-breach.html
http://www.theregister.co.uk/2014/02/03/nsa_gchq_accused_of_hacking_belgian_smartcard_crypto_guru/
http://yro.slashdot.org/story/14/02/03/1239223/crypto-legend-quisquater-targeted—but-nsa-may-not-be-to-blame

Unfortunately many of these papers suffer from approximations and extrapolations and some of them are wrong.

The following text is intended to clarify the context of the attack as much as possible as the investigations are not complete at this stage.

In short:

-Facts: Yes, this portable computer was attacked. We don’t know for sure the vector of the attack in use. According to the Belgian Federal Police the attack of this computer is strongly related to the attack of Belgacom in Belgium allegedly hacked by NSA-GCHQ.

The only found vector of attack is related to an email spoofing a linkedin email mentioning a name close to a name known by JJQ. From this email, JJQ opened a link  to a profile of the mentioned person and JJQ immediately understood it was a spoof and closed his computer in one second. The computer was later extensively scanned by several malware detectors without result. Possibly another vector of attack was used but there is no trace of it.

-Data available on the computer: There was no sensible data on the computer. The main part of  the JJQ’s work is the design of (formal) methods related to cryptography and computer security and this activity is twofold:

   – Methods related to the academic world finally anyway published in conferences, journals, patents and standards. Privacy concerning reviews of scientific papers is important to write these reviews without external pressure, the content is nevertheless not critical.   – Activities related to sensible data of companies always follow a very strict procedure which lead to a very strong level of security
(the use of safes, only in company rooms, dedicated computers without connection, destruction of all the data at the end of the study). Therefore no sensible information related to companies is available on this personal computer.

Companies are only using the practical ideas of JJQ in the spirit of the main principle of Kerckhoffs (« only the key is secret ») and
of Shannon (« The enemy knows the system »).

-The purpose of the attack:  we don’t know. Maybe the cryptography research is under surveillance, maybe some people hope to find some interesting information or contact, maybe there is another goal we will never know.

More precisely:

– September 16, 2013: the Belgian newspaper De Standard announced an attack of Belgacom (main communication operator in Belgium) by the NSA (links in Dutch):

http://www.standaard.be/cnt/dmf20130915_00743233
http://www.standaard.be/cnt/dmf20130916_00743534

– September 16, 2013 (same day in the afternoon): Jean-Jacques Quisquater received an email spoofing a linkedin email,
opened a link to a profile of somebody he was thinking he knows, saw immediately it was a spoof and closed in one second
his computer. The computer was strongly scanned by several malware detectors without result.

JJQ comments: It is not sure that this attack was working and is related to the main attack against the computer but the dates are matching. Other people were also attacked in Belgium. We don’t know the vector of the “winning” attack (phishing, injection packet
through Quantum Insert, … ?).

– September 20, 2013: Der Spiegel announced an attack of Belgacom by GCHQ using tools from NSA, from the files of Snowden: see

http://www.spiegel.de/international/europe/british-spy-agency-gchq-hacked-belgian-telecoms-firm-a-923406.html

– November 8, 2013: the Federal Police contacted JJQ to discuss with him.

– November 12, 2013: meeting with people from the Federal Police. They announced that the computer was strongly attacked by a targeted attack (it means an attack where there is only one target: it is nearly impossible to detect it). The attack was directly related to the Belgacom attack. The used malware is very clever, very difficult to detect, impossible to remove using currently available antivirus. In fact the malware was only active when outside the personal home. The communications between the malware in the computer and the servers at Belgacom are encrypted: so only metadata are possibly usable for the investigations. It is thus also impossible that any large content from the computer was communicated. No confidential information (commercial or not) was on this computer.

– December 2, 2013: The attack was confirmed and is still under investigation. Later it was learnt that the malware is likely a variant of the malware miniduke:

https://www.securelist.com/en/blog/208194129The_MiniDuke_Mystery_PDF_0_day_Government_Spy_Assembler_Micro_Backdoor

This version of the malware is not detected by any currently available antivirus.

– January 28, 2014: A journalist from De Standaard (Belgian newspapers) contacted JJQ in order to have a meeting because somebody spoke to the journalist about an hacked well-known Belgian cryptographer speaking French (clearly JJQ). This hacking was presented as directly related to the hacking of Belgacom.

– January 30, 2014: During the meeting the journalists announced that De Standaard will publish a paper about this story on next Saturday.

– Saturday February 1st, 2014: Publication of their story by De Standaard: http://www.standaard.be/cnt/dmf20140201_011 (translation in English) and the buzz began. JJQ then answered questions from the Belgian TVs RTBF and RTL.

There are also a lot of information about targeted attacks in:

http://www.symantec.com/security_response/publications/threatreport.jsp

Also read this paper from RAID 2012 (the research conference about intrusions):

http://link.springer.com/chapter/10.1007%2F978-3-642-33338-5_4

 


 


 

The National Security Archive – U.S. Satellite Imagery

The use of overhead platforms to observe events on the earth can be traced to the French Revolution, when France organized a company of aerostiers, or balloonists, in April 1794. The United States employed balloons during the Civil War, although little intelligence of value was obtained. In January 1911, the San Diego waterfront became the first target of cameras carried aboard an airplane. Later that year the U.S. Army Signal Corps put aerial photography into the curriculum at its flight training school. Between 1913 and 1915 visual and photographic reconnaissance missions were flown by the U.S. Army in the Philippines and along the Mexican border.1

During World War II the United States made extensive use of airplane photography using remodeled bombers. After the war, with the emergence of a hostile relationship with the Soviet Union, the United States began conducting photographic missions along the Soviet periphery. The aircraft cameras, however, could only capture images of territory within a few miles of the flight path.

On some missions aircraft actually flew into Soviet airspace, but even those missions did not provide the necessary coverage of the vast Soviet interior. As a result, beginning in the early 1950s the United States began seriously exploring more advanced methods for obtaining images of targets throughout the Soviet Union. The result was the development, production, and employment of a variety of spacecraft and aircraft (particularly the U-2 and A-12/SR-71) that permitted the U.S. intelligence community to closely monitor developments in the Soviet Union and other nations through overhead imagery.

The capabilities of spacecraft and aircraft have evolved from being limited to black-and-white visible-light photography to being able to produce images using different parts of the electromagnetic spectrum. As a result, imagery can often be obtained under circumstances (darkness, cloud cover) where standard visible-light photography is not feasible. In addition, employment of different portions of the electromagnetic spectrum, individually or simultaneously, expands the information that can be produced concerning a target.

Photographic equipment can be film-based or electro-optical. A conventional camera captures a scene on film by recording the varying light levels reflected from all of the separate objects in the scene. In contrast, an electro-optical camera converts the varying light levels into electrical signals. A numerical value is assigned to each of the signals, which are called picture elements, or pixels. At a ground receiving station, a picture can then be constructed from the digital signal transmitted from the spacecraft (often via a relay satellite).2

In addition to the visible-light portion of the electro-magnetic spectrum, the near-infrared portion of the spectrum, which is invisible to the human eye, can be employed to produce images. At the same time, near-infrared, like, visible-light imagery, depends on objects reflecting solar radiation rather than on their emission of radiation. As a result, such imagery can only be produced in daylight and in the absence of substantial cloud cover.3

Thermal infrared imagery, obtained from the mid- and far-infrared portions of the electromagnetic spectrum, provides imagery purely by detecting the heat emitted by objects. Thus, a thermal infrared system can detect buried structures, such as missile silos or underground construction, as a result of the heat they generate. Since thermal infrared imagery does not require visible light, it can be obtained under conditions of darkness–if the sky is free of cloud cover.4

Imagery can be obtained during day or night in the presence of cloud cover by employing an imaging radar (an acronym for radio detection and ranging). Radar imagery is produced by bouncing radio waves off an area or an object and using the reflected returns to produce an image of the target. Since radio waves are not attenuated by the water vapor in the atmosphere, they are able to penetrate cloud cover.5

However imagery is obtained, it requires processing and interpretation to convert it into intelligence data. Computers can be employed to improve the quantity and quality of the information extracted. Obviously, digital electro-optical imagery arrives in a form that facilitates such operations. But even analog imagery obtained by a conventional camera can be converted into digital signals. In any case, a computer disassembles a picture into millions of electronic Morse code pulses and then uses mathematical formulas to manipulate the color contrast and intensity of each spot. Each image can be reassembled in various ways to highlight special features and objects that were hidden in the original image.6

Such processing allows:

  • building multicolored single images out of several pictures taken in different bands of the spectrum;
  • making the patterns more obvious;
  • restoring the shapes of objects by adjusting for the angle of view and lens distortion;
  • changing the amount of contrast between objects and backgrounds;
  • sharpening out-of-focus images;
  • restoring ground details largely obscured by clouds;
  • conducting electronic optical subtraction, in which earlier pictures are subtracted from later ones, making unchanged buildings in a scene disappear while new objects, such as missile silos under construction, remain;
  • enhancing shadows; and
  • suppressing glint.7

Such processing plays a crucial role in easing the burden on photogrammetrists and imagery interpreters. Photogrammetrists are responsible for determining the size and dimensions of objects from overhead photographs, using, along with other data, the shadows cast by the objects. Photo interpreters are trained to provide information about the nature of the objects in the photographs–based on information as to what type of crates carry MiG-29s, for instance, or what an IRBM site or fiber optics factory looks like from 150 miles in space.


Click on any of the following images to view a larger version of the photo.

CORONA, ARGON, and LANYARD

In its May 2, 1946 report, Preliminary Design for an Experimental World Circling Spaceship, the Douglas Aircraft Corporation examined the potential value of satellites for scientific and military purposes. Possible military uses included missile guidance, weapons delivery, weather reconnaissance, communications, attack assessment, and “observation.”8

A little less than nine years later, on March 16, 1955, the Air Force issued General Operational Requirement No. 80, officially establishing a high-level requirement for an advanced reconnaissance satellite. The document defined the Air Force objective to be the provision of continuous surveillance of “preselected areas of the earth” in order “to determine the status of a potential enemy’s warmaking capability.”9

Over the next five years the U.S. reconnaissance satellite program evolved in a variety of ways. The success of the Soviet Union’s Sputnik I and II satellites in the fall of 1957 provided a spur to all U.S. space programs – as any success could be used in the propaganda war with the Soviet Union. In the case of U.S. reconnaissance programs, Sputnik provided a second incentive. The clear implications of the Sputnik launches for Soviet ICBM development increased the pressure on discovering the extent of Soviet capabilities – something that the sporadic U-2 flights could only do in a limited fashion.10

The Air Force program was first designated the Advanced Reconnaissance System (ARS), then SENTRY, and finally SAMOS. Management responsibility for SAMOS was transferred from the Air Force to the Advanced Research Projects Agency (ARPA), established on February 7, 1958, and then back to the Air Force in late 1959.11

Concern about the the length of time it would take to achieve the primary objective of the SAMOS program – a satellite that could scan its exposed film and return the imagery electronically – led to President Dwight Eisenhower’s approval, also on February 7, 1958, of a CIA program to develop a reconnaissance satellite. The CIA program, designated CORONA, focused on development of a satellite that would physically return its images in a canister – an objective which had been a subsidiary portion of the SAMOS program.12

While all the various versions of the SAMOS program would be canceled in the early 1960s, CORONA would become a mainstay of the U.S. space reconnaissance program for over a decade. It would take over a year, starting in 1959, and 14 launches before an operational CORONA spacecraft was placed in orbit. Nine of the first twelve launches carried a camera that was intended to photograph areas of the Soviet Union and other nations. All the flights ended in failure for one reason or another. The thirteenth mission, a diagnostic flight without camera equipment, was the first success – in that a canister was returned from space and recovered at sea.13

Then on August 18, a CORONA was placed into orbit, orbited  the Earth for a day, and returned its canister to earth, where it was snatched out the air by a specially equipped aircraft on August 19. The camera carried on that flight would be retroactively designated the KH-1 (KH for KEYHOLE) and was cable of producing images with resolution in the area of 25-40 feet – a far cry from what would be standard in only a few years. It did yield, however, more images of the Soviet Union in its single day of operation than did the entire U-2 program.14

The next successful CORONA mission would be conducted on December 7, 1960. This time a more advanced camera system, the KH-2, would be on board. From that time, through the end of the CORONA program in 1972, there would be a succession of new camera systems – the KH-3, KH-4, KH-4A, and KH-4B – which produced higher-resolution images than their predecessors, ultimately resulting in a system that could yield images with approximately 5-6′ resolution. In addition, two smaller programs – ARGON (for mapping) and LANYARD (motivated by a specific target in the Soviet Union) – operated during the years 1962-1964 and 1963 respectively. All together there were 145 missions, which yielded over 800,000 images of the Soviet Union and other areas of the world.15

Those images dramatically improved U.S. knowledge of Soviet and other nations capabilities and activities. Perhaps its major accomplishment occurred within 18 months of the first successful CORONA mission. Accumulated photography allowed the U.S. intelligence community to dispel the fear of missile gap, with earlier estimates of a Soviet ICBM force numbering in the hundreds by mid-1962 becoming, in September 1961, an estimate of between 25 and 50. By June 1964 CORONA satellites had photographed all 25 Soviet ICBM complexes. CORONA imagery also allowed the U.S. to catalog Soviet air defense and anti-ballistic missile sites, nuclear weapons related facilities, submarine bases, IRBM sites, airbases – as well as Chinese, East European, and other nations military facilities. It also allowed assessment of military conflicts – such as the 1967 Six-Day War – and monitoring of Soviet arms control compliance.16

In February 1995, President Clinton signed an executive order that declassified those images. 17


[Source: CIA/National Reconnaissance Office]

A KH-4A image of Dolon airfield, which was a major Soviet  long-range aviation facility located in what is now the  Republic of Kazakhstan. The image shows two regiments of  Tupolev (Tu-16) Bear bombers. The main runway is 13,200 feet  long.

The KH-4A camera system was first introduced in August 1963. Resolution ranged from 9 to 25 feet.

[Source: CIA/National Reconnaissance Office]

A KH-4B image of the Moscow, with an insert of the Kremlin. In the enlargement of the Kremlin, individual vehicles can be identified as trucks or cars, and the line of people waiting to enter Lenin’s Tomb in Red Square can be seen. According to the CIA, the photograph “illustrates some of the best resolution imagery acquired by the KH-4B  camera system.”

The KH-4B was first introduced in September 1967 and generally produced images with 6 foot resolution.

[Source: CIA/National Reconnaissance Office via Federation of American Scientists]

A KH-4B of image, taken on February 11, 1969 of a Taiwanese nuclear facility. The United States intelligence community, relying on CORONA and other forms of intelligence, has closely monitored the nuclear facilities of both adversaries such as the Soviet Union and the PRC and those of friendly nations such as Taiwan and Israel.

The Next Generations

The primary objective of the CORONA program was to provide “area surveillance” coverage of the Soviet Union, China and other parts of the world. Thus, CORONA yielded single photographs which  covered thousands of square miles of territory – allowing analysts to both examine images of known targets and to search for previously undetected installations or activities that would be of interest to the U.S. intelligence community.

The GAMBIT program provided an important complement to CORONA. Initiated in 1960, it yielded the first “close-look” or “spotting” satellite. The emphasis of GAMBIT operations, which commenced in 1963 and continued through part of 1984, was to produce high-resolution imagery on specific targets (rather than general areas). Such resolution would allow the production of more detailed intelligence, particularly technical intelligence on foreign weapons systems. The first GAMBIT camera, the KH-7, could produce photos with about 18 inch resolution, while the second and last model, the KH-8 was capable of producing photographs with under 6 inch resolution.18

While the Air Force concentrated on the high-resolution systems, the CIA (after numerous bureaucratic battles) was assigned responsibility for the next generation area surveillance program. That program, which came to be designated HEXAGON, resulted in satellites carrying the KH-9 camera system – capable of producing images covering even more territory than the CORONA satellites, with a resolution of 1-2 feet. Eighteen HEXAGON satellites would be launched into orbit between 1971 and 1984, when the program terminated.19

In late 1976, a new capability was added when the satellite carrying the KH-11 optical system was placed into orbit. Unlike its predecessors, the KH-11, also known by the program code names KENNAN and CRYSTAL, did not return film canisters to be recovered and interpreted. Rather, the light captured by its optical system was transformed into electronic signals and relayed (through a relay satellite in a higher orbit) back to a ground station, where the signals were recorded on tape and converted into an image. As a result, the U.S. could obtain satellite images of a site or activity virtually simultaneously with a satellite passing overhead.20

The 1980s saw a number of inadvertent or unauthorized disclosures of U.S. satellite imagery. In 1980, as a result of the fiasco at Desert One, where U.S. forces landed in preparation for an attempt to rescue U.S. hostages held in Iran, KH-11 imagery of possible evacuation sites in Tehran was left behind. In 1981, Aviation Week & Space Technology published a leaked (and degraded) KH-11 photo of a Soviet bomber at Ramenskoye Airfield.

In 1984, two images of Soviet aircraft, taken by a KH-8 or KH-9 satellite, were inadvertently published in Congressional hearings. That same year, an employee of the Naval Intelligence Support Center provided Jane’s Defence Weekly with several images taken by a KH-11 satellite of a Soviet naval shipbuilding facility.21


[KH-11 Photograph]

This 1984 computer enhanced KH-11 photo, taken at an  oblique angle was leaked, along with two others, to Jane’s  Defence Weekly by naval intelligence analyst, Samuel Loring  Morison. The image shows the general layout of the Nikolaiev  444 shipyard in the Black Sea. Under construction is a Kiev- class aircraft carrier (shown in the left side of the photo),  then known as the Kharkov, along with an amphibious landing  ship.
Morison was brought to trial, convicted, and sent to prison in a controversial case.

[MiG-29] [SU-27]

These satellite photographs, showing a MiG-29 FULCRUM and SU- 27 FLANKER, were shown to the House Appropriations Committee during 1984 budget hearings. They were then published,  apparently by mistake, in the sanitized version of the  hearings released to the public. During the 1985 trial of  Samuel Loring Morison, government prosecutors would  acknowledge the photographs were satellite images, produced by  a system other than the KH-11.

Current Systems

The United States is presently operating at least two satellite imaging systems. One is an advanced version of the KH-11, three of which have been launched, the first in 1992.

The advanced KH-11 satellites have a higher orbit than that exhibited by their predecessors–operating with perigees of about 150 miles and apogees of about 600 miles. In addition, they also have some additional capabilities. They contain an infrared imagery capability, including a thermal infrared imagery capability, thus permitting imagery during darkness. In addition, the satellites carry the Improved CRYSTAL Metric System (ICMS), which places the necessary markings on returned imagery to permit its full exploitation for mapping purposes. Additionally, the Advanced KH-11 can carry more fuel than the original model, perhaps 10,000 to 15,000 pounds. This permits a longer lifetime for the new model–possibly up to eight years.22

A second component of the U.S. space imaging fleet, are satellites developed and deployed under a program first known as INDIGO, then as LACROSSE, and most recently as VEGA. Rather than employing an electro-optical system they carry an imaging radar.  The satellites closed a major gap in U.S. capabilities by allowing the U.S. intelligence community to obtain imagery even when targets are covered by clouds.23

The first VEGA was launched on December 2, 1988 from the space shuttle orbiter Atlantis (and deorbited in July 1997). A second was orbited in March 1991, from Vandenberg AFB on a Titan IV, and a third in October 1997. The satellites have operated in orbits of approximately 400 miles and at inclinations of 57 and 68 degrees respectively.24

When conceived, the primary purpose envisioned for the satellite was monitoring Soviet and Warsaw Pact armor. Recent VEGA missions included providing imagery for bomb damage assessments of the consequences of Navy Tomahawk missile attacks on Iraqi air defense installations in September 1996, monitoring Iraqi weapons storage sites, and tracking Iraqi troop movements such as the dispersal of the Republican Guard when the Guard was threatened with U.S. attack in early 1998. VEGA has a resolution of 3-5 feet, with its resolution reportedly being sufficient to allow discrimination between tanks and armored personnel carriers and identification of bomb craters of 6-10 feet in diameter.25

The LACROSSE/VEGA satellite that was launched in October 1997 may be the first of a new generation of radar imagery satellites. The new generation will apparently have greater resolution, and constellation size may be increased from 2 to 3.26

[Source: Dept. of Defense]

An advanced KH-11 photograph of the Shifa Pharmaceutical Plant, Sudan. This degraded photo, of approximately 1-meter resolution, was officially released after the U.S. attack on the plant in August 1998 in retaliation for attacks on two U.S. embassies in Africa. The U.S. alleged, at least partially on the basis of soil samples, that the plant was involved in the production of chemical weapons.


[Source: Dept. of Defense]

A degraded advanced KH-11 photograph of the Zhawar Kili Base Camp (West), Afghanistan, which housed training facilities for Osama Bin Laden’s terrorist organization.

The photograph was used by Secretary of Defense William S. Cohen and General Henry H. Shelton, the Chairman of the Joint Chiefs of Staff to brief reporters on the U.S. cruise missile attack on the facility.


[Source: Dept. of Defense]

One of over twenty degraded advanced KH-11 photos,  released by the Department of Defense in December 1998 during Operation Desert Fox. The higher resolution, and classified, version of the image was used by imagery interpreters at the National Imagery and Mapping Agency to assess the damage caused by U.S. airstrikes.


[Source: Dept. of Defense]

A degraded advanced KH-11 photo of Al Sahra Airfield, Iraq, used by Vice Adm. Scott A. Fry, USN, Director, J-3 and Rear Admiral Thomas R. Wilson, USN, Joint Staff intelligence director in a Pentagon press briefing on December 18, 1998.


[Source: Dept. of Defense]

The arrows in this degraded advanced KH-11 image, used in a Pentagon press briefing on December 19, 1998, show two areas where the Secretariat Presidential was damaged due to Operation Desert Fox airstrikes.


[Source: Dept. of Defense]

Pre-strike assessment photograph of the Belgrade Army Garrison and headquarters, Serbia.


[Source: Dept. of Defense]

Post-strike damage assessment photograph of the Belgrade Army Garrison and Headquarters, Serbia, attacked during Operation Allied Force.

Commercial Imagery

The U.S. intelligence community has also used imagery, including multispectral imagery, produced by two commercial systems –LANDSAT and SPOT. The LANDSAT program began in 1969 as an experimental National Aeronautics and Space Administration (NASA) program, the Earth Resources Technology Satellite (ERTS).  Currently there are two operating LANDSAT satellites–LANDSAT 4 and LANDSAT 5–launched in 1982 and 1984.27

LANDSATs 4 and 5 operate in 420 mile sun-synchronous orbits and each carries a Thematic Mapper (TM), an upgraded version of the Multispectral Scanner (MSS) on earlier LANDSATs. A typical LANDSAT images is 111 by 102 miles, providing significant broad area coverage. However, the resolution of the images is approximately 98 feet–making them useful for only the coarsest intelligence tasks.

SPOT, an acronym for Le Systeme Pour l’Observation de la Terre, is operated by the French national space agency. SPOT 1 was launched in 1986, followed by three additional satellites at approximately four year intervals. SPOT satellites operate in about 500-mile orbits, and carry two sensor systems. The satellites can return black and white (panchromatic) images with 33 foot resolution and multispectral images with 67 foot resolution. The images are of higher-resolution than LANDSAT’s but cover less territory– approximately 36 miles by 36 miles.28

U.S. intelligence community use of commercial imagery will expand dramatically in the coming years if the new generation of commercial imaging satellites lives up to expectations–which include images with 1-meter resolution. Such imagery and the reduced cost of attaining it when purchased commercially will permit the U.S. intelligence community to fill part of its needs via such commercial systems.

Among the commercial satellites that are expected to produce high resolution imagery are the Ikonos satellites to be launched by Space Imaging Eosat (which also operates the LANDSAT satellites). The first of the satellites, scheduled to be launched in the summer of 1999 from Vandenberg AFB, is designed to generate 1-meter panchromatic and 4-meter multispectral images. A similar satellite is scheduled for launch in September 1998.29

Also promising to provide 1-meter panchromatic imagery and 4-meter multispectral imagery are the satellites to be developed by EarthWatch and Orbital Sciences. EarthWatch’s 1-meter resolution Quickbird satellite is scheduled for launch in late 1998 or 1999. Orbital Science’s OrbView-3 satellite is to be launched in 1999. It is expected to have a 3-5 year lifetime and produce images covering 5×5 mile segments with 1-meter resolution.30


[Source: Space Imaging]

An overhead photograph of Mountain View, California that that has been digitally scanned to represent the one-meter  imagery that the Ikonos satellites are expected to provide.


Notes

1. William Burrows, Deep Black: Space Espionage and National Security (New York, N.Y.: Random House, 1986), pp. 28, 32.
2. Farouk el-Baz, “EO Imaging Will Replace Film in Reconnaissance,” Defense Systems Review (October 1983): 48-52.
3. Richard D. Hudson Jr. and Jacqueline W. Hudson, “The Military Applications of Remote Sensing by Infrared,” Proceedings of the IEEE 63, 1 (1975): 104-28.
4. Ibid.; Bruce G. Blair and Garry D. Brewer, “Verifying SALT,” in William Potter (ed.), Verification and SALT: The Challenge of Strategic Deception (Boulder, Co.: Westview, 1980), pp. 7-48.
5. Homer Jensen, L.C. Graham, Leonard J. Porcello, and Emmet N. Leith, “Side-looking Airborne Radar,” Scientific American, October 1977, pp. 84-95.
6. Paul Bennett, Strategic Surveillance (Cambridge, Ma.: Union of Concerned Scientists, 1979), p. 5.
7. Richard A. Scribner, Theodore J. Ralston, and William D. Mertz, The Verification Challenge: Problems and Promise of Strategic Nuclear Arms Verification (Boston: Birkhauser, 1985), p. 70; John F. Ebersole and James C. Wyant, “Real-Time Optical Subtraction of Photographic Imagery for Difference Detection,” Applied Optics, 15, 4 (1976): 871-76.
8. Robert L. Perry, Origins of the USAF Space Program, 1945-1956 (Washington, D.C.: Air Force Systems Command, June 1962), p. 30.
9. Ibid., pp. 42-43.
10. On the impact of Sputnik, see Robert A. Divine, The Sputnik Challenge: Eisenhower’s Response to the Soviet Satellite (New York: Oxford, 1993).
11. Jeffrey T. Richelson, America’s Secret Eyes in Space: The U.S. KEYHOLE Spy Satellite Program (New York: Harper & Row, 1990), pp. 26-30.
12. Kenneth E. Greer, “Corona,” Studies in Intelligence, Supplement, 17 (Spring 1973): 1-37, reprinted in Kevin C. Ruffner (ed.), CORONA: America’s First Satellite Program (Washington, D.C.: CIA, 1995).
13. Ibid.
14. Ibid.; Robert A. McDonald, “CORONA: Success for Space Reconnaissance, A Look into the Cold War, and a Revolution in Intelligence,” Photogrammetric Engineering & Remote Sensing 61,6
(June 1995): 689-720.
15. McDonald, “CORONA: Success for Space Reconnaissance …”.
16. Robert A. McDonald, “Corona’s Imagery: A Revolution in Intelligence and Buckets of Gold for National Security,” in Robert A. McDonald (ed)., CORONA: Between the Sun and the Earth – The First NRO Reconnaissance Eye in Space (Baltimore: American Society of Photogrammetry and Remote Sensing, 1997), pp. 211-220; Greer, “CORONA”; Frank J. Madden, The CORONA Camera System, Itek’s Contribution to World Stability (Lexington, Mass.: Itek, May 1997), p. 6.
17. Executive Order 12951, Release of Imagery Acquired by Space-Based National Intelligence Reconnaissance Systems, February 24, 1995.
18. Richelson, America’s Secret Eyes in Space, pp. 77-78, 359-60.
19. Ibid., pp. 105-21, 361-62.
20. Ibid., pp. 123-143, 362.
21. Burrows, Deep Black, photo section.
22. Richelson, America’s Secret Eyes in Space, p. 231; Craig Covault, “Advanced KH-11 Broadens U.S. Recon Capability,” Aviation Week & Space Technology, January 6, 1997, pp. 24-25.
23. Bob Woodward, VEIL: The Secret Wars of the CIA, 1981-1987 (New York: Simon & Schuster, 1987), p. 221.
24. Jeffrey T. Richelson, The U.S. Intelligence Community 4th ed. (Boulder, Co.: Westview, 1999), p. 155.
25. Ibid.
26. David Fulghum and Craig Covault, “U.S. Set to Launch Upgraded Lacrosse,” Aviation Week & Space Technology September 20, 1996, p.34;
27. Bob Preston, Plowshares and Power: The Military Use of Civil Space (Washington, D.C.: NDU Press, 1994), pp. 55-56; Richelson, The U.S. Intelligence Community, p. 159.
28. Richelson, The U.S. Intelligence Community, p. 159.
29. Joseph C. Anselmo, “Space Imaging Readies 1-Meter Satellite,”
Aviation Week & Space Technology,  May 19, 1997, p. 26; “Ikonos 1 Undergoes Tests as Launch Nears,” Space News, May 11-17, 1998, p. 19; “Commercial Developments,” Aviation Week & Space Technology, June 29, 1998, p. 17.
30. Richelson, The U.S. Intelligence Community, pp. 160-61.

Unveiled – NSA Snowden Releases Tally Update – *1,098 Pages

5 February 2014. Add 14 pages NBC News. Tally now *1,098 pages of The Guardian first reported 58,000 files; caveat: Janine Gibson, The Guardian NY, said on 30 January 2014 “much more than 58,000 files in first part, two more parts” (no numbers) (tally now less than ~1.8%). DoD claims 1,700,000 files (~.0062% of that released).

31 January 2014. Add 27 pages to CBC News.

27 January 2014. Add 47 pages to NBC News.

27 January 2014. Add 18 pages to Anonymous via New York Times.

16 January 2014. Add 8 pages to The Guardian.

* 14 January 2014. Add 21 pages to Information.dk (duplicate).

* 13 January 2014. Add 4 pages to Information.dk (duplicate).

Related Snowden Document and Page Count Assessment:

http://cryptome.org/2014/01/snowden-count.htm

* 5 January 2014. Add 16 pages to Der Spiegel (30 December 2013. No source given for NSA docs). Tally now *962 pages (~1.7%) of reported 58,000. NSA head claims 200,000 (~.50% of that released).

4 January 2014. The source was not identified for *133 pages published by Der Spiegel and Jacob Appelbaum in late December 2013. They are included here but have not been confirmed as provided by Edward Snowden. Thanks to post by Techdirt.

Glenn Greenwald tweeted:

Glenn Greenwald @ggreenwald, 8:05 AM – 29 Dec 13

@Cryptomeorg @ioerror I had no involvement in that Spiegel article, ask them – and they don’t say those are Snowden docs.

Matt Blaze tweeted, 11:24 AM – 2 Jan 14

matt blaze @mattblaze

If there are other sources besides Snowden, I hope journalists getting docs are careful to authenticate them (& disclose uncertainty).

3 January 2014. Add 13 pages to Washington Post.

3 January 2014. See also EFF, ACLU and LeakSource accounts:

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013

http://leaksource.wordpress.com/

2 January 2014. Add 1 page to Washington Post published 10 July 2013.

* 31 December 2013. Add 16 pages to Der Spiegel.

* 30 December 2013. Add 50 pages of NSA ANT Catalog by Jacob Appelbaum (no source given for NSA docs).

* 30 December 2013. Add 21 pages from 30C3 video by Jacob Appelbaum (no source given for NSA docs).

* 30 December 2013. Add 42 pages (8 duplicates) to Der Spiegel (no source given for NSA docs).

* 29 December 2013. Add 4 pages to Der Spiegel (no source given for NSA docs).

24 December 2013. Add 2 pages to Washington Post.

23 December 2013

http://www.adn.com/2013/12/22/3243451/pincus-snowden-still-has-a-road.html

We’ve yet to see the full impact of former National Security Agency contractor Edward Snowden’s unauthorized downloading of highly classified intelligence documents.

Among the roughly 1.7 million documents he walked away with — the vast majority of which have not been made public — are highly sensitive, specific intelligence reports, as well as current and historic requirements the White House has given the agency to guide its collection activities, according to a senior government official with knowledge of the situation.

The latter category involves about 2,000 unique taskings that can run to 20 pages each and give reasons for selective targeting to NSA collectors and analysts. These orders alone may run 31,500 pages.

13 December 2013. Add 26 pages to Trojkan (SVT). Tally now 797 pages (~1.4%) of reported 58,000. NSA head claims 200,000 (~.40% of that released). Australia press reports “up to 20,000 Aussie files.”

Rate of release over 6 months, 132.8 pages per month, equals 436 months to release 58,000, or 36.3 years. Thus the period of release has decreased in the past month from 42 years.

12 December 2013. Belatedly add 27 pages to Guardian and 18 pages to Washington Post.

21 November 2013. See also EFF and ACLU accounts:

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013

3 November 2013

47 42 Years to Release Snowden Documents

Out of reported 50,000 pages (or files, not clear which), about 446 514 pages (>1% 1%) have been released over 5 months beginning June 5, 2012. At this rate, 89 100 pages per month, it will take 47 42 years for full release. Snowden will be 77 72 years old, his reporters hoarding secrets all dead.

NY Times, 3 November 2013:

Whatever reforms may come, Bobby R. Inman, who weathered his own turbulent period as N.S.A. director from 1977 to 1981, offers his hyper-secret former agency a radical suggestion for right now. “My advice would be to take everything you think Snowden has and get it out yourself,” he said. “It would certainly be a shock to the agency. But bad news doesn’t get better with age. The sooner they get it out and put it behind them, the faster they can begin to rebuild.”

Outlet Pages
The Guardian 273
Washington Post 216
Der Spiegel * 97
O Globo Fantastico ~87
New York Times
Anonymous 118 (82 joint)
18
ProPublica 89 (82 joint)
Le Monde 20
Dagbladet 13
NRC Handelsblad 4
Huffington Post 3
CBC 36
The Globe and Mail 18
SVT 2
L’Espresso 3
Trojkan (SVT) 29
Jacob Appelbaum * 71
Information.dk 22*
Anonymous/New York Times 18
NBC News 61

Timeline of releases:

5 February 2014. Add 14 pages NBC News.

31 January 2014. Add 27 pages CBC News.

27 January 2014. Add 47 pages to NBC News.

27 January 2014. Add 18 pages to Anonymous.

16 January 2014. Add 8 pages to The Guardian.

* 14 January 2014. Add 21 pages to Information.dk (duplicate).

* 13 January 2014. Add 4 pages to Information.dk (duplicate).

3 January 2014. Add 13 pages to Washington Post.

2 January 2014. Add 1 page to Washington Post published 10 July 2013.

* 31 December 2013. Add 16 pages to Der Spiegel.

* 30 Decebmer 2013. Add 50 pages of NSA ANT Catalog by Jacob Appelbaum.

* 30 December 2013. Add 21 pages from 30C3 video by Jacob Appelbaum.

* 30 December 2013. Add 16 pages to Der Spiegel.

* 30 December 2013. Add 42 pages to Der Spiegel.

* 29 December 2013. Add 4 pages to Der Spiegel.

24 December 2013. Add 2 pages to Washington Post.

13 December 2013. Add 26 pages to Trojkan (SVT).

12 December 2013. Belatedly add 27 pages to Guardian and 18 pages to Washington Post.

11 December 2013. Belatedly add 25 pages to Guardian.

11 December 2013. Belatedly add 74 pages to Washington Post.

10 December 2013. Add 2 pages to CBC.

10 December 2013. Add 4 pages to CBC (duplicate of previous source).

9 December 2013. Add 3 pages to Trojkan. Add 2 pages to Guardian. Add 82 pages to New York Times and ProPublica (joint).

6 December 2013. Add 3 pages to L’Espresso.

5 December 2013. Add 2 pages to SVT (Swedish TV).

5 December 2013. Add 1 page to Washington Post.

4 December 2013. Add 3 pages to Washington Post.

2 December 2013. Add 3 pages to CBC.

30 November 2013. Add 18 pages to The Globe and Mail.

30 November 2013. Add 3 pages to NRC Handelsblad.

29 November 2013. Add 1 page to CBC.

27 November 2013. Add 3 pages to Huffington Post.

26 November 2013. Add 4 pages to Washington Post.

23 November 2013. Add 1 page to NRC Handelsblad.

23 November 2013. Add 5 pages to New York Times.

22 November 2013. Add 10 pages to Dagbladet.

18 November 2013. Add 6 pages to The Guardian.

17 November 2013. Add two images to Der Spiegel.

4 November 2013. Add 14 pages to Washington Post.

3 November 2013. A reports an additional 54 slides for O Globo Petrobas.

3 November 2013. Add 22 pages to New York Times.

2 November 2013. Add 13 pages to Guardian, 11 are duplicates.

31 October 2013. Add 4 pages to Washington Post.

29 October 2013. Add 3 pages to Der Spiegel

27 October 2013. Add 2 pages to Der Spiegel.

25 October 2013. Add 4 pages to Le Monde.

22 October 2013. Add 5 pages to Le Monde.

21 October 2013. Add 11 pages to Le Monde, 8 are duplicates.

20 October 2013. Add 1 page to Der Spiegel.

13 October 2013. Add 4, 7 and 9 pages to Washington Post.

8 October 2013. Add 7 pages to O Globo: CSE spying on Brazilian ministry, reported 7 October 2013.

6 October 2013. Add Snowden pages published by Washington Post, Der Spiegel, O Globo Fantastico, New York Times, ProPublica. Some are duplicates(*).

5 October 2013

26 Years to Release Snowden Docs by The Guardian

Out of reported 15,000 pages, The Guardian has published 192 pages in fourteen releases over four months, an average of 48 pages per month, or 1.28% of the total. At this rate it will take 26 years for full release.

Edward Snowden will be 56 years old.
Glenn Greenwald will be 72.
Laura Poitras will be 75.
Alan Rusbridger will be 86.
Barton Gellman will be 78.
Julian Assange will be 68.
Chelsea Manning will be 52.
Keith Alexander will be 88.
Barack Obama will be 78.
Daniel Ellsberg will be 108.
This author will be 103.

Number Date Title Pages
The Guardian 273
21 16 January 2014 SMS Text Messages Exploit 8
20 9 December 2013 Spying on Games 2
18 18 November 2013 DSD-3G 6
19 1 November 2013 PRISM, SSO
SSO1 Slide
SSO2 Slide 13*
18 4 October 2013 Types of IAT Tor 9
17 4 October 2013 Egotistical Giraffe 20*
16 4 October 2013 Tor Stinks 23
15 11 September 2013 NSA-Israel Spy 5
14 5 September 2013 BULLRUN 6*
13 5 September 2013 SIGINT Enabling 3*
12 5 September 2013 NSA classification guide 3
11 31 July 2013 XKeyscore 32
10 27 June 2013 DoJ Memo on NSA 16
9 27 June 2013 Stellar Wind 51
8 21 June 2013 FISA Certification 25
7 20 June 2013 Minimization Exhibit A 9
6 20 June 2013 Minimization Exhibit B 9
5 16 June 2013 GCHQ G-20 Spying 4
4 8 June 2013 Boundless Informant FAQ 3
3 8 June 2013 Boundless Informant Slides 4
2 7 June 2013 PPD-20 18
1 5 June 2013 Verizon 4
Washington Post 216
2 January 2014 Quantum Computer 2 10
2 January 2014 Quantum Computer 3
23 December 2013 NSA/CSS Mission 2
11 December 2013 Excessive Collection 9
11 December 2013 SCISSORS 2 7
11 December 2013 SCISSORS 1 4
11 December 2013 Yahoo-Google Exploit 6
11 December 2013 Cable Spying Types 7
11 December 2013 WINDSTOP 1
11 December 2013 Co-Traveler 24
11 December 2013 GSM Tracking 2
11 December 2013 SIGINT Successes 4
11 December 2013 GHOSTMACHINE 4
5 December 2013 Target Location 1
4 December 2013 FASCIA 2
4 December 2013 CHALKFUN 1
26 November 2013 Microsoft a Target? 4
4 November 2013 WINDSTOP, SSO, Yahoo-Google 14
30 October 2013 MUSCULAR-INCENSOR Google and Yahoo 4
14 October 2013 SSO Overview 4
14 October 2013 SSO Slides 7
14 October 2013 SSO Content Slides 9
4 October 2013 Tor 49
4 October 2013 EgotisticalGiraffe 20*
4 October 2013 GCHQ MULLENIZE 2
4 October 2013 Roger Dingledine 2
30 August 2013 Budget 17
10 July 2013 PRISM Slide 1
29 June 2013 PRISM 8
20 June 2013 Warrantless Surveillance 25*
7 June 2013 PPD-20 18*
6 June 2013 PRISM 1
Der Spiegel * 97
31 December 2013 QFIRE * 16
30 December 2013 TAO Introduction * 16
30 Deceber 2013 QUANTUM Tasking (8 duplicates of QUANTUMTHEORY) 28*
30 December 2013 QUANTUMTHEORY 14
29 December 2013 TAO ANT COTTONMOUTH (images)
TAO ANT COTTONMOUTH (DE article) 4
17 November 2013 ROYAL CONCIERGE (DE)

ROYAL CONCIERGE (EN)
2
29 October 2013 NSA-CIA SCS 3
27 October 2013 NSA-CIA SCS 2
20 October 2013 Mexico President 1
20 September 2013 Belgacom 3
16 September 2013 SWIFT 3
9 September 2013 Smartphones 5
1 September 2013 French Foreign Ministry 0
31 August 2013 Al Jazeera 0
O Globo Fantastico ~87
7 October 2013 CSE Brazil Ministry 7
8 September 2013 Petrobas ~60
3 September 2013 Brazil and Mexico 20
New York Times 118
9 December 2013 Spying on Games 82*
23 November 2013 SIGINT Strategy 2012-2016 5
3 November 2013 SIGINT Mission 2013

SIGINT Mission 2017
22
28 September 2013 Contact Chaining Social Networks 1
28 September 2013 SYANPSE 1
5 September 2013 BULLRUN 4*
5 September 2013 SIGINT Enabling 3*
ProPublica 89
9 December 2013 Spying on Games 82*
5 September 2013 BULLRUN 4*
5 September 2103 SIGINT Enabling 3*
Le Monde 20
25 October 2013 NSA Hosts FR Spies 4
22 October 2013 Wanadoo-Alcatel 1
22 October 2013 Close Access Sigads 2
22 October 2013 Boundless Informant 2
22 October 2013 PRISM 11
Dagbladet 13
19 November 2013 BOUNDLESSINFORMANT 13
NRC Handelsblad 4
30 November 2013 Dutch SIGINT 3
23 November 2013 SIGINT Cryptologic Platform 1
Huffington Post 3
27 November 2013 Muslim Porn Viewing 3
CBC 36
30 January 2014 CESC IP Profiling 27
10 December 2013 NSA-CSEC Partnership 1
10 December 2013 G8-G20 Spying 4*
2 December 2013 G8-G20 Spying 3
29 November 2013 G8-G20 Spying 1
The Globe and Mail 18
30 November 2013 CSEC Brazil Spying 18*
SVT (Swedsh TV) 2
5 December 2013 Sweden Spied Russia for NSA 2
L’Espresso 3
6 December 2013 NSA Spies Italy 3
Trojkan (SVT) 29
11 December 2013 NSA Sweden FRA Relationship 1*
11 December 2013 NSA 5 Eyes Partners 1
11 December 2013 NSA Sweden FRA Agenda 8
11 December 2013 NSA Sweden FRA RU Baltic 1
11 December 2013 NSA GCHQ Sweden FRA COMINT 1
11 December 2013 NSA Sweden FRA XKeyscore Plan 5
11 December 2013 NSA Sweden FRA XKeyscore Sources 1
11 December 2013 NSA Sweden FRA XKeyscore Tor et al 3
11 December 2013 NSA Sweden FRA XKeyscore Slide 1
11 December 2013 NSA Sweden FRA Quantum 1 1
11 December 2013 GCHQ Sweden FRA Quantum 1
11 December 2013 NSA Sweden FRA Quantum Accomplishments 2
9 December 2013 NSA and Sweden Pact 3*
Jacob Appelbaum * 71
30 December 2013 NSA Catalog * 50
30 December 2013 NSA Catalog Video Clips * 21
Information.dk 22*
14 January 2014 SSO (duplicate) 7*
14 January 2014 PRISM (duplicate) 11*
13 January 2014 5-Eyes Spy G8-G20 (duplicate) 4*
Anonymous/
New York Times 18
27 January 2014 NSA Smartphones Analysis 14
27 January 2014 GCHQ Mobile Theme 4
NBC News 61
5 February 2014 GCHQ Anonymous 14
27 January 2014 GCHQ Squeaky Dolphin 47

Tagesschau Video – Snowden Says US Spies Industry

http://www.tagesschau.de/ausland/snowden352.html

Interview with Edward Snowden in ARD

“USA operate industrial espionage”

In the world’s first television interview of former U.S. intelligence official Edward Snowden he has reiterated his belief that the United States spied on foreign business enterprises.

In conversation with the NDR journalist Hubert Seipel, Snowden said that he did not want to pre-empt future publications by journalists and could – in his view, but there should be no question how the United States behaved. U.S. intelligence agencies spied not only politicians and other citizens: “If there is information about Siemens that benefits the national interest of the United States, but have nothing to do with national security, they take this information anyway,” he said. Snowden has been granted initial asylum in Russia.

A few days ago an NSA spokeswoman stressed that the intelligence agencies were not involved in industrial espionage. Background to this was a report in the “New York Times” that the U.S. intelligence could implant computers with radio bugs.

Previously German politicians had called for a possible no-Spy Agreement with the United States that should also include a waiver of industrial espionage.

Snowden emphasized to ARD that he himself was no longer in possession of explosive material, but he had passed it to selected journalists and therefore to the public. He will have no influence on possible publication. The show today at 20.00 clock is a first cut from the interview. The interview was produced in collaboration with the North German broadcasting and production company Cinecentrum.

The first showing of the entire interview today of essential excerpts in the ARD interview broadcast ” Günther Jauch ” at 21.45 clock and following at 23.05 clock in full length also a first.

Unveiled – NSA Snowden Releases Tally Update – *984 Pages

* 14 January 2014. Add 21 pages to Information.dk (duplicate). Tally now *984 pages (~1.7%) of reported 58,000 files. DoD claims 1,700,000 files (~.0057% of that released).

* 13 January 2014. Add 4 pages to Information.dk (duplicate).

Related Snowden Document and Page Count Assessment:

http://cryptome.org/2014/01/snowden-count.htm

* 5 January 2014. Add 16 pages to Der Spiegel (30 December 2013. No source given for NSA docs). Tally now *962 pages (~1.7%) of reported 58,000. NSA head claims 200,000 (~.50% of that released).

4 January 2014. The source was not identified for *133 pages published by Der Spiegel and Jacob Appelbaum in late December 2013. They are included here but have not been confirmed as provided by Edward Snowden. Thanks to post by Techdirt.

Glenn Greenwald tweeted:

Glenn Greenwald @ggreenwald, 8:05 AM – 29 Dec 13

@Cryptomeorg @ioerror I had no involvement in that Spiegel article, ask them – and they don’t say those are Snowden docs.

Matt Blaze tweeted, 11:24 AM – 2 Jan 14

matt blaze @mattblaze

If there are other sources besides Snowden, I hope journalists getting docs are careful to authenticate them (& disclose uncertainty).

3 January 2014. Add 13 pages to Washington Post.

3 January 2014. See also EFF, ACLU and LeakSource accounts:

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013

http://leaksource.wordpress.com/

2 January 2014. Add 1 page to Washington Post published 10 July 2013.

* 31 December 2013. Add 16 pages to Der Spiegel.

* 30 December 2013. Add 50 pages of NSA ANT Catalog by Jacob Appelbaum (no source given for NSA docs).

* 30 December 2013. Add 21 pages from 30C3 video by Jacob Appelbaum (no source given for NSA docs).

* 30 December 2013. Add 42 pages (8 duplicates) to Der Spiegel (no source given for NSA docs).

* 29 December 2013. Add 4 pages to Der Spiegel (no source given for NSA docs).

24 December 2013. Add 2 pages to Washington Post.

23 December 2013

http://www.adn.com/2013/12/22/3243451/pincus-snowden-still-has-a-road.html

We’ve yet to see the full impact of former National Security Agency contractor Edward Snowden’s unauthorized downloading of highly classified intelligence documents.

Among the roughly 1.7 million documents he walked away with — the vast majority of which have not been made public — are highly sensitive, specific intelligence reports, as well as current and historic requirements the White House has given the agency to guide its collection activities, according to a senior government official with knowledge of the situation.

The latter category involves about 2,000 unique taskings that can run to 20 pages each and give reasons for selective targeting to NSA collectors and analysts. These orders alone may run 31,500 pages.

13 December 2013. Add 26 pages to Trojkan (SVT). Tally now 797 pages (~1.4%) of reported 58,000. NSA head claims 200,000 (~.40% of that released). Australia press reports “up to 20,000 Aussie files.”

Rate of release over 6 months, 132.8 pages per month, equals 436 months to release 58,000, or 36.3 years. Thus the period of release has decreased in the past month from 42 years.

12 December 2013. Belatedly add 27 pages to Guardian and 18 pages to Washington Post.

21 November 2013. See also EFF and ACLU accounts:

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013

3 November 2013

47 42 Years to Release Snowden Documents

Out of reported 50,000 pages (or files, not clear which), about 446 514 pages (>1% 1%) have been released over 5 months beginning June 5, 2012. At this rate, 89 100 pages per month, it will take 47 42 years for full release. Snowden will be 77 72 years old, his reporters hoarding secrets all dead.

NY Times, 3 November 2013:

Whatever reforms may come, Bobby R. Inman, who weathered his own turbulent period as N.S.A. director from 1977 to 1981, offers his hyper-secret former agency a radical suggestion for right now. “My advice would be to take everything you think Snowden has and get it out yourself,” he said. “It would certainly be a shock to the agency. But bad news doesn’t get better with age. The sooner they get it out and put it behind them, the faster they can begin to rebuild.”

Outlet Pages
The Guardian 265
Washington Post 216
Der Spiegel * 97
O Globo Fantastico ~87
New York Times 118 (82 joint)
ProPublica 89 (82 joint)
Le Monde 20
Dagbladet 13
NRC Handelsblad 4
Huffington Post 3
CBC 9
The Globe and Mail 18
SVT 2
L’Espresso 3
Trojkan (SVT) 29
Jacob Appelbaum * 71
Information.dk 22*

Timeline of releases:

* 14 January 2014. Add 21 pages to Information.dk (duplicate).

* 13 January 2014. Add 4 pages to Information.dk (duplicate).

3 January 2014. Add 13 pages to Washington Post.

2 January 2014. Add 1 page to Washington Post published 10 July 2013.

* 31 December 2013. Add 16 pages to Der Spiegel.

* 30 Decebmer 2013. Add 50 pages of NSA ANT Catalog by Jacob Appelbaum.

* 30 December 2013. Add 21 pages from 30C3 video by Jacob Appelbaum.

* 30 December 2013. Add 16 pages to Der Spiegel.

* 30 December 2013. Add 42 pages to Der Spiegel.

* 29 December 2013. Add 4 pages to Der Spiegel.

24 December 2013. Add 2 pages to Washington Post.

13 December 2013. Add 26 pages to Trojkan (SVT).

12 December 2013. Belatedly add 27 pages to Guardian and 18 pages to Washington Post.

11 December 2013. Belatedly add 25 pages to Guardian.

11 December 2013. Belatedly add 74 pages to Washington Post.

10 December 2013. Add 2 pages to CBC.

10 December 2013. Add 4 pages to CBC (duplicate of previous source).

9 December 2013. Add 3 pages to Trojkan. Add 2 pages to Guardian. Add 82 pages to New York Times and ProPublica (joint).

6 December 2013. Add 3 pages to L’Espresso.

5 December 2013. Add 2 pages to SVT (Swedish TV).

5 December 2013. Add 1 page to Washington Post.

4 December 2013. Add 3 pages to Washington Post.

2 December 2013. Add 3 pages to CBC.

30 November 2013. Add 18 pages to The Globe and Mail.

30 November 2013. Add 3 pages to NRC Handelsblad.

29 November 2013. Add 1 page to CBC.

27 November 2013. Add 3 pages to Huffington Post.

26 November 2013. Add 4 pages to Washington Post.

23 November 2013. Add 1 page to NRC Handelsblad.

23 November 2013. Add 5 pages to New York Times.

22 November 2013. Add 10 pages to Dagbladet.

18 November 2013. Add 6 pages to The Guardian.

17 November 2013. Add two images to Der Spiegel.

4 November 2013. Add 14 pages to Washington Post.

3 November 2013. A reports an additional 54 slides for O Globo Petrobas.

3 November 2013. Add 22 pages to New York Times.

2 November 2013. Add 13 pages to Guardian, 11 are duplicates.

31 October 2013. Add 4 pages to Washington Post.

29 October 2013. Add 3 pages to Der Spiegel

27 October 2013. Add 2 pages to Der Spiegel.

25 October 2013. Add 4 pages to Le Monde.

22 October 2013. Add 5 pages to Le Monde.

21 October 2013. Add 11 pages to Le Monde, 8 are duplicates.

20 October 2013. Add 1 page to Der Spiegel.

13 October 2013. Add 4, 7 and 9 pages to Washington Post.

8 October 2013. Add 7 pages to O Globo: CSE spying on Brazilian ministry, reported 7 October 2013.

6 October 2013. Add Snowden pages published by Washington Post, Der Spiegel, O Globo Fantastico, New York Times, ProPublica. Some are duplicates(*).

5 October 2013

26 Years to Release Snowden Docs by The Guardian

Out of reported 15,000 pages, The Guardian has published 192 pages in fourteen releases over four months, an average of 48 pages per month, or 1.28% of the total. At this rate it will take 26 years for full release.

Edward Snowden will be 56 years old.
Glenn Greenwald will be 72.
Laura Poitras will be 75.
Alan Rusbridger will be 86.
Barton Gellman will be 78.
Julian Assange will be 68.
Chelsea Manning will be 52.
Keith Alexander will be 88.
Barack Obama will be 78.
Daniel Ellsberg will be 108.
This author will be 103.

Number Date Title Pages
The Guardian 265
20 9 December 2013 Spying on Games 2
18 18 November 2013 DSD-3G 6
19 1 November 2013 PRISM, SSO
SSO1 Slide
SSO2 Slide 13*
18 4 October 2013 Types of IAT Tor 9
17 4 October 2013 Egotistical Giraffe 20*
16 4 October 2013 Tor Stinks 23
15 11 September 2013 NSA-Israel Spy 5
14 5 September 2013 BULLRUN 6*
13 5 September 2013 SIGINT Enabling 3*
12 5 September 2013 NSA classification guide 3
11 31 July 2013 XKeyscore 32
10 27 June 2013 DoJ Memo on NSA 16
9 27 June 2013 Stellar Wind 51
8 21 June 2013 FISA Certification 25
7 20 June 2013 Minimization Exhibit A 9
6 20 June 2013 Minimization Exhibit B 9
5 16 June 2013 GCHQ G-20 Spying 4
4 8 June 2013 Boundless Informant FAQ 3
3 8 June 2013 Boundless Informant Slides 4
2 7 June 2013 PPD-20 18
1 5 June 2013 Verizon 4
Washington Post 216
2 January 2014 Quantum Computer 2 10
2 January 2014 Quantum Computer 3
23 December 2013 NSA/CSS Mission 2
11 December 2013 Excessive Collection 9
11 December 2013 SCISSORS 2 7
11 December 2013 SCISSORS 1 4
11 December 2013 Yahoo-Google Exploit 6
11 December 2013 Cable Spying Types 7
11 December 2013 WINDSTOP 1
11 December 2013 Co-Traveler 24
11 December 2013 GSM Tracking 2
11 December 2013 SIGINT Successes 4
11 December 2013 GHOSTMACHINE 4
5 December 2013 Target Location 1
4 December 2013 FASCIA 2
4 December 2013 CHALKFUN 1
26 November 2013 Microsoft a Target? 4
4 November 2013 WINDSTOP, SSO, Yahoo-Google 14
30 October 2013 MUSCULAR-INCENSOR Google and Yahoo 4
14 October 2013 SSO Overview 4
14 October 2013 SSO Slides 7
14 October 2013 SSO Content Slides 9
4 October 2013 Tor 49
4 October 2013 EgotisticalGiraffe 20*
4 October 2013 GCHQ MULLENIZE 2
4 October 2013 Roger Dingledine 2
30 August 2013 Budget 17
10 July 2013 PRISM Slide 1
29 June 2013 PRISM 8
20 June 2013 Warrantless Surveillance 25*
7 June 2013 PPD-20 18*
6 June 2013 PRISM 1
Der Spiegel * 97
31 December 2013 QFIRE * 16
30 December 2013 TAO Introduction * 16
30 Deceber 2013 QUANTUM Tasking (8 duplicates of QUANTUMTHEORY) 28*
30 December 2013 QUANTUMTHEORY 14
29 December 2013 TAO ANT COTTONMOUTH (images)
TAO ANT COTTONMOUTH (DE article) 4
17 November 2013 ROYAL CONCIERGE (DE)

ROYAL CONCIERGE (EN)
2
29 October 2013 NSA-CIA SCS 3
27 October 2013 NSA-CIA SCS 2
20 October 2013 Mexico President 1
20 September 2013 Belgacom 3
16 September 2013 SWIFT 3
9 September 2013 Smartphones 5
1 September 2013 French Foreign Ministry 0
31 August 2013 Al Jazeera 0
O Globo Fantastico ~87
7 October 2013 CSE Brazil Ministry 7
8 September 2013 Petrobas ~60
3 September 2013 Brazil and Mexico 20
New York Times 118
9 December 2013 Spying on Games 82*
23 November 2013 SIGINT Strategy 2012-2016 5
3 November 2013 SIGINT Mission 2013

SIGINT Mission 2017
22
28 September 2013 Contact Chaining Social Networks 1
28 September 2013 SYANPSE 1
5 September 2013 BULLRUN 4*
5 September 2013 SIGINT Enabling 3*
ProPublica 89
9 December 2013 Spying on Games 82*
5 September 2013 BULLRUN 4*
5 September 2103 SIGINT Enabling 3*
Le Monde 20
25 October 2013 NSA Hosts FR Spies 4
22 October 2013 Wanadoo-Alcatel 1
22 October 2013 Close Access Sigads 2
22 October 2013 Boundless Informant 2
22 October 2013 PRISM 11
Dagbladet 13
19 November 2013 BOUNDLESSINFORMANT 13
NRC Handelsblad 4
30 November 2013 Dutch SIGINT 3
23 November 2013 SIGINT Cryptologic Platform 1
Huffington Post 3
27 November 2013 Muslim Porn Viewing 3
CBC 9
10 December 2013 NSA-CSEC Partnership 1
10 December 2013 G8-G20 Spying 4*
2 December 2013 G8-G20 Spying 3
29 November 2013 G8-G20 Spying 1
The Globe and Mail 18
30 November 2013 CSEC Brazil Spying 18*
SVT (Swedsh TV) 2
5 December 2013 Sweden Spied Russia for NSA 2
L’Espresso 3
6 December 2013 NSA Spies Italy 3
Trojkan (SVT) 29
11 December 2013 NSA Sweden FRA Relationship 1*
11 December 2013 NSA 5 Eyes Partners 1
11 December 2013 NSA Sweden FRA Agenda 8
11 December 2013 NSA Sweden FRA RU Baltic 1
11 December 2013 NSA GCHQ Sweden FRA COMINT 1
11 December 2013 NSA Sweden FRA XKeyscore Plan 5
11 December 2013 NSA Sweden FRA XKeyscore Sources 1
11 December 2013 NSA Sweden FRA XKeyscore Tor et al 3
11 December 2013 NSA Sweden FRA XKeyscore Slide 1
11 December 2013 NSA Sweden FRA Quantum 1 1
11 December 2013 GCHQ Sweden FRA Quantum 1
11 December 2013 NSA Sweden FRA Quantum Accomplishments 2
9 December 2013 NSA and Sweden Pact 3*
Jacob Appelbaum * 71
30 December 2013 NSA Catalog * 50
30 December 2013 NSA Catalog Video Clips * 21
Information.dk 22*
14 January 2014 SSO (duplicate) 7*
14 January 2014 PRISM (duplicate) 11*
13 January 2014 5-Eyes Spy G8-G20 (duplicate) 4*

Revealed – Snowden Document and Page Count Assessment

The count of Snowden files has ranged from an initial low end of 10,000 to the latest high of 1,700,000, although the high end is likely exaggerated by officials to maximize alleged damage.

The number of pages in these files has not been estimated but about 1,000 pages have been released, mostly as PDFs and images. How many total pages might be in the files and now long would it take Snowden to read them to assure least harm to the US?

For comparison, Cryptome’s archive is about 70,000 files. Converting these files to pages comes to about 1,000,000 pages. These files are PDFs, HTMLs, DOCs, TXTs, DWGs, images, spreadsheets, with a few videos and films excluded from the count. To get the page count all files were converted to PDFs. The page count of documents ranges from 1 to 2,200. This might be a fair range of types and page counts of files in the Snowden batch.

An average file then, of 70,000 files with 1,000,000 pages, comes to 14.28 pages per file. Using this as a guide for the Snowden files, the number of pages could range from 142,800 pages for 10,000 files to 24,276,000 pages for 1.7 million files.

Examining the low end of 142,800 pages would be about like reading 476 books of 300 pages length. Examining the high end of 24,276,000 pages would be like reading 80,920 books of 300 pages each.

Snowden is smart and knows his material thoroughly so time to speed read a 300-page book of NSA material, could be done in, say, 2 hours.

On the low end it would take 952 hours to read 142,800 pages, reading 10 hours a day, would come to 95 days, or about 3 months.

On the high end it would take 161,890 hours to read 24,276,000 pages, reading 10 hours a day, would come to 1,619 days or about 54 months — 4 1/2 years.

4 1/2 years is longer than Snowden is reported to have worked for Dell and Booz Allen as contractor to NSA.

It is unlikely Snowden would have examined 24 million pages.

More likely Snowden used a program to quickly analyze large data collections and rank intelligence actionability in the NSA manner. Glenn Greenwald told Buzzfeed that the documents had been beautifully organized, “almost to a scary degree.” As if prepared with a purposeful program for analyzing and data sharing with avid customers.

There are information security programs which compartmentalize data for multiple levels of security and access as well as controls for the distribution and timing of release. These are used to manage classified data handling among a variety of personnel and agencies with varying clearances.

It could be that Snowden remains in control of his material’s release by way of programmed implants in the material for access and timing although the material is physically distant from him. This too is conventional security practice.

These practices would be characteristic of a seasoned security person who could not be certain of media outlets’ long-term behavior, their transmission and storage security, their theft and spying prevention capabilities, their susceptiblity to coercion or persuasion by officials or by inducements to betray him to protect themselves.

Events have shown that these meticulous security measures would have been and remain appropriate.

It also allows Snowden to remain in charge of any negotiations for return of the material, for accurate accounting of the material’s scope, retention, distribution and release, and for assuring his safety without relying on the fickle fingers of fate of informants and turncoats which have beckoned the all-too-trusting to long-term imprisonment.

__________

As an aside, another way to surmise what Snowden allegedly had on four laptops is by file size. Cryptome’s 70,000 files comes to about 17GB, or an average of 243KB per file. Using that as a guide to Snowden’s files, the total size ranges from 2.43GB for 10,000 files to 413GB for 1,700,00 files. On the high end that’s about 103GB per laptop. No problem, laptops with 100GB-250GB disks are common.

Revealed – Committee on National Security Systems Gap Analysis Between the FICAM and U.S. Secret Networks

CNSS-GapAnalysisFICAMCommittee on National Security Systems

42 pages
For Official Use Only
May 23, 2012

Download
CNSS-GapAnalysisFICAM

Over the past ten years, the Federal Government has made concerted advances in the development and implementation of Identity, Credential, and Access Management (ICAM). This progress includes capabilities designed to promote interoperability, assured information sharing, and efficiencies of scale across all agencies within the Federal Government. Recently, several high-visibility events have focused attention on classified networks with a renewed emphasis on information protection within the information sharing paradigm. Organizations must strive to ensure responsible sharing and safeguarding of classified information by employing advanced capabilities that enable a common level of assurance in information handling and sharing while ensuring the interoperability required to satisfy mission requirements.

us-secret-networks

In response to these and other drivers, the National Security Systems (NSS)’s Identity and Access Management (IdAM) Working Group, the Federal Chief Information Officer (CIO) Council / ICAM Subcommittee (ICAMSC), and the National Security Staff / Information Sharing and Access (ISA) Interagency Policy Committee (IPC)’s Assured Secret Network Interoperability (ASNI) Working Group collaborated to evaluate the applicability of the Federal ICAM Roadmap and Implementation Plan (FICAM) to U.S. Secret networks and identify obstacles to the future interoperability of the Federal Secret Fabric. This document is based on analysis of the ICAM capabilities of six predominant Secret networks in use within the Federal Government:

Department of Defense (DoD) Secret Internet Protocol Router Network (SIPRNet)
Federal Bureau of Investigation (FBI) Network (FBINet)
Department of Energy-National Nuclear Security Administration (DOE-NNSA) Enterprise Secure Network (ESN) Note: This analysis focuses on the DOE-NNSA ESN. Other networks at DOE were not included in this data.
Department of Homeland Security (DHS) Homeland Secure Data Network (HSDN)
Department of Justice (DOJ) Justice Consolidated Office Network – Secret (JCON-S)
Department of State (DOS) ClassNet

This document represents a snapshot of the state of governance, policies, and implementation status of Secret networks as of December 12, 2011. There were several key findings as a result of this analysis:

FICAM is applicable to Secret networks with some changes in the technical implementation to account for the unique requirements of classified networks
The agencies evaluated have different levels of maturity in the implementation and realization of the FICAM vision, but all agencies recognize the need to move toward that vision
Lack of authoritative policy and governance structures has led to divergent ICAM implementation approaches among many agencies
Most agencies lack a common technical approach to ICAM implementation illustrated by the following:
Currently, there is no common and interoperable credential employed on Secret networks
There is no common way to capture, compile, and evaluate identity or resource attributes on Secret networks
There is no common end-to-end approach (people, process, technology) to interoperability and information sharing between agencies – information sharing successes are mostly limited to mission-specific systems to meet specific mission needs
There are ICAM requirements unique to classified networks that are not currently addressed in FICAM (i.e., physical protection of end points, cross-domain data transfer, etc.)
In partnership with the Secret network community, additional work is needed to identify a viable roadmap and implementation plan for FICAM on Secret networks including provisions for:
Developing Implementation Best Practices
Incorporating Security and Privacy Needs within the ICAM Enterprise Architecture
Aligning ICAM Architectures from multiple organizations, enclaves, and security domains

Together, the CNSS, ICAMSC, and the Program Manager for the Information Sharing Environment (PM-ISE) will continue to work to identify solutions to these obstacles and forge a path for implementation of robust and interoperable ICAM capabilities on the Federal Secret Fabric.

The CNSS, Information Security & Identity Management Committee (ISIMC), ICAMSC, and ASNI Working Group reviewed and approve the release of this document.

Exposed – NSA Snowden Releases Tally Update – 726 Pages

Add 26 pages to Trojkan (SVT). Tally now 797 pages (~1.4%) of reported 58,000. NSA head claims 200,000 (~.40% of that released). Australia press reports “up to 20,000 Aussie files.”

Rate of release over 6 months, 132.8 pages per month, equals 436 months to release 58,000, or 36.3 years. Thus the period of release has decreased in the past month from 42 years.

12 December 2013. Belatedly add 27 pages to Guardian and 18 pages to Washington Post.

21 November 2013. See also EFF and ACLU accounts:

https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources

https://www.aclu.org/nsa-documents-released-public-june-2013

3 November 2013

47 42 Years to Release Snowden Documents

Out of reported 50,000 pages (or files, not clear which), about 446 514 pages (>1% 1%) have been released over 5 months beginning June 5, 2012. At this rate, 89 100 pages per month, it will take 47 42 years for full release. Snowden will be 77 72 years old, his reporters hoarding secrets all dead.

NY Times, 3 November 2013:

Whatever reforms may come, Bobby R. Inman, who weathered his own turbulent period as N.S.A. director from 1977 to 1981, offers his hyper-secret former agency a radical suggestion for right now. “My advice would be to take everything you think Snowden has and get it out yourself,” he said. “It would certainly be a shock to the agency. But bad news doesn’t get better with age. The sooner they get it out and put it behind them, the faster they can begin to rebuild.”

Outlet Pages
The Guardian 265
Washington Post 200
Der Spiegel 19
O Globo Fantastico ~87
New York Times 118 (82 joint)
ProPublica 89 (82 joint)
Le Monde 20
Dagbladet 13
NRC Handelsblad 4
Huffington Post 3
CBC 9
The Globe and Mail 18
SVT 2
L’Espresso 3
Trojkan (SVT) 29

Timeline of releases:

13 December 2013. Add 26 pages to Trojkan (SVT).

12 December 2013. Belatedly add 27 pages to Guardian and 18 pages to Washington Post.

11 December 2013. Belatedly add 25 pages to Guardian.

11 December 2013. Belatedly add 74 pages to Washington Post.

10 December 2013. Add 2 pages to CBC.

10 December 2013. Add 4 pages to CBC (duplicate of previous source).

9 December 2013. Add 3 pages to Trojkan. Add 2 pages to Guardian. Add 82 pages to New York Times and ProPublica (joint).

6 December 2013. Add 3 pages to L’Espresso.

5 December 2013. Add 2 pages to SVT (Swedish TV).

5 December 2013. Add 1 page to Washington Post.

4 December 2013. Add 3 pages to Washington Post.

2 December 2013. Add 3 pages to CBC.

30 November 2013. Add 18 pages to The Globe and Mail.

30 November 2013. Add 3 pages to NRC Handelsblad.

29 November 2013. Add 1 page to CBC.

27 November 2013. Add 3 pages to Huffington Post.

26 November 2013. Add 4 pages to Washington Post.

23 November 2013. Add 1 page to NRC Handelsblad.

23 November 2013. Add 5 pages to New York Times.

22 November 2013. Add 10 pages to Dagbladet.

18 November 2013. Add 6 pages to The Guardian.

17 November 2013. Add two images to Der Spiegel.

4 November 2013. Add 14 pages to Washington Post.

3 November 2013. A reports an additional 54 slides for O Globo Petrobas.

3 November 2013. Add 22 pages to New York Times.

2 November 2013. Add 13 pages to Guardian, 11 are duplicates.

31 October 2013. Add 4 pages to Washington Post.

29 October 2013. Add 3 pages to Der Spiegel

27 October 2013. Add 2 pages to Der Spiegel.

25 October 2013. Add 4 pages to Le Monde.

22 October 2013. Add 5 pages to Le Monde.

21 October 2013. Add 11 pages to Le Monde, 8 are duplicates.

20 October 2013. Add 1 page to Der Spiegel.

13 October 2013. Add 4, 7 and 9 pages to Washington Post.

8 October 2013. Add 7 pages to O Globo: CSE spying on Brazilian ministry, reported 7 October 2013.

6 October 2013. Add Snowden pages published by Washington Post, Der Spiegel, O Globo Fantastico, New York Times, ProPublica. Some are duplicates(*).

5 October 2013

26 Years to Release Snowden Docs by The Guardian

Out of reported 15,000 pages, The Guardian has published 192 pages in fourteen releases over four months, an average of 48 pages per month, or 1.28% of the total. At this rate it will take 26 years for full release.

Edward Snowden will be 56 years old.
Glenn Greenwald will be 72.
Laura Poitras will be 75.
Alan Rusbridger will be 86.
Barton Gellman will be 78.
Julian Assange will be 68.
Chelsea Manning will be 52.
Keith Alexander will be 88.
Barack Obama will be 78.
Daniel Ellsberg will be 108.
This author will be 103.

Number Date Title Pages
The Guardian 265
20 9 December 2013 Spying on Games 2
18 18 November 2013 DSD-3G 6
19 1 November 2013 PRISM, SSO
SSO1 Slide
SSO2 Slide 13*
18 4 October 2013 Types of IAT Tor 9
17 4 October 2013 Egotistical Giraffe 20*
16 4 October 2013 Tor Stinks 23
15 11 September 2013 NSA-Israel Spy 5
14 5 September 2013 BULLRUN 6*
13 5 September 2013 SIGINT Enabling 3*
12 5 September 2013 NSA classification guide 3
11 31 July 2013 XKeyscore 32
10 27 June 2013 DoJ Memo on NSA 16
9 27 June 2013 Stellar Wind 51
8 21 June 2013 FISA Certification 25
7 20 June 2013 Minimization Exhibit A 9
6 20 June 2013 Minimization Exhibit B 9
5 16 June 2013 GCHQ G-20 Spying 4
4 8 June 2013 Boundless Informant FAQ 3
3 8 June 2013 Boundless Informant Slides 4
2 7 June 2013 PPD-20 18
1 5 June 2013 Verizon 4
Washington Post 200
11 December 2013 Excessive Collection 9
11 December 2013 SCISSORS 2 7
11 December 2013 SCISSORS 1 4
11 December 2013 Yahoo-Google Exploit 6
11 December 2013 Cable Spying Types 7
11 December 2013 WINDSTOP 1
11 December 2013 Co-Traveler 24
11 December 2013 GSM Tracking 2
11 December 2013 SIGINT Successes 4
11 December 2013 GHOSTMACHINE 4
5 December 2013 Target Location 1
4 December 2013 FASCIA 2
4 December 2013 CHALKFUN 1
26 November 2013 Microsoft a Target? 4
4 November 2013 WINDSTOP, SSO, Yahoo-Google 14
30 October 2013 MUSCULAR-INCENSOR Google and Yahoo 4
14 October 2013 SSO Overview 4
14 October 2013 SSO Slides 7
14 October 2013 SSO Content Slides 9
4 October 2013 Tor 49
4 October 2013 EgotisticalGiraffe 20*
4 October 2013 GCHQ MULLENIZE 2
4 October 2013 Roger Dingledine 2
30 August 2013 Budget 17
29 June 2013 PRISM 8
20 June 2013 Warrantless Surveillance 25*
7 June 2013 PPD-20 18*
6 June 2013 PRISM 1
Der Spiegel 19
17 November 2013 ROYAL CONCIERGE (DE)

ROYAL CONCIERGE (EN)
2
29 October 2013 NSA-CIA SCS 3
27 October 2013 NSA-CIA SCS 2
20 October 2013 Mexico President 1
20 September 2013 Belgacom 3
16 September 2013 SWIFT 3
9 September 2013 Smartphones 5
1 September 2013 French Foreign Ministry 0
31 August 2013 Al Jazeera 0
O Globo Fantastico ~87
7 October 2013 CSE Brazil Ministry 7
8 September 2013 Petrobas ~60
3 September 2013 Brazil and Mexico 20
New York Times 118
9 December 2013 Spying on Games 82*
23 November 2013 SIGINT Strategy 2012-2016 5
3 November 2013 SIGINT Mission 2013

SIGINT Mission 2017
22
28 September 2013 Contact Chaining Social Networks 1
28 September 2013 SYANPSE 1
5 September 2013 BULLRUN 4*
5 September 2013 SIGINT Enabling 3*
ProPublica 89
9 December 2013 Spying on Games 82*
5 September 2013 BULLRUN 4*
5 September 2103 SIGINT Enabling 3*
Le Monde 20
25 October 2013 NSA Hosts FR Spies 4
22 October 2013 Wanadoo-Alcatel 1
22 October 2013 Close Access Sigads 2
22 October 2013 Boundless Informant 2
22 October 2013 PRISM 11
Dagbladet 13
19 November 2013 BOUNDLESSINFORMANT 13
NRC Handelsblad 4
30 November 2013 Dutch SIGINT 3
23 November 2013 SIGINT Cryptologic Platform 1
Huffington Post 3
27 November 2013 Muslim Porn Viewing 3
CBC 9
10 December 2013 NSA-CSEC Partnership 1
10 December 2013 G8-G20 Spying 4*
2 December 2013 G8-G20 Spying 3
29 November 2013 G8-G20 Spying 1
The Globe and Mail 18
30 November 2013 CSEC Brazil Spying 18*
SVT (Swedsh TV) 2
5 December 2013 Sweden Spied Russia for NSA 2
L’Espresso 3
6 December 2013 NSA Spies Italy 3
Trojkan (SVT) 29
11 December 2013 NSA Sweden FRA Relationship 1*
11 December 2013 NSA 5 Eyes Partners 1
11 December 2013 NSA Sweden FRA Agenda 8
11 December 2013 NSA Sweden FRA RU Baltic 1
11 December 2013 NSA GCHQ Sweden FRA COMINT 1
11 December 2013 NSA Sweden FRA XKeyscore Plan 5
11 December 2013 NSA Sweden FRA XKeyscore Sources 1
11 December 2013 NSA Sweden FRA XKeyscore Tor et al 3
11 December 2013 NSA Sweden FRA XKeyscore Slide 1
11 December 2013 NSA Sweden FRA Quantum 1 1
11 December 2013 GCHQ Sweden FRA Quantum 1
11 December 2013 NSA Sweden FRA Quantum Accomplishments 2
9 December 2013 NSA and Sweden Pact 3*

SECRECY NEWS – INTELLIGENCE SATELLITE IMAGERY DECLASSIFIED FOR RELEASE

An enormous volume of photographic imagery from the KH-9 HEXAGON
intelligence satellites was quietly declassified in January and will be
transferred to the National Archives later this year for subsequent public
release.

The KH-9 satellites operated between 1971 and 1984. The imagery they
generated should be of historical interest with respect to a wide range of
late Cold War intelligence targets but is also expected to support current
scientific research on climate change and related fields of inquiry.

The film-based KH-9 satellites were officially declared “obsolete” by the
Director of National Intelligence in 2011. The KH-9 imagery was nominally
approved for declassification in February 2012, and then it was finally
declassified in fact this year.

ODNI spokesman Michael Birmingham said that approximately 97 percent of
the satellite imagery that was collected from the 19 successful KH-9
missions was formally declassified by DNI James R. Clapper on January 11,
2013.

“The small amount of imagery exempted from this declassification decision
will be removed prior to its accession to the National Archives (NARA) and
will remain classified pursuant to statute and national security interests,
and reviewed periodically to determine if additional declassification is
warranted,” Mr. Birmingham said last week.

The imagery is being transferred to NARA in stages, with final delivery
scheduled for September 2013, he said.

The transfer is being implemented pursuant to a November 2012 Memorandum
of Agreement between the National Geospatial-Intelligence Agency (NGA) and
the National Archives, under which the Archives is “responsible for
providing public access to the declassified imagery.”

Click to access kh9-moa.pdf

Reishia R. Kelsey of NGA public affairs confirmed that the imagery “will
be made available to the public following its accession to NARA” later this
year.

The National Archives was not prepared last week to set a precise date for
public release. But an Archives official said that “NARA intends to make
these records available to the public at our research room in College Park,
MD as soon as possible following transfer.”

If successfully executed, the release of the KH-9 imagery will constitute
a breakthrough in the declassification and disclosure of national security
information. It will be one of several discrete but momentous shifts in
secrecy policy during the Obama Administration that have often gone
unrecognized or unappreciated. Though these declassification actions took
years or decades to accomplish, they have been downplayed by the White
House itself, which has seemed curiously ambivalent about them. They
include the public disclosure of the size of the U.S. nuclear weapons
arsenal, the routine publication of the annual intelligence budget request,
the release of the Office of Legal Counsel “torture memos,” the
declassification of the KH-9 satellite itself, and others.

The KH-9 imagery is being processed for public release pursuant to the
1995 Executive Order 12951 on “Release of Imagery Acquired by Space-based
National Intelligence Reconnaissance Systems.” That order had been
effectively dormant since the Clinton Administration, when the last major
release of intelligence satellite imagery (from the CORONA, ARGON and
LANYARD missions) took place.

The declassification of the KH-9 imagery is a massive undertaking, Mr.
Birmingham of ODNI said last year.

“For context, and to grasp the scope of the project, the KH-9/HEXAGON
system provided coverage over hundreds of millions of square miles of
territory during its 19 successful missions spanning 1971-1984,” he said.
“It is a daunting issue to address declassification of the program
specifics associated with an obsolete system such as the KH-9, which
involves the declassification of huge volumes of intelligence information
gathered on thousands of targets worldwide during a 13 year time period.”

http://blogs.fas.org/secrecy/2012/10/hexagon_imagery/

MILITARY PHOTOGRAPHERS READY TO DEPLOY AROUND THE GLOBE

Just as law enforcement relied upon surveillance cameras and personal
photography to enable the prompt identification of the perpetrators of the
Boston Marathon bombing, U.S. armed forces increasingly look to the
collection of still and motion imagery to support military operations.

Combat camera (COMCAM) capabilities support “operational planning, public
affairs, information operations, mission assessment, forensic, legal,
intelligence and other requirements during crises, contingencies, and
exercises around the globe,” according to newly updated military doctrine.

COMCAM personnel are “highly trained visual information professionals
prepared to deploy to the most austere operational environments at a
moment’s notice.”

COMCAM units “are adaptive and provide fully qualified and equipped
personnel to support sustained day or night operations” in-flight, on the
ground or undersea, as needed.

“Effectively employed COMCAM assets at the tactical level can potentially
achieve national, theater strategic, and operational level objectives in a
manner that lessens the requirement for combat in many situations,” the new
doctrine says. “Their products can counter adversary misinformation,
disinformation, and propaganda and help commanders gain situational
awareness on operations in a way written or verbal reports cannot.”

“The products can also provide historical documentation, public
information, or an evidentiary foundation… for forensic documentation of
evidence and legal proceedings. They can provide intelligence documentation
to include imagery for facial recognition and key leader engagements, and
support special reconnaissance.”

The newly issued COMCAM doctrine supersedes previous guidance from 2007.
See Combat Camera: Multi-Service Tactics, Techniques, and Procedures for
Combat Camera (COMCAM) Operations, April 2013.

Click to access atp3-55-12.pdf

_______________________________________________
Secrecy News is written by Steven Aftergood and published by the
Federation of American Scientists.

The Secrecy News Blog is at:
http://www.fas.org/blog/secrecy/

To SUBSCRIBE to Secrecy News, go to:
http://blogs.fas.org/secrecy/subscribe/

To UNSUBSCRIBE, go to
http://blogs.fas.org/secrecy/unsubscribe/

OR email your request to saftergood@fas.org

Secrecy News is archived at:
http://www.fas.org/sgp/news/secrecy/index.html

Support the FAS Project on Government Secrecy with a donation:
https://members.fas.org/donate

_______________________
Steven Aftergood
Project on Government Secrecy
Federation of American Scientists
web: http://www.fas.org/sgp/index.html
email: saftergood@fas.org
voice: (202) 454-4691
twitter: @saftergood

Cryptome unveils – NSA Thinking Outloud About Cyberspace

NSA Thinking Outloud About Cyberspace

US AUS CAN NZ UK constitutes the five-nation Echelon global surveillance agreement members.

 


http://cryptome.org/2013/03/cryptolog_135.pdf (2.0MB)

[Excerpts]

DOCID: 4033695

TOP SECRET UMBRA

CRYPTOLOG
The Journal of Technical Health

Vol. XXIII, No.1
SPRING 1997

 


SECRET

CRYPTOLOG
Spring 1997

THINKING OUT LOUD ABOUT CYBERSPACE (U)

by William B. Black, Jr.
Director’s Special Assistant for Information Warfare

INTRODUCTION (U)

(S REL AUS CAN NZ UK) On 3 March 1997, the Secretary of Defense officially delegated to the National Security Agency the authority to develop Computer Network Attack1 (CNA) techniques. This delegation of authority has added a new, third dimension to NSA’s “one mission” future. That is, in the networked world of Cyberspace, CNA technology is the natural companion of NSA’s exploit and protect functions. This delegation of authority is sure to be a catalyst for major change in NSA’s basic processes and its workforce. The end result, however, should remain information technology-derived products, services, and experts.

(U) The articles following this introduction were written by the staff of the Director’s Special Assistant for Information Warfare. Because confusion still surrounds the emergence and history of Information Warfare (IW), these articles are intended to contribute to the common understanding of why Information Operations and its concepts are important to the future of NSA.

1. DoDD 3600.1, Information Operations, dated 09 December 1996, defines CNA as “operations to disrupt, deny, degrade or destroy information resident in computers and computer networks, or the computers and networks themselves.”

REL AUS CAN NZ UK

SECRET

 


SECRET

CRYPTOLOG
Spring 1997

A HISTORICAL PERSPECTIVE (U)

(U) After World War II, an understanding of the core competency underlying the making and breaking of codes — cryptology — resulted in a national decision to consolidate both activities in one organization: NSA. Both activities benefited from this consolidation, and became stronger.

(S REL AUS CAN NZ UK) Since the end of the Cold War, in an emerging networked world, an understanding of the emergence of a new core competency — “cyberology” — with its close technological relationship to cryptology has again resulted in a national decision to consolidate. Cyberology’s central activities, i.e., “exploitation,” “protection,” and “attack,” will be worked together, thus benefiting all of them.

SETTING THE STAGE (U)

(U) There are certain assumptions that underpin the thought processes related to preparing for our Agency’s future in cyberspace. These are premises that are basic to the understanding, the preparations, and the acceptance of major changes. The following presents the main assumptions.

We’re On the Edge of a New Age (U)

(U) First is an acceptance that we are on the edge of a new age, called the “Information Age.” Also, that this new age is engulfing almost every aspect of society, including the very nature of our business. The basic premise is that the information technology advancements of the last 30 years far exceed any evolution of technology in the Industrial Age. These advances are so traumatic and far-reaching that they clearly represent something truly “new.” It is important to note that, historically, technological advancements were called “revolutions” when they make progress of a single order of magnitude. (e.g., the automobile “revolutionized” transportation because it was ten times faster than the horse). In the case of information technology, the contention is that the last thirty years have seen an advancement of not one but six orders of magnitude — 1,000,000 times! — in information technology. The end result has been a great deal of confusion and turmoil as human nature attempts to force the “new” of the Information Age into the “known” of the Industrial Age. This “new,” however, does not fit; we have to change the thought process.

The Public Sees Government as the Bad Guy (U)

(U) Second, the public reaction to this new age has a direct relationship to the National Security Agency and the way we do business. At the beginning of the Industrial Age, the public centered in on industrialists and/or capitalists as being “the problem.” Labor unions were created and child labor laws were enacted to curb their power. In today’s Age, the public has centered in on government as “the problem.” Specifically, the focus is on the potential abuse of the Government’s applications of this new information technology that will result in an invasion of personal privacy. For us, this is difficult to understand. We are “the government,” and we have no interest in invading the personal privacy of U.S. citizens. Regardless, the public’s concerns are real and have an impact upon us. The Computer Security Act of 1987 is one example of this impact, for it clearly represents a first step in limiting any potential NSA involvement in the public sector.

REL AUS CAN NZ UK

SECRET

2

 


CRYPTOLOG
Spring 1997

This Age Brought Its Space With It (U)

(U) Third, a major aspect of the Information Age is that it is ushering in a totally new sphere of operations, a new environment called “cyberspace.” For many, cyberspace is an ill-defined, comic-book concept — perhaps something created by a science-fiction writer or a Hollywood producer. But for NSA, in the Information Age, cyberspace is both real and virtual: while the real portion consists of physical assets (computers, network terminals, satellites, fiber optic cables, etc.) located on earth and in space, it is the virtual aspect -all interconnected, all networked, all compatible and interoperable -that is the most important. Almost every type of interaction that occurs in the physical world will have a corollary in cyberspace.

(U) In cyberspace, complex networks on networks emerge as an organizing concept upon which our future operations must focus. All networks are interconnected, and routing across the various elements of  the network is automatic and not pre-determinable. Descriptors such as Defense Information Infrastructure (DII) or National Information Infrastructure (Nil) refer to portions of users of the Global Information Infrastructure (GIl) or better yet, the users of cyberspace’s transportation system. The future global use and dependency on cyberspace should evolve much the way the use of the Internet has evolved today, i.e., because it should be extremely cost effective. The more important aspect of this inter-connectivity is the fact that, as we move into this complex networked future, computers are in charge, and physical geography becomes less and less important. While computers initially automated routine and mundane tasks, today inter-networking has turned computers and systems to networks, affording opportunities to work with greater and greater amounts of information at any distance. In the future, advances in artificial intelligence, and increases in understanding of cognitive processes, in general, will move us rapidly into a situation where computers and networks work in conjunction with each other, under broad guidance from humans, to actually make decisions and act on our behalf. This is cyberspace’s future.

The Future of Warfare is Warfare in Cyberspace — a.k.a. Information Warfare (U)

(U) When we look to the future of warfare in the Information Age, we ask ourselves the question “How do you conduct warfare in cyberspace?” The answer is Information Warfare or, in accordance with DoD’s new Directive 3600.1, Information Operations. Information warfare has been the subject of many speeches, scholarly papers, and popular journals. Information warfare has even made its debut in Hollywood in the film Independence Day. These many, differing views of IW confuse “information in war,” “information technology enhancements of existing combat capabilities or weapon systems,” and “warfare in cyberspace.” In our view, “information in war” has been with us throughout history, i.e., intelligence on opposing forces was as valuable to Napoleon as it was to MacArthur. “Information technology enhancements” emerged during the Industrial Age with the natural evolution of weapons technology. IW for us, however, is “warfare in cyberspace” and is an exclusive feature of the Information Age. We believe that its biggest impact is yet to come.

(U) Another aspect of warfare that came with the Information Age is that actual, physical combat can be viewed in living rooms of America via television. The horrors of war cannot be hidden. As a result, in the simplest of terms, “body bags” are no longer acceptable. There is considerable societal pressure to find non-lethal means of accomplishing tasks that once called for conventional military action.

(U) For the military, the Information Age presents yet another problem. With the kind of computers, communications, and networking available in the commercial world, how can the military justify separate systems? Commercial communications networks are too inexpensive and too pervasive to ignore. The

REL AUS CAN NZ UK

SECRET

3

 


SECRET

CRYPTOLOG
Spring 1997

good news for the military is that — probably for the first time — they will have interoperable communications in joint service activities and even in multinational operations. The bad news, however, is that they will also be interoperable with their adversaries.

(S REL AUS CAN NZ UK) In Information Age terms, IW provides a “digital coercion” option. The primary target of this option is the information infrastructure of an adversary. Such information infrastructures are expected to be primarily computer controlled, operated by the commercial-civilian sector (unprotected), and the primary infrastructure upon which military forces almost totally depend. For IW purposes, access to these computer-controlled infrastructures can permit the degradation, disruption, or destruction of the network and/or the functions they serve. As a result, the “computers” become the intelligence “targets” of highest priority.

(S REL AUS CAN NZ UK) There are specific types of weapons associated with Information Warfare. These include viruses, worms, logic bombs, trojan horses, spoofing, masquerading, and “back” or “trap” doors. They are referred to as “tools” or “techniques” even though they may be pieces of software. They are publicly available, very powerful, and, if effectively executed, extremely destructive to any society’s information infrastructure.

(U) As a last thought in setting the stage, we expect the Information Warrior of the future to be very different in their thought processes. They will understand the non-physical nature of the future capabilities, will be comfortable with working across the spectrum, and have extensive knowledge of non-military targets. Probably most importantly, they will be comfortable with the concept of networks. They will understand that “information operations” are more than “operations” supported by intelligence and communications; rather, they will understand that all three function together synergistically. Finally, Information Warriors will understand that in the “tooth-to-tail” accounting of personnel, military personnel will be the “tooth” and civilians will be the “tail.” Tail equates to the emerging information infrastructure, a primary strategic target of IW.

THE BEGINNING (U)

(S REL AUS CAN NZ UK) The following articles will look in depth at various aspects of Information Operations or Information Warfare as they relate to NSA. “Cyberology” and our new CNA mission should provoke much thought and discussion. It is hoped that these articles will serve as a catalyst and basis for these activities.

(FOUO) Mr. Black retired from NSA in 1997 after a long career. He was the first Director’s Special Assistant for Information Warfare, and oversaw the establishment of the Information Operations Technology Center.

REL AUS CAN NZ UK

SECRET

4

 


Rosemary Award Winner For Worst Open Government Performance in 2012

Washington, DC, March 15, 2013 – The Department of Justice has earned the dubious distinction of winning the infamous Rosemary Award for the second time in a row, for worst open government performance of any federal agency over the past year, according to the award citation posted today by the independent non-governmental National Security Archive at www.nsarchive.org.

During the past year, Justice has failed to order agencies to upgrade their Freedom of Information regulations to comply with Congress’s statutory changes (dating back to 2007) or President Obama’s direction of a “presumption of disclosure.” Similarly, Justice failed to change its litigation posture in Freedom of Information lawsuits to support openness, and in fact actually backed agency efforts to undermine the 2007 OPEN Government Act. The Department and its Office of Information Policy continued, for the third year in a row, to publish misleading statistics about FOI responsiveness, while the government-wide use of discretionary exemptions, such as the “deliberative process” privilege, rose dramatically from the previous year.

Rose Mary Woods in action

President Richard Nixon’s secretary Rose Mary Woods demonstrates the backwards-leaning stretch with which she erased eighteen-and-a-half minutes of a key Watergate conversation recorded on White House tapes.

The Emmy- and George Polk Award-winning National Security Archive, based at The George Washington University, has carried out twelve government-wide audits of FOIA performance (including the Knight Open Government Surveys), filed more than 50,000 Freedom of Information requests over the past 25 years, opened historic government secrets ranging from the CIA’s “Family Jewels” to the Iraq invasion war plans, and won a series of lawsuits that saved hundreds of millions of White House e-mail from the Reagan through the Obama presidencies, among many other achievements.

The Archive established the Rosemary Award in 2005 to highlight the lowlights of government secrecy, and named the prize after President Nixon’s secretary, Rose Mary Woods, who testified that she had accidentally – while stretching to answer a phone call – erased 18 and a half minutes of a crucial Watergate tape.

Justice clinched the intensely competitive award with the appearance before the Senate Judiciary Committee on Wednesday March 13, 2013 by the director of the department’s Office of Information Policy, Melanie Pustay, who refused to answer senators’ questions about department litigation that would undermine the OPEN Government Act of 2007 authored by Senators Leahy and Cornyn. For the video, visit the Senate Judiciary Committee site.

The Department’s testimony claimed that updating agency Freedom of Information regulations was merely optional, “not required” when Congress changed the law in 2007 or when the President and the Attorney General changed the policy in 2009. Director Pustay quickly asserted, however, that her own agency was in the final stages of updating its own FOIA regulations – to which Senator Leahy replied, it’s been five years since we changed the law, it took me less time to get through law school!

As the Department’s lead entity for enforcing compliance with the Freedom of Information Act, the Office of Information Policy remains the primary impediment for raising the U.S. government’s implementation of FOIA to the levels demanded by President Obama, according to today’s Rosemary Award citation.

The National Security Archive’s latest audit of federal agency FOIA performance shows that 53 out of 100 agencies have not updated their regulations since Congress changed the law in 2007. The Archive’s findings also reveal that updated regulations are no guarantee of good regulations, since only one of the three agencies that updated since December 2012 complied with the requirements of the 2007 statutory changes.

Several witnesses and Senators’ questions at the March 13 hearing exposed the Justice Department’s attempt to eviscerate the OPEN Government Act of 2007 by backing the Federal Election Commission in their litigation against the public interest group CREW. The FEC claims that a postcard acknowledgement amounts to a “determination” under FOIA, and thus meets the 20-day response standard in the law, retaining the threat of fees that the 2007 act meant to remove when agencies were untimely in their responses to requesters. Director Pustay told the Senators she couldn’t comment on pending litigation.

The Justice Department also earned the Rosemary Award by failing to do any review of FOIA litigation to apply the new Obama openness policies. The problem dates back to the Attorney General’s memo from March 2009 that included a huge loophole, leaving it up to the Department’s litigators to apply the new standards “if practicable”! In stark contrast, President Clinton’s Attorney General Janet Reno included a formal requirement for litigation review in her 1993 memorandum on FOIA. Subsequently, the Department reported back in 1994 that the review actually produced significant new disclosures.

The Justice Department continues to stretch the truth on FOIA responsiveness, claiming for three years now a “release rate” of over 90 percent. However, as witnesses pointed out at the Senate Judiciary hearing on March 13, that number willfully ignores the real experience of FOIA requesters, in part by discounting 9 of the 11 reasons that the Department sends them away unsatisfied (“no records,” “referrals,” “fee-related problems,” “not reasonably described” etc.). Counting those categories, the actual “release rate” would be a more pedestrian – and more realistic – 55 to 60 per cent.


The true DOJ release statistics.

These fudged statistics and prohibitive FOIA procedures have real world implications for citizens attempting to see documents describing what their government is up to. For example, in January 2013, the Justice Department denied a New York Times FOIA request for its White Paper (provided to Congress) on the legal bases for drone targeting, claiming the b-5 deliberative process exemption, which has essentially come to mean “withhold it because you want to withhold it.” This is the very exemption that Attorney General Eric Holder, in his March 2009 Memorandum on FOIA, instructed agencies to use less frequently, writing that information should not be withheld simply because an agency “may do so legally.”

Four days after the unclassified memo leaked to NBC News, however, the Justice Department released the document “as a matter of agency discretion.” The release actually shows that the Department had no basis for withholding the White Paper in the first place. Instead, the DOJs public message seems to be: “leaks work better than FOIA.” White House spokesman Jay Carney apparently agreed, stating at a press conference after the leak, “Since it’s out there, you should read it.”

In fairness (which is not the point of the Rosemary Award), today’s citation recognizes that the Justice Department has also taken steps that actually improve transparency. These include prodding agencies to close their ten oldest FOIA requests (though some requests have still been languishing for more than 20 years), requiring regular and even quarterly FOIA reports from all agencies, co-hosting “requester round table meetings,” and encouraging agencies to send FOIA staff to American Society of Access Professionals (ASAP) training sessions. (The Department’s Office of Information Policy actually received an award from ASAP in 2012, but this was for its support of ASAP as an organization, not for Justice’s FOIA policies and practices.)

Unfortunately, these welcome improvements have to be weighed against the more troubling evidence of policy-level disregard for basic considerations of openness that the Department has displayed. At the same time that Justice Department OIP director Pustay testified with a straight face that “all agencies are in compliance with the OPEN Government Act,” her own agency was fighting in court to eviscerate that Act’s primary enforcement mechanism, propagating misleading FOIA statistics, and failing to implement her own Attorney General’s instruction to establish “a presumption of disclosure.”

NSA – ALAN GROSS CASE SPOTLIGHTS U.S. DEMOCRACY PROGRAMS IN CUBA

Alan Gross (left) and Peter Kornbluh at the Havana military prison where Gross is being held. November 28, 2012.

ALAN GROSS CASE SPOTLIGHTS U.S. DEMOCRACY PROGRAMS IN CUBA

LAWSUIT FILED BY FAMILY YIELDS DOCUMENTATION ON “OPERATIONAL” NATURE OF USAID EFFORT

CONTRACTOR INTRODUCES CONFIDENTIAL RECORDS IN COURT ARGUMENTS

National Security Archive Electronic Briefing Book No. 411

Posted – January 24, 2013

Edited by Peter Kornbluh

For more information contact:
Peter Kornbluh 202/994-7116 or nsarchiv@gwu.edu

Related Postings

American jailed in Cuba wants US to sign ‘non-belligerency pact’ to speed release
Michael Isikoff, NBC News, December 2, 2012

Secrecy, politics at heart of Cuba project
Tracey Eaton, Along the Malecón, January 17, 2013

Cuba Proposes Exchange Deal for Imprisoned American, Alan Gross
Chris Woolf, PRI’s The World, December 3, 2012


Bookmark and Share

Washington, D.C., January 18, 2013 – The U.S. government has “between five to seven different transition plans” for Cuba, and the USAID-sponsored “Democracy” program aimed at the Castro government is “an operational activity” that demands “continuous discretion,” according to documents filed in court this week, and posted today by the National Security Archive. The records were filed by Development Alternatives Inc (DAI), one of USAID’s largest contractors, in response to a lawsuit filed by the family of Alan Gross, who was arrested in Cuba in December 2009 for attempting to set up satellite communications networks on the island, as part of the USAID program.

In an August 2008 meeting toward the end of the George W. Bush administration, according to a confidential memorandum of conversation attached to DAI’s filing, officials from the “Cuba Democracy and Contingency Planning Program,” as the Democracy effort is officially known, told DAI representatives that “USAID is not telling Cubans how or why they need a democratic transition, but rather, the Agency wants to provide the technology and means for communicating the spark which could benefit the population.” The program, the officials stated, intended to “provide a base from which Cubans can ‘develop alternative visions of the future.'”

Gross has spent three years of a 15-year sentence in prison in Cuba, charged and convicted of “acts against the integrity of the state” for attempting to supply members of Cuba’s Jewish community with Broadband Global Area Network (BGAN) satellite communications consoles and establish independent internet networks on the island. Last year, he and his wife, Judy, sued both DAI and USAID for failing to adequately prepare, train and supervise him given the dangerous nature of the democracy program activities.

During a four-hour meeting last November 28, 2012, with Archive analyst Peter Kornbluh at the military hospital where he is incarcerated, Gross insisted that “my goals were not the same as the program that sent me.” He called on the Obama administration to meet Cuba at the negotiating table and resolve his case, among other bilateral issues between the two nations.

The exhibits attached to DAI’s court filing included USAID’s original “Request for Proposals” for stepped up efforts to bring about political transition to Cuba, USAID communications with DAI, and Gross’s own proposals for bringing computers, cell phones, routers and BGAN systems-“Telco in a Bag,” as he called it-into Cuba.

According to Kornbluh, DAI’s filing is “a form of ‘graymail'”–an alert to the U.S. government that unless the Obama administration steps up its efforts to get Gross released, the suit would yield unwelcome details of ongoing U.S. intervention in Cuba.

In its effort to dismiss the suit, DAI’s filing stated that it was “deeply concerned that the development of the record in this case over the course of litigation [through discovery] could create significant risks to the U.S. government’s national security, foreign policy, and human rights interests.”

 


READ THE DOCUMENTS

Document l: USAID “Competitive Task Order Solicitation in Support of Cuba Democracy and Contingency Planning Program (CDCPP), May 8, 2008.

Document 2: Memoranda of Conversation between USAID AND DAI officials, “Meeting Notes from USAID CDCPP Meeting, August 26, 2008.

Document 3: Alan Gross, “Para La Isla,” Proposed Expansion of Scope of Work in Cuba Proposal, September 2009.

Document 4: Declaration of John Henry McCarthy, DAI Global Practice Leader

Document 5: Defendant Development Alternatives, Inc.’s Memorandum of Points and Authorities in Support of Its Motion to Dismiss for Lack of Subject-Matter Jurisdiction and Failure to State a Claim, January 15, 2013.

Document 6: Cuban Court Ruling Against Alan Gross, March 11, 2011, certified English translation. 

Unveiled – Hitachi on NSA Utah Data Center Cable Purchases

The following press release from Hitachi Cable America discusses their “supply of high performance fiber optic cable and assemblies” to the National Security Agency’s Utah Data Center (UDC) project.  The press release contains a number of specific details regarding the UDC project, including brief descriptions of the purpose of the facility as for “code breaking and data traffic analysis.” Hitachi has reportedly developed specialized fiber optic cables for the facility and had their InfiniBand CXP Active Optical cable assemblies, capable of 150 Gbs per second per assembly, approved for use with the latest generation of Cray supercomputer.  The Cray Cascade system is currently under development with support from the Defense Advanced Research Projects Agency’s (DARPA) High Productivity Computing Systems (HPCS) program and, according to the Cray website, the system will be “capable of sustained multi-petaflops performance.”   An article earlier this year in Wired by James Bamford, describes the development of the Cascade as part of a race to increase computing capabilities for the NSA.

Supply of high performance fiber optic cable and assemblies by Hitachi Cable America to the National Security Agency (NSA) – Utah Data Center Project / DARPA

Overview:

With internet traffic growing exponentially, attacks on government and commercial computers by cyber terrorists and rogue states have escalated. Those wishing harm have espionage programs targeting the data systems used by the United States and allies. Drug traffickers and weapons dealers use the internet with encrypted communications.

To counter these activities, the National Security Agency, an agency of the U.S. government, is building a fortified data center deep inside a mountain in Utah. This complex will house the world’s most sophisticated supercomputers dedicated to code breaking and data traffic analysis. Another site will eventually take delivery of the latest Cray supercomputer called Cascade to support the NSA’s need to crack codes faster to protect the nation and its allies.

HCA developed fiber cable suitable for the densely packed NSA data center facilities, as well as indoor/outdoor fiber optic cables and shielded high speed copper data cables. Additionally, HCA’s InfiniBand CXP Active Optical cable assemblies, capable of a blazing 150 Gigabits per second per assembly, has been qualified by Cray for their Cascade system.

Innovative:

Winning two projects at this level requires a degree of technical sophistication few companies can match. Hitachi Cable America has processes that allow customers the ultimate in fiber cable flexibility. Instead of two cables, each with a single type of fiber optic glass, our designers have developed a single cable with both long distance and short distance optical glass embedded in it. Instead of forcing the NSA to use the commercial standard cable YELLOW jacket color for long haul glass and ORANGE jacket color for short distance glass, we’ve modified our designs to allow them to use jacket colors based on security level and service type. Our sales engineers have spent many hours with NSA data center designers educating them on the solutions we have and, at that same time, we have learned the design nuances of this complex site and others. Our technical knowledge, our design and manufacturing flexibility and our competitive costs are a winning formula.

Reliable:

NSA designers visited Hitachi Cable America’s Performance Cable Systems & Materials Division facility in Manchester New Hampshire USA for a site audit. Under one roof, and, in our opinion, they saw the best cable manufacturing facility in North America for fiber optic cable, category and custom copper cables. Clean, organized, with modern manufacturing equipment and a highly-trained staff, the Hitachi Cable plant that ships 100,000,000 meters annually of insulated wire and fiber strands impressed these designers. Our dedicated government sales team understands the entire NSA bidding cycle. We’ve built credibility account by account, data center after data center with each project finished with superior results. There is no other way to prove to the NSA than to deliver what was promised, each and every time. As a result, the NSA specified Hitachi Cable as the exclusive cable supplier for this program because of our reputation for delivering on our commitments.

Our InfiniBand Active Optical cable assembly qualified by Cray for the Cascade supercomputing project confirms Hitachi Cable’s position in the elite class of transceiver suppliers. Years of experience supplying transceivers to Cisco, IBM, and Hitachi itself, combined with our ability to make superior fiber optic cable gave us the prerequisite skills to design the 150 Gbps Active Optical Cable assembly. Miniaturization technology without sacrificing transmission performance is what sold Cray on us.

Enabling:

While many American cable producers have shifted production of cable products to China or Mexico, Hitachi Cable has continued to expand its presence in the United States. Starting with flat cable in 1986, ,then adding premise cable in 1991, fiber optics in 1998, and with numerous expansions over the past ten years in Manchester NH, Hitachi Cable has significantly increased output capacity in the USA. This has not gone unnoticed by the National Security Agency and many of the distribution partners who support the Agency. American-made, high quality cabling solutions is a vital requirement in maintaining the nation’s data infrastructure.

Hitachi Cable’s investment in America is not just in New Hampshire but in New York, Indiana and Florida. Altogether, we support more than 500 American workers and their families. These workers are not just assembling parts built in low cost countries. Using domestically-made optical fiber from our partner, Corning Optical Fiber , we build complex copper and fiber cables with a very high domestic content value, important when considering the Buy American requirements of the U.S. Government.

TOP-SECRET – Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabilities

https://publicintelligence.net/wp-content/uploads/2012/07/NSA-WilliamBinneyDeclaration.png

The following sworn declaration of William Binney, a former employee of the NSA and specialist in traffic analysis, was filed July 2, 2012 in support of the Electronic Frontier Foundation’s case against the National Security Agency (Jewel v. NSA) regarding their illegal domestic surveillance programs which, according to Binney “are consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications” inside the U.S.  Thanks to Jacob Appelbaum for originally drawing attention to the declaration.

I, William Binney, declare:

1. I am a former employee of the National Security Agency (“NSA”), the signals intelligence agency within the Department of Defense. Unless otherwise indicated, I have personal knowledge of each and every fact set forth below and can competently testify thereto.

2. A true and correct copy of my resume is attached hereto as Exhibit A.

3. In the late 1990′s, the increasing use of the Internet for communications presented the NSA with a special kind of problem: The NSA could not collect and smartly select from the large volume of data traversing the Internet the nuggets of needed information about “Entities of Interest” or “Communities of Interest,” while protecting the privacy of U.S. persons. Human analysts had to manually identify the groups and entities associated with activities that the NSA sought to monitor. That process was so laborious that it significantly hampered the NSA’s ability to do large scale data analysis.

4. One of my roles at the NSA was to find a means of automating the work of human analysts. I supervised and participated in the development of a program called “Thin Thread” within the NSA. Thin Thread was designed to identify networks of connections between individuals from their electronic communications over the Internet in an automated fashion in real time. The concept was for devices running Thin Thread to monitor international communications traffic passing over the Internet. Where one side of an international communication was domestic, the NSA had to comply with the requirements of the Foreign Intelligence Surveillance Act (“FISA”). With Thin Thread, the data would be encrypted (and the privacy of U.S. citizens protected) until such time as a warrant could be obtained from the Foreign Intelligence Surveillance Comi.

5. The advent of the September 11 attacks brought a complete change in the approach 18 of the NSA toward doing its job. FISA ceased to be an operative concern, and the individual liberties preserved in the U.S. Constitution were no longer a consideration. It was at that time that the NSA began to implement the group of intelligence activities now known as the President’s Surveillance Program (“PSP”). While I was not personally read into the PSP, various members of my Thin Thread team were given the task of implementing various aspects of the PSP. They confided in me and told me that the PSP involved the collection of domestic electronic communications traffic without any of the privacy protections built into Thin Thread.

6. I resigned from the NSA in late 2001. I could not stay after the NSA began purposefully violating the Constitution.

7. The NSA chose not to implement Thin Thread. To the best of my knowledge, the NSA does not have a means of analyzing Internet data for the purpose of identifying Entities or Communities of Interest in real time. The NSA has the capability to do individualized searches, similar to Google, for particular electronic communications in real time through such criteria as target addresses, locations, countries and phone numbers, as well as watch-listed names, keywords, and phrases in email. The NSA also has the capability to seize and store most electronic communications passing through its U.S. intercept centers. The wholesale collection of data allows the NSA to identify and analyze Entities or Communities of interest later in a static database. Based on my proximity to the PSP and my years of experience at the NSA, I can draw informed conclusions from the available facts. Those facts indicate that the NSA is doing both.

8. The NSA could have installed its intercept equipment at the nation’s fiber-optic cable landing stations. See Greg’s Cable Map, cablemap.info. There are more than two dozen such sites on the U.S. coasts where fiber-optic cables come ashore. If the NSA had taken that route, it would have been able to limit its interception of electronic communications to international/international and international/domestic communications and exclude domestic/domestic communications. Instead the NSA chose to put its intercept equipment at key junction points (for example Folsom Street) and probably throughout the nation, thereby giving itself access to purely domestic communications. The conclusion of J. Scott Marcus in his declaration that the “collection of infrastructure … has all the capability necessary to conduct large scale covert gathering of IP-based communications information, not only for communications to overseas locations, but .for purely domestic communications as well,” is correct.

9. I estimate that the NSA installed no fewer than ten and possibly in excess of twenty intercept centers within the United States. I am familiar with the contents of Mark Klein’s declaration. The AT&T center on Folsom Street in San Francisco is one of the NSA intercept centers. Mr. Klein indicated that the NSA’s equipment intercepted Internet traffic on AT&T’s peering network. It makes sense for the NSA to intercept traffic on AT &T’s peering network. The idea would be to avoid having to install interception equipment on each of the thousands of parallel data lines that eventually lead into and out of peering networks. By focusing on peering networks, the NSA intercepts data at the choke point in the system through which all data must pass in order to move from one party’s network to another’s. This is particularly important because a block data is often broken up into many smaller packets for transmission. These packets may traverse different routes before reaching the destination computer which gathers them and reassembles the original block.

10. One of the most notable pieces of equipment identified in Mr. Klein’s declaration is the NARUS Semantic Traffic Analyzer. According to the NARUS website, each NARUS device collects telecommunications data at the rate of ten gigabits per second and organizes the data into coherent streams based on the protocol associated with a specific type of collected data. A protocol is an agreed-upon way for data to be broken down into packets for transmission over the Internet, for the packets to be routed over the Internet to a designated destination and for the packets to be re-assembled at its destination. Protocols exist at each layer of the OSI (Open Systems Interconnection) 7-layer telecommunications model and are used for a wide variety of data, not just electronic communications. That means that NARUS can reconstruct all information transmitted through the peering network and forward all of the electronic communications to a database for analysis. The NARUS device can also select predetermined data from that path and forward the data to organizations having interest in the data. As I indicated above, the predetermined data would involve target addresses, locations, countries, and phone numbers, as well as watch-listed names, keywords, and phrases.

11. A further notable development has been the NSA’s public announcement in October 2009 that it was building a massive, $1.2 billion digital storage facility in Ft. Williams, Utah. According to some reports, the Utah facility will eventually have a data storage capacity measured in yottabytes (1024 bytes). Even if the Utah facility were to have no more than the amount of data storage that is presently commercially available, then one would expect the data storage to be in the range of multiples often exebytes (1018 bytes). See http://www.cleversafe.com. (According to Cleversafe, its ten exebyte storage solution fills no more than two hundred square feet). In April 2011, the NSA also announced that it would build a new supercomputing center at its Ft. Meade, Maryland headquarters.

12. The amount of data that each NARUS device can process per second is large (10 gigabits is 10 billion bits). To illustrate the sheer size of the data storage capacity ofthe Utah facility, one could assume the installation of twenty-five NARUS devices in the U.S. and that all of 2 the NARUS-processed data is sent via fiber-optic cable to Utah. That means that the NARUS processing rate of 10 billion bits per second means that one machine can produce approximately 4 x 1016 bytes per year. That in turn means that it would take twenty-five devices one year to fill an exebyte or ten years to fill ten exebytes.

13. The sheer size of that capacity indicates that the NSA is not filtering personal electronic communications such as email before storage but is, in fact, storing all that they are collecting. The capacity of NSA’s planned infrastructure far exceeds the capacity necessary for the storage of discreet, targeted communications or even for the storage of the routing information from all electronic communications. The capacity of NSA’s planned infrastructure is consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications.

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

NSA-WilliamBinneyDeclaration

Unveiled – Japan and the United States from Kennedy to Clinton


President Clinton and Prime Minister Ryutaro Hashimoto sign the Japan-U.S. Declaration on Security at Akasaka Palace in Tokyo, Japan; Date: April 17th, 1996
Courtesy; William J. Clinton Presidential Library

Washington, D.C., July,3, 2012 –The National Security Archive announces the publication of its latest digital compilation of declassified records on U.S. ties with a critically important global partner – Japan. The new collection, Japan and the United States: Diplomatic, Security, and Economic Relations, Part III, 1961-2000, includes the most recent U.S. government releases covering a broad spectrum of issues and events in the bilateral relationship, and providing essential content for understanding the current global economic crisis as well as recent geopolitical developments in East Asia and the Pacific Rim.

Japan and the United States is the Archive’s third, fully-indexed anthology on the subject, and is available through the academic publisher ProQuest. Marking its publication, the Archive is today posting a selection of presidential and Cabinet-level records from the set that reflect the key strategic, defense and economic aspects of the relationship. The Archive obtained the documents in the collection through the Freedom of Information Act and original archival research. Among the highlights of the posting:

  • Memoranda of conversation between Bush and Kaifu during the opening months of the first Gulf War crisis, as Bush pressed the Japanese leader to consider not just financial support, but an eventual role for Japan’s military. As Bush warned Kaifu, “In Congress there are always people trying to blame Japan, Germany or somebody else. They see us spending large amounts of money and sending fine young people to the Middle East, where they might be in harm’s way.” While he understood this feeling, Bush also stressed that he didn’t “want any scapegoats,” and would make it clear to the American people that “Japan is trying very hard to do its part.” (Documents 3,4,5 and 6)
  • New documents on wide-ranging secret bilateral security talks at the end of the Carter and Clinton administrations, as the two powers met on a regular basis to trade viewpoints on the full spectrum of common security concerns and the management of the defense alliance, as well as the political situation in both countries. For example, in 1979, Nicholas Platt, the Asia expert on Carter’s National Security Council, candidly observed to his Japanese counterparts (likely with an eye to reassuring them) that he had seen a marked change in the President’s attitude: “He has been through a period of intense introspection. He is much more forceful. In contrasting him to just after he left Seoul, he is more positive, rested, etc.” (Documents 1, 2, 12 and 13)
  • Briefing memoranda for Secretary of the Treasury Robert Rubin on the U.S. strategy and goals for tackling the Japanese and Asian economic crisis in the 1990s. These documents detail the ongoing efforts the Clinton administration made to press Japan to adopt the necessary policies to head off what one document called a worst-case “black hole” scenario that could lead to a recession or years of no economic growth in Japan, weaken the world economy, harm U.S. trade interests, increase protectionist pressures and roil financial markets. (Documents 7,8,9 and 10)

* * * * *

Japan and the United States makes available 902 documents dealing with high-level policy making within the U.S. government and the history of U.S.-Japan relations during the last four decades of the 20th century. These documents, obtained since publication of the second set on U.S.-Japan relations, which covered the years 1977-1996, supplement those found in the first two collections and extend the scope of the set to include the Clinton administration. The compilation includes records of U.S.-Japanese summit meetings; communications between heads of state; top-level internal deliberations; memoranda, cables and studies concerning U.S. diplomatic relations with Japan; records concerning the U.S.-Japan security relationship; documents related to trade and international monetary relations; and intelligence estimates and studies concerning Japan’s foreign policy objectives, military capabilities, economic policies and internal situation.

Among the important topics covered by these documents are:

  • U.S.-Japan negotiations over the return of Okinawa and subsequent issues surrounding the U.S. military presence there
  • Bilateral military relations in the wake of détente, the opening to China and the end of the Cold War
  • Challenges on the Korean Peninsula, including efforts to promote better relations between Tokyo and Seoul, and the security threat posed by North Korea’s nuclear weapons program.
  • Trade disputes from the Nixon to Clinton administrations
  • The Japanese and Asian economic crises of the 1990s.

DOCUMENTS

Document 1: Briefing Book (S), Eleventh U.S.-Japan Security Subcommittee Meeting (SSC) [Principals’ Book] – Extracts, ca. August 2, 1979

This briefing book provides the schedule of events, background information, objectives, and other materials that were used in preparation for the eleventh Japan-U.S. Security Subcommittee meeting, a forum for exchanging views on a regular basis that became increasingly important after the two nations adopted the Guidelines on Defense Cooperation in 1978. The topics covered include briefings for the Japanese on the second round of Strategic Arms Limitation Talks (SALT II), NATO, the Middle East, the security situation in East Asia, joint military planning, the U.S. presence in Asia, defense cost (or burden) sharing, and defense technology cooperation.

Among the key U.S. goals for the meeting were to reassure Japan that the US would remain a Pacific power while encouraging Japan to make a greater effort in the security sphere; to increase Japanese awareness of mutual global security concerns in connection with SALT; the Middle East (centered on access to oil); Southeast Asia; relations with China; and the growth of Soviet conventional, particularly naval, power in the Pacific and Indian Oceans.

Document 2: Memorandum of Conversation (S), The 11th SSC–29 July-2 August 1979, ca August 2, 1979 [missing one page after page 50 of the pdf file]

This nearly verbatim account of the Japan-U.S. Security Subcommittee meeting illustrates how the U.S. representatives pursued the wide range of issues and goals outlined in the briefing book above. Among the interesting points are the clear signs of continued Japanese concern about a future U.S. military presence in the Pacific/East Asia; the U.S. interest in drawing the Japanese into discussion of possible increased Japanese security spending and commitments, particularly the delicate issue of Japanese contributions to peace-keeping operations (which would become more urgent during first Gulf War, as shown in documents below); and an exchange of views on the possibility of a North Korean attack, with Japanese intelligence assessments indicating that Pyongyang might attack if it could get Soviet or Chinese support. Another topic that would become more pressing in the decade ahead was the different U.S. and Japanese views regarding joint development vs. purchase of military technology, with a particular focus on the next generation of fighter aircraft, in which are visible the seeds of the FSX controversy.

Document 3: Memorandum of Telephone Conversation (C) between President George H. W. Bush and Japanese Prime Minister Toshiki Kaifu, ca. August 3, 1990

This telephone call marks the start of Bush’s personal diplomatic effort to secure support and a financial contribution from Japan for the nascent coalition against Iraq. In discussing possible sanctions against Iraq and the freezing of Iraqi and Kuwaiti assets, Bush acknowledges the Issue of Japanese dependence on Middle East oil is as a critical factor for Kaifu.

Document 4: Memorandum of Telephone Conversation (C) between President George H. W. Bush and Japanese Prime Minister Toshiki Kaifu, ca. August 13, 1990

In this telephone call, Bush thanks Kaifu for supporting sanctions against Iraq, and presses a new request – for Japanese support with military operations. Kaifu’s reply underscores the difficult political bind such a request places him in: “With respect to the military side that you have touched upon, because of our constitutional constraints and Diet resolutions, it is almost a national policy in this regard so it would be next to unthinkable to participate directly in the military sphere.” Bush responds: “My bottom line is that when this chapter of history is written, Japan and the U.S. and a handful of other countries will have stood side-by-side.”

Document 5: Memorandum of Telephone Conversation (C) between President George H. W. Bush and Japanese Prime Minister Toshiki Kaifu, ca. September 13, 1990

In this conversation, Kaifu informs Bush of the economic aid that Japan will deliver to Egypt, Jordan, and Turkey as result of the Persian Gulf Crisis. Bush welcomes this news, stressing how it will provide good ammunition against critics in Congress who have been taking America’s allies to task for failing to contribute to the cause.

Document 6: Memorandum of Conversation (S) between President George H. W. Bush and Japanese Prime Minister Toshiki Kaifu, ca. September 29, 1990

After several exchanges by telephone, Bush and Kaifu are finally able to meet in person to discuss the Iraq crisis as well as other issues. The conversation ranges from Tokyo’s support of U.S. troops stationed in Japan, to the Uruguay Round of trade talks, and other topics. Bush continues pressing Kaifu on securing a Japanese contribution to the military effort, as well as on increasing host nation support for U.S. forces in Japan. The talk also turns to relations between Tokyo and Moscow, and Kaifu’s hopes that the upcoming visit by Soviet leader Mikhail Gorbachev visit will create an opening on the Northern Territories issue and the long-postponed peace treaty marking an official end to hostilities between the two countries after World War II.

Document 7: Memorandum (C), Under Secretary of the Treasury for International Affairs Lawrence Summers to Secretary of the Treasury Robert Rubin, Subject: Japanese Recession and the Global Economy, June 9, 1995

In this memorandum, Treasury Under Secretary Summers details the signs of an impending economic recession in Japan, including the consequences for the U.S., and makes recommendations for addressing the situation. Summers calls for the U.S. to give more attention to its dialogue with Japan on macroeconomic issues, including a meeting between Treasury Secretary Rubin and Japanese Finance Minister Takemura during an upcoming meeting between President Clinton and Japanese Prime Minister Murayama at the Halifax G-7 summit. The attached memo discusses fears that a “1930s-type scenario” could unfold in which high interest rates, deflation, rising unemployment and yen appreciation reinforce one another; it further lays out a possible, if not probable, worst-case “black hole” scenario, noted in the introduction. To address the current situation, [tk: according to whom??] the U.S. needs to press Japan to use monetary and fiscal policy more aggressively to reduce the risk of an economic free fall.

Document 8: Memorandum (S). Undersecretary of the Treasury for International Affairs Lawrence Summers to Secretary Robert Rubin, Subject: Update on Japan [with cover memorandum from Rubin to Summers dated July 27, 1995], July 26, 1995

In this memorandum, a follow-up to the one noted above, Summers provides Rubin with a detailed report on U.S. efforts to persuade Japan to take effective steps to head off an economic crisis in the country, including a detailed account of Timothy Geithner’s meetings with Finance Ministry and Bank of Japan officials. As an attached memorandum from Geithner summarizes the situation in Japan, there is “deep pessimism” in Tokyo about the economy, and the combination of political constraints and a cautious Ministry of Finance and Bank of Japan may continue to work against urgent and aggressive action. Rubin’s final judgment on the effort seems more resigned than optimistic: “we’ve done everything we can do” to affect the situation.

Document 9: Briefing Memorandum (original classification unknown), Senior Deputy Assistant Secretary of the Treasury for International Affairs Timothy F. Geithner to Secretary of the Treasury Robert Rubin and Deputy Secretary Lawrence Summers, Subject: Briefing for Your Meeting with Hiroshi Mitsuzuka, Minister of Finance, Japan, ca. April 27, 1997

In this memorandum, Geithner briefs Rubin and Summers on the main issues for the upcoming meeting with Japanese Finance Minister Mitsuzuka. The list of American concerns (which sound oddly familiar in light of more recent and widespread economic and financial woes) includes Japan’s economic future, banking system, financial reform, and anti-corruption efforts. For example, the U.S. fears that Japan’s banking system is being weakened by the overhang of bad loans and so was vulnerable to another economic downturn. Geithner also advises Rubin and Summers to continue pressing Tokyo on financial reform and deregulation to create opportunities for foreign business, while improving transparency and disclosure measures to reduce risk for foreign investors. The U.S. had a clear interest in the success of the “Big Bang” financial reforms, as U.S. firms would benefit from the greater ability to market new products and services in Japan, the relaxation of foreign exchange controls, deregulation of asset management and the expanded use of derivatives (though in hindsight the latter may not have been so wise, given the role of risky derivatives in creating the more recent economic crisis).

Document 10: Briefing Memorandum (U-Sensitive), Senior Deputy Assistant Secretary for International Affairs Timothy F. Geithner to Deputy Secretary of the Treasury Lawrence Summers, Subject: Briefing for Your Lunch with Eisuke Sakakibara, Vice Minister of Finance for International Affairs, Ministry of Finance, Japan, August 12, 1997

In this memorandum, Geithner briefs Summers for his upcoming meeting with Japanese Vice Minister of Finance Eisuke Sakakibara. The document provides a good overview of U.S. policy goals regarding Japan during Clinton’s first term and for his second term. Echoing points made in the April 1997 memorandum noted above, Geithner notes that recent data reveal problems with Tokyo’s strategy of relying on domestic demand to tackle economic problems. An attached paper says that the U.S. faces two major risks with Japan: a rising current account surplus that could spark political tensions in the face of closed Japanese markets; and spillover to the international financial system if the legal, regulatory and supervisory environment is not properly revised to deal with issues rooted in the “Big Bang” opening of Japanese markets to the world. In a portent of things to come, Thailand’s economic problems indicate the possible spread of economic ills beyond Japan; i.e., signs are emerging of what would become the Asian Economic Crisis of the late 1990s.

Document 11: Cable (C), United States. Department of State to United States Embassy. Korea (South), Subject: Secretary Albright’s Meeting with Foreign Minister Koumura of Japan, August 16, 1999

This cable reports on Secretary Albright’s exchange of views with Japanese Foreign Minister Koumura about the upcoming Group of Eight summit in Okinawa (where Albright hopes Japan will take a strong leadership role) and the Asia-Pacific Economic Cooperation meeting in Auckland; U.S. relations with China; and issues regarding Taiwan and Iran. Albright also discusses U.S. steps to get relations with Beijing back on track after the accidental NATO bombing of the Chinese embassy in Belgrade on May 7, 1999, during Operation Allied Force, when five U.S. bombs hit the embassy, killing three Chinese reporters. Albright refers to efforts to give the Chinese “a means of getting themselves out of a corner.” Towards this end, Albright tells Koumura that the U.S. has provided China with a factual account of what happened, and that CIA Director George Tenet and his agency have taken responsibility for the mistaken targeting.

Document 12: Background Paper (S), Subject: Assistant Secretary of Defense (ISA) Franklin Kramer, U.S.-Japan Bilateral Meeting, 2 November 2000; October 30, 2000

This and the following document provide a window into the policy goals and concerns preoccupying the U.S. as the security relationship with Japan headed into a new century after marking the 40th anniversary of the 1960 Mutual Security Treaty. As DOD official Franklin Kramer heads into the meetings, the alliance remains the centerpiece of U.S. regional security and Japanese national security strategy. Among the U.S. goals for the meeting are: starting a strategic dialogue looking to the new century; exchanging views on China; and stressing the relationship of trilateral activities (i.e., U.S.-Japan-South Korea) to enhanced regional cooperation. In this connection, Japan-South Korea defense relations are improving, with moves being made towards establishing real security ties, including joint exercises in 1999.

The scope paper for the meeting surveys the political and economic backdrop to the meeting. The political scene is marked by deepening political fragmentation and declining popular support for the current Japanese coalition government, with a forecast for weak coalition governments in the foreseeable future. Economically, recovery from the downturn in the mid-90s remains the key concern, as mixed signals leave the future unclear. Other familiar issues include Japan’s defense budget; continuing legal uncertainties surrounding use of the country’s Self-Defense Forces, including in international peacekeeping operations (an issue that first came to fore in first Gulf war, as noted in earlier documents); the need to keep a close watch on Okinawa politics and their impact on the U.S. presence there; and the related discussions over relocating U.S. forces. There is also little progress on another long-standing issue, as Japan-Russian relations are overshadowed by Russian leader Vladimir Putin’s refusal to accept a December 2000 target for concluding a peace treaty and resolving the Northern Territories issue

Document 13: Background Paper (C), Subject: U.S.-Japan Bilateral Meeting, Renaissance Ilikai Waikiki Hotel, Honolulu, Hawaii, November 2, 2000, 1530-1700, October 30, 2000

This document provides more details on the U.S. goals and concerns surrounding the future of U.S.-Japan security cooperation in the 21st century. The broad areas of concern include the long-term dialogue with Tokyo on the future of the alliance, China, and regional cooperation in Asia on security issues. Regarding the future of the alliance, the Pentagon wants to use Japan’s Mid-Term Defense Plan and the U.S. Quadrennial Defense Review as the basis for a long-term dialogue. As the brief lays out the overall objective: “This is not about the U.S. asking Japan to do more as has been the case sometimes in the past. Rather it is about asking ourselves what kind of alliance will best serve as the foundation for regional stability for the next forty years.” One specific goal is to push Japan to increase its role in international peacekeeping. While the U.S. believes the region is becoming more accepting of such a Japanese role, Washington recognizes the uncertain public support in Japan for this, being well aware of the ongoing debate over the future course and nature of the country’s strategic role in the world.

Regarding China, the brief notes again the efforts to smooth the waters after the accidental bombing of the Chinese embassy in Belgrade. Longer-term concerns are underscored by the tough political rhetoric in the recent China Defense White Paper, which will more likely feed rather than dampen those who are warning of a rising “China threat,” and the perception that the Chinese military is hawkish and pressing a hard line regarding the U.S., Taiwan and Japan. In part to address these concerns and, if possible, engage Beijing in a more cooperative relationship, the U.S. had launched the Asia Pacific Regional Initiative to support development of a regional defense initiative to promote multinational activities to address nontraditional security threats and contingencies. As the brief emphasizes, political, economic and social transitions in the region will produce new security challenges that cross borders and affect common security. Underscoring that multilateral initiatives will not diminish existing bilateral relationships, but will address the reality that any military action taken in Asia will have to be multilateral in nature, the brief also makes a point of noting that China is not to be excluded, but is a potential partner.

 

TOP-SECRET – The Creation of the U.S. Spy Satellites

In September 1992 the Department of Defense acknowledged the existence of the National Reconnaissance Office (NRO), an agency established in 1961 to manage the development and operation of the nation’s reconnaissance satellite systems.  The creation of the NRO was the result of a number of factors.

On May 1, 1960 Francis Gary Powers took off from Peshawar, Pakistan on the U-2 mission designated Operation GRAND SLAM.  The flight was planned to take him over the heart of the Soviet Union and terminate at Bodo, Norway.  The main target was Plesetsk, which communications intercepts had indicated might be the site of an ICBM facility.1  When the Soviet Union shot down his plane and captured him alive, they also forced President Dwight Eisenhower to halt aerial overflights of Soviet territory.

At that time the U.S. had two ongoing programs to produce satellite vehicles that could photograph Soviet territory.  Such vehicles would allow far more frequent coverage than possible with manned aircraft.  In addition, they would avoid placing the lives of pilots at risk and eliminate the risks of international incidents resulting from overflights.

The Air Force program, designated SAMOS, sought to develop a number of different satellite systems–including one that would radio its imagery back to earth and another that would return film capsules.  The CIA program, CORONA, focused solely on developing a film return satellite.

However, both the CIA and Air Force programs were in trouble.  Launch after launch in the CORONA program, eleven in all by May 1, 1960, eight of which carried cameras, had resulted in failure–the only variation was in the cause.  Meanwhile, the SAMOS program was also experiencing difficulties, both with regard to hardware and program definition.2

Concerns over SAMOS led President Eisenhower to direct two groups to study both the technical aspects of the program as well as how the resulting system would be employed.  The ultimate result was a joint report presented to the President and NSC on August 25, 1960.3

As a result of that meeting Eisenhower approved a first SAMOS launch in September, as well as reorientation of the program, with the development of high-resolution film-return systems being assigned highest priority while the electronic readout system would be pursued as a research project.  With regard to SAMOS management, he ordered that the Air Force institute special management arrangements, which would involve a direct line of authority between the SAMOS project office and the Office of the Air Force Secretary, bypassing the Air Staff and any other intermediate layers of bureaucracy.4

Secretary of the Air Force Dudley C. Sharp wasted little time creating the recommended new structure and procedures.  On August 31st Sharp signed Secretary of the Air Force Order 115.1, establishing the Office of Missile and Satellite Systems within his own office to help him manage the SAMOS project. With Order 116.1, Sharp created a SAMOS project office at the Los Angeles headquarters of the Air Force Ballistic Missile Division (AFBMD) as a field extension of the Office of the Secretary of the Air Force to carry out development of the satellite.5

The impact of the orders, in practice, was that the director of the SAMOS project would report directly to Under Secretary of the Air Force Joseph V. Charyk, who would manage it in the Secretary’s name. In turn, Charyk would report directly to the Secretary of Defense.6

The changes would not stop there.  The urgency attached to developing a successful reconnaissance satellite led, ultimately, to the creation of a top secret program and organization to coordinate the entire national reconnaissance effort.

Several of the documents listed below also appear in either of two National Security Archive microfiche collections on U.S. intelligence.  The U.S. Intelligence Community: Organization, Operations and Management: 1947-1989 (1990) and U.S. Espionage and Intelligence: Organization, Operations, and Management, 1947-1996 (1997) publish together for the first time recently declassified documents pertaining to the organizational structure, operations and management of the U.S. Intelligence Community over the last fifty years, cross-indexed for maximum accessibility.  Together, these two sets reproduce on microfiche over 2,000 organizational histories, memoranda, manuals, regulations, directives, reports, and studies, totaling more than 50,000 pages of documents from the Office of the Director of Central Intelligence, the Central Intelligence Agency, National Reconnaissance Office, National Security Agency, Defense Intelligence Agency, military service intelligence organizations, National Security Council, and other official government agencies and organizations.

 


Document 1
Joseph Charyk, Memorandum for the Secretary of Defense
Management of the National Reconnaissance Program
24 July 1961
Top Secret
1 p.

The organizational changes resulting from the decisions of August 25, 1960 and their implementation left some unsatisfied.  In particular, James Killian and Edwin Land, influential members of the President’s intelligence advisory board pushed for permanent and institutionalized collaboration between the CIA and Air Force.  After the Kennedy administration took office the push to establish a permanent reconnaissance organization took on additional life.  There was a strong feeling in the new administration, particularly by Secretary of Defense Robert McNamara and his deputy, Roswell Gilpatric, that a better, more formalized relationship was required.7

On July 24, 1961, Air Force Undersecretary Joseph Charyk sent a memorandum to McNamara attaching two possible memoranda of agreement for creation of a National Reconnaissance Program, along with some additional material.

Document 2
Memorandum of Understanding
Management of the National Reconnaissance Program (Draft)
20 July 1961
Top Secret
5 pp.

This memo specified establishment of a National Reconnaissance Program (NRP) consisting of “all satellite and overflight reconnaissance projects whether overt or covert,” and including “all photographic projects for intelligence, geodesy and mapping purposes, and electronic signal collection projects for electronic signal intelligence and communications intelligence.”

To manage the NRP, a National Reconnaissance Office (NRO) would be established on a covert basis. The NRO director (DNRO) would be the Deputy Director for Plans, CIA (at the time, Richard Bissell) while the Under Secretary of the Air Force would serve as Deputy Director (DDNRO). The DNRO would be responsible for the management of CIA activities, the DDNRO and the Air Force for Defense Department activities.  The DoD, specifically the Air Force acting as executive agent, would be primarily responsible for technical program management, scheduling, vehicle operations, financial management and overt contract administration, while the CIA would be primarily responsible for targeting each satellite.  The office would operate under streamlined management procedures similar to those established in August 1960 for SAMOS.

Document 3
Memorandum of Understanding
Management of the National Reconnaissance Program (Draft)
21 July 1961
Top Secret
4 pp.

This secondary memorandum was prepared at the suggestion of Defense Department General Counsel Cyrus Vance.  It offered a quite different solution to the problem.  As with the primary memo, it established a NRP covering both satellite and aerial reconnaissance operations.  But rather than a jointly run program, it placed responsibility for management solely in the hands of a covertly appointed Special Assistant for Reconnaissance, to be selected by the Secretary of Defense.  The office of the Special Assistant would handle the responsibilities assigned to the NRO in the other MOU.  The CIA would “assist the Department of Defense by providing support as required in areas of program security, communications, and covert contract administration.”

Document 4
Memorandum
Pros and Cons of Each Solution
Not dated
Top Secret
2 pp.

The assessment of pros and cons favored the July 20 memorandum, listing five pros for the first solution and only two for the second.  The first solution would consolidate responsibilities into a single program with relatively little disruption of established management, represented a proven solution, would require no overt organizational changes, would allow both agencies to retain authoritative voices in their areas of expertise, and provided a simplified management structure.  The two cons noted were the division of program responsibility between two people, and that “successful program management depends upon mutual understanding and trust of the two people in charge of the NRO.”  It would not be too long before that later observation would take on great significance.

In contrast, there were more cons than pros specified for the second solution.  The only two points in its favor were the consolidation of reconnaissance activities into a single program managed by a single individual and the assignment of complete responsibility to the agency (DoD) with the most resources.  Foremost of the six cons was the need for DoD to control and conduct large-scale covert operations, in as much as it was an entity “whose normal methods are completely foreign to this task.”

Document 5
Roswell Gilpatric, Letter to Allen Dulles
Management of the National Reconnaissance Program
6 September 1961
Top Secret
4 pp.

On July 28, 1961, four days after receiving Charyk’s memorandum and draft memoranda of understanding, McNamara instructed Air Force Undersecretary Joseph Charyk to continue discussions with the key officials and advisers in order to resolve any organizational difficulties that threatened to impede the satellite reconnaissance effort.  The ultimate result was this letter from Deputy Secretary of Defense Roswell Gilpatric to Dulles, which confirmed “our agreement with respect to the setting up of the National Reconnaissance Program.”

The letter specified the creation of a NRP.  It also established the NRO, a uniform security control system, and specified that the NRO would be directly responsive to the intelligence requirements and priorities specified by the United States Intelligence Board.  It specified implementation of NRP programs assigned to the CIA through the Deputy Director for Plans.  It designated the Undersecretary of the Air Force as the Defense Secretary’s Special Assistant for Reconnaissance, with full authority in DoD reconnaissance matters.

The letter contained no specific assignment of responsibilities to either the CIA or Defense Department, stating only that “The Directors of the National Reconnaissance Office will … insure that the particular talents, experience and capabilities within the Department of Defense and the Central Intelligence Agency are fully and most effectively utilized in this program.”

The letter provided for the NRO to be managed jointly by the Under Secretary of the Air Force and the CIA Deputy Director for Plans (at the time, still Richard Bissell).  A May 1962 agreement between the CIA and Defense Department established a single NRO director.  Joseph Charyk was named to the directorship shortly afterward.

Document 6
Joseph Charyk
Memorandum for NRO Program Directors/Director, NRO Staff
Organization and Functions of the NRO
23 July 1962
Top Secret
11 pp.

This memorandum represents the fundamental directive on the organization and functions of the NRO.  In addition to the Director (there was no provision for a deputy director), there were four major elements to the NRO–the NRO staff and three program elements, designated A, B, and C.  The staff’s functions included assisting the director in dealing with the USIB and the principal consumers of the intelligence collected.

The Air Force Office of Special Projects (the successor to the SAMOS project office) became NRO’s Program A.  The CIA reconnaissance effort was designated Program B, while the Navy’s space reconnaissance effort, at the time consisting of the Galactic Radiation and Background (GRAB) satellite, whose radar ferret mission involved the collection of Soviet radar signals, became Program C.  Although the GRAB effort was carried out by the Naval Research Laboratory, the director of the Office of Naval Intelligence would serve as Program C director until 1971.8

Document 7
Agreement between the Secretary of Defense and the Director of Central Intelligence on Management of the National Reconnaissance Program
13 March 1963
Top Secret
6 pp.

In December 1962, Joseph Charyk decided to leave government to become president of the COMSAT Corporation.  By that time a number of disputes between the CIA and NRO had contributed to Charyk’s view that the position of the NRO and its director should be strengthened.  During the last week of February 1963, his last week in office, he completed a revision of a CIA draft of a new reconnaissance agreement to replace the May 1962 agreement (which had replaced the September 6, 1961 agreement).  Charyk took the revision to Deputy Secretary of Defense Roswell Gilpatric.  It appears that some CIA-suggested changes were incorporated sometime after Charyk left office.  On March 13, Gilpatric signed the slightly modified version on behalf of DoD.  It was sent to the CIA that day and immediately approved by DCI John McCone, who had replaced Allen Dulles in November 1961.9

The new agreement, while it did not include all the elements Charyk considered important, did substantially strengthen the authority of the NRO and its director.  It named the Secretary of Defense as the Executive Agent for the NRP.  The program would be “developed, managed, and conducted in accordance with policies and guidance jointly agreed to by the Secretary of Defense and the Director of Central Intelligence.”

The NRO would manage the NRP “under the direction, authority, and control of the Secretary of Defense.”  The NRO’s director would be selected by the Defense Secretary with the concurrence of the DCI, and report to the Defense Secretary.  The NRO director was charged with presenting to the Secretary of Defense “all projects” for intelligence collection and mapping and geodetic information via overflights and the associated budgets, scheduling all overflight missions in the NRP, as well as engineering analysis to correct problems with collection systems.  With regard to technical management, the DNRO was to “assign all project tasks such as technical management, contracting etc., to appropriate elements of the DoD and CIA, changing such assignments, and taking any such steps he may determine necessary to the efficient management of the NRP.”

Document 8
Department of Defense Directive Number TS 5105.23
Subject: National Reconnaissance Office
27 March 1964
Top Secret
4 pp.

This directive replaced the original June 1962 DoD Directive on the NRO, and remains in force today. The directive specifies the role of the Director of the NRO, the relationships between the NRO and other organizations, the director’s authorities, and security. It specified that documents or other material concerning National Reconnaissance Program matters would be handled within a special security system (known as the BYEMAN Control System).

Document 9
President’s Foreign Intelligence Advisory Board
Memorandum for the President
Subject: National Reconnaissance Program
2 May 1964
Top Secret
11 pp.

The 1963 CIA-DoD agreement on the NRP did not end the battles between the CIA and NRO–as some key CIA officials, including ultimately DCI John McCone, sought to reestablish a major role for the CIA in the satellite reconnaissance effort.  The continuing conflict was examined by the PFIAB.

The board concluded that “the National Reconnaissance Program despite its achievements, has not yet reached its full potential.”  The fundamental cause for the NRP’s shortcomings was “inadequacies in organizational structure.”  In addition, there was no clear division of responsibilities and roles between the Defense Department, CIA, and the DCI.

The recommendations of the board represented a clear victory for the NRO and its director.  The DCI should have a “large and important role” in establishing intelligence collection requirements and in ensuring that the data collected was effectively exploited, according to the board.  In addition, his leadership would be a key factor in the work of the United States Intelligence Board relating to the scheduling of space and airborne reconnaissance missions.

But the board also recommended that President Johnson sign a directive which would assign to NRO’s Air Force component (the Air Force Office of Special Projects) systems engineering, procurement, and operation of all satellite reconnaissance systems.

Document 10
Agreement for Reorganization of the National Reconnaissance Program
13 August 1965
Top Secret
6 pp.

Despite the recommendations of the May 2, 1964 PFIAB report, which were challenged by DCI John McCone, no action was taken to solidify the position of the NRO and its director.  Instead prolonged discussions over a new agreement continued into the summer of 1965.  During this period the CIA continued work on what would become two key satellite programs–the HEXAGON/KH-9 imaging and RHYOLITE signals intelligence satellites.

In early August, Deputy Secretary of Defense Cyrus Vance and CIA official John Bross reached an understanding on a new agreement, and it was signed by Vice Adm. William F. Raborn (McCone’s successor) and Vance on August 13, 1965.  It represented a significant victory for the CIA, assigning key decision-making authority to an executive committee, authority that was previously the prerogative of the NRO director as the agent of the Secretary of Defense.

The Secretary of Defense was to have “the ultimate responsibility for the management and operation of the NRO and the NRP,” and have the final power to approve the NRP budget.  The Secretary also was empowered to make decisions when the executive committee could not reach agreement.

The DCI was to establish collection priorities and requirements for targeting NRP operations, as well as establish frequency of coverage, review the results obtained by the NRP and recommend steps for improving its results if necessary, serve on the executive committee, review and approve the NRP budget, and provide security policy guidance.

The NRP Executive Committee established by the agreement would consist of the DCI, Deputy Secretary of Defense, and Special Assistant to the President for Science and Technology.  The committee was to recommend to the Secretary of Defense the “appropriate level of effort for the NRP,” approve or modify the consolidated NRP and its budget, approve the allocation of responsibility and the corresponding funds for research and exploratory development for new systems.  It was instructed to insure that funds would be adequate to pursue a vigorous research and development program, involving both CIA and DoD.  The executive committee was to assign development of sensors to the agency best equipped to handle the task.

The Director of the NRO would manage the NRO and execute the NRP “subject to the direction and control of the Secretary of Defense and the guidance of the Executive Committee.”  His authority to initiate, improve, modify, redirect or terminate all research and development programs in the NRP, would be subject to review by the executive committee.  He could demand that all agencies keep him informed about all programs undertaken as part of the NRP.

Document 11
Analysis of “A $1.5 Billion Secret in Sky” Washington Post, December 9, 1973
Not dated
Top Secret
33 pp.

Throughout the 1960s, the United States operation of reconnaissance satellites was officially classified, but well known among specialists and the press.  However, it was not until January 1971 that the NRO’s existence was first disclosed by the media, when it was briefly mentioned in a New York Times article on intelligence and foreign policy.

A much more extensive discussion of the NRO appeared in the December 9, 1973 Washington Post as a result of the inadvertent mention of the reconnaissance office in a Congressional report.  The NRO prepared this set of classified responses to the article, clearly intended for those in Congress who might be concerned about the article’s purported revelations about the NRO’s cost overruns and avoidance of Congressional oversight.

Document 12
E.C. Aldridge, Jr. (Director, NRO)
Letter to David L. Boren, Chairman,
Senate Select Committee on Intelligence
21 November 1988
Secret
3 pp.

The late 1980s saw the beginning of what eventually would be a wide-ranging restructuring of the NRO.  In November 1988 NRO director Edward “Pete” Aldridge wrote to Senator David Boren, Chairman of the Senate Select Committee on Intelligence, concerning the findings of an extensive study (the NRO Restructure Study) of the organizational structure of the NRO.

Aldridge proceeded to report that, after having discussed the study’s recommendations with Secretary of Defense Frank Carlucci and Director of Central Intelligence William Webster, he was directing the development of plans to implement the recommendations.  Specific changes would include the creation of a centralized systems analysis function “to conduct cross-system trades and simulations within the NRO,” creation of a “User Support” function to improve NRO support to intelligence community users as well as to the growing number of operational military users, and the dispersal of the NRO Staff to the new units, with the staff being replaced by a group of policy advisers.  In addition, Aldridge foresaw the establishment of an interim facility “to house the buildup of the new functions and senior management.”  The ultimate goal, projected for the 1991-92 period, would be the “collocation of all NRO elements [including the Los Angeles-based Air Force Office of Special Projects] . . . in the Washington, D.C. area.”

Document 13
Memorandum of Agreement
Subject: Organizational Restructure of the National Reconnaissance Office
15 December 1988
Secret
2 pp.

This memorandum of agreement, signed by the Director of the NRO and the directors of the NRO’s three programs commits them to the restructuring discussed in Edward Aldridge’s November 21 letter to Senator Boren.

Many changes recommended by Aldridge, who left office at the end of 1988, were considered by a 1989 NRO-sponsored review group and subsequently adopted.

Document 14
Report to the Director of Central Intelligence
DCI Task Force on The National Reconnaissance Office, Final Report
April 1992
Secret
35 pp.

This report was produced by a panel chaired by former Lockheed Corporation CEO Robert Fuhrman, whose members included both former and serving intelligence officials.  It focused on a variety of issues other than current and possible future NRO reconnaissance systems.  Among the issues it examined were mission, organizational structure, security and classification.

One of its most significant conclusions was that the Program A,B,C structure that had been instituted in 1962 (see Document 6) “does not enhance mission effectiveness” but “leads to counterproductive competition and makes it more difficult to foster loyalty and to maintain focus on the NRO mission.”  As a result, the panel recommended that the NRO be restructured along functional lines with imagery and SIGINT directorates.  This change was made even before the final version of the report was issued.

The report also noted that while the NRO’s existence was officially classified it was an “open secret” and that seeking to attempt to maintain such “open secrets … weakens the case for preserving ‘real’ secrets.”  In addition, such secrecy limited the NRO’s ability to interact with customers and users.  The group recommended declassifying the “fact of” the NRO, as well as providing information about the NRO’s mission, the identities of senior officials, headquarters locations, and the NRO as a joint Intelligence Community-Defense Department activity.

Document 15
National Security Directive 67
Subject: Intelligence Capabilities: 1992-2005
30 March 1992
Secret
2 pp.

NSD 67 directed a number of changes in U.S. intelligence organization and operations.  Among those was implementation of the plan to restructure the NRO along functional lines–eliminating the decades old Program A (Air Force), B (CIA), and C (Navy) structure and replacing it with directorates for imaging, signals intelligence, and communication systems acquisition and operations–as recommended by the Fuhrman panel.  As a result, Air Force, CIA, and Navy personnel involved in such activities would now work together rather than as part of distinct NRO components.

Document 16
Email message
Subject: Overt-Covert-DOS-REP-INPUT
27 July 1992
Secret
1 p.

In addition to the internal restructuring of the NRO, 1992 saw the declassification of the organization, as recommended by the Fuhrman report (Document 14), for a number of reasons–to facilitate interaction with other parts of the government, to make it easier for the NRO to support military operations, and in response to Congressional pressure to acknowledge the obvious.  As part of the process of considering declassification NRO consulted Richard Curl, head of the Office of Intelligence Resources of the State Department’s Bureau of Intelligence and Research–the office which provides INR with expertise and support concerning technical collection systems.  Curl recommended a low-key approach to declassification.

Document 17
Memorandum for Secretary of Defense, Director of Central Intelligence
Subject: Changing the National Reconnaissance Office (NRO) to an Overt Organization
30 July 1992
Secret
3 pp.

w/ attachments:
Document 17a: Mission of the NRO, 1 p.

Document 17b:  Implications of Proposed Changes, 4 pp. (Two versions)
 Version One
 Version Two

These memos, from Director of the NRO Martin Faga, represent key documents in the declassification of the NRO. The memo noted Congressional pressure for declassification and that Presidential certification that declassification would result in “grave damage to the nation … would be difficult in this case.”

Faga reported that as a result of an NRO review he recommended declassifying the fact of NRO’s existence, issuing a brief mission statement, acknowledging the NRO as a joint DCI-Secretary of Defense endeavor, and identifying top level NRO officials. He also noted that his recommendations attempted to balance concerns about classifying information that realistically could not be protected, while maintaining an ability to protect matters believed to require continued protection.

Secretary of Defense Richard Cheney, DCI Robert Gates, and President Bush approved the recommendations in September and a three-paragraph memorandum to correspondents acknowledging the NRO and NRP was issued on September 18, 1992.

Document 17b comes in two versions, representing different security reviews.  Material redacted from the first version includes provisions of National Security Directive 30 on space policy, expression of concern over “derived disclosures,” and the assessment that the “high degree of foreign acceptance of satellite reconnaissance, and the fact that we are not disclosing significant new data,” would not lead to any significant foreign reaction.  Another redacted statement stated that “legislation . . . exempting all NRO operational files from [Freedom of Information Act] searches” was required.

Document 18
Final Report: National Reconnaissance Program Task Force for the Director of Central Intelligence
September 1992
Top Secret
15 pp.

The end of the Cold War and collapse of the Soviet Union required the U.S. intelligence community and NRO to reconsider how U.S. overhead reconnaissance systems were employed and what capabilities future systems should possess.  To consider these questions DCI Robert Gates appointed a task force, chaired by his eventual successor, R. James Woolsey.

The final report considers future needs and collection methods, industrial base considerations, procurement policy considerations, international industrial issues, and transition considerations.  Its recommendations included elimination of both some collection tasks as well as some entire types of present and planned collection systems.

Document 19
NRO Protection Review, “What is [BYEMAN]?”
6 November 1992
Top Secret
18 pp.

Traditionally, the designations of Sensitive Compartmented Information (SCI) compartments–such as UMBRA to indicate particularly sensitive communications intelligence and RUFF to intelligence based on satellite imagery–have themselves been classified.  In recent years, however, the NSA and CIA have declassified a number of such terms and their meaning. One exception has been the term “BYEMAN”– the BYEMAN Control System being the security system used to protect information related to NRO collection systems (in contrast to their products) and other aspects of NRO activities, including budget and structure.  Thus, the term BYEMAN has been deleted in the title of the document and throughout the study–although the term and its meaning has become known by specialists and conveys no information beyond the text of any particular document.

This study addresses the use of the BYEMAN classification within the NRO, its impact on contractors and other government personnel, and the consequences of the current application of the BYEMAN system.  The study concludes that placing information in the highly restrictive BYEMAN channels (in contrast to classifying the information at a lower level) may unduly restrict its dissemination to individuals who have a legitimate need to know.

Document 20
NRO Strategic Plan
18 January 1993
Secret
19 pp.

A study headed by James Woolsey (Document 18), President Clinton’s first DCI, heavily influenced the contents of this early 1993 document.  The plan’s introduction notes that while some collection tasks will no longer be handled by overhead reconnaissance the “uncertain nature of the world that is emerging from the end of the ‘cold war’ places a heavy premium on overhead reconnaissance.”  At the same time, “this overhead reconnaissance challenge must be met in an era of a likely reduced national security budget.”

The strategic plan is described in the introduction, as “the ‘game plan’ to transition current overhead collection architectures into a more integrated, end-to-end architecture for improved global access and tasking flexibility.”

The document goes on to examine the strategic context for future NRO operations, NRO strategy, strategic objectives, and approaches to implementation.  Strategic objectives include improving the responsiveness of NRO systems by developing an architecture that spans the entire collection and dissemination process, from the identification of requirements to dissemination of the data collected.

Document 21
National Reconnaissance Office: Collocation Construction Project, Joint DOD and CIA Review Report
November 1994
Unclassified
28 pp.

In an August 8, 1994 press conference, Senators Dennis DeConcini (D-Az.) and John Warner (R-Va.), the chairman and vice chairman of the Senate Select Committee on Intelligence accused the NRO of concealing from Congress the cost involved in building a new headquarters to house government and contractor employees.  Previously NRO activities in the Washington area were conducted from the Pentagon and rented space in the Washington metropolitan area.  The collocation and restructuring decisions of the late 1980s and early 1990s had resulted in a requirement for a new headquarters facility.10

The accusations were followed by hearings before both the Senate and House intelligence oversight committees–with House committee members defending the NRO and criticizing their Senate colleagues.  While they noted that some of the documents presented by the NRO covering total costs were not presented with desirable clarity, the House members were more critical of the Senate committee for inattention to their committee work.11

This joint DoD and CIA review of the project, found “no intent to mislead Congress” but that “the NRO failed to follow Intelligence Community budgeting guidelines, applicable to all the intelligence agencies,” that would have caused the project to be presented as a “New Initiative,” and that the cost data provided by the NRO “were not presented in a consistent fashion and did not include a level of detail comparable to submissions for . . . intelligence community construction.”

Document 22
Memorandum for Director of Central Intelligence
Subject: Small Satellite Review Panel
Unclassified
July 1996

The concept of employing significantly smaller satellites for imagery collection was strongly advocated by Rep. Larry Combest during his tenure (1995-97) as chairman of the House Permanent Select Committee on Intelligence.  As a result the DCI was instructed to appoint a panel of experts to review the issue.12

Panel members included former NRO directors Robert Hermann and Martin Faga; former NRO official and NSA director Lew Allen; scientist Sidney Drell and four others.  The panel’s report supported a radical reduction in the size of most U.S. imagery satellites.  The panel concluded that “now is an appropriate time to make a qualitative change in the systems architecture of the nation’s reconnaissance assets,” in part because “the technology and industrial capabilities of the country permit the creation of effective space systems that are substantially smaller and less costly than current systems.”  Thus, the panel saw “the opportunity to move towards an operational capability for . . . imagery systems, that consists of an array of smaller, cheaper spacecraft in larger number with a total capacity which is at least as useful as those currently planned and to transport them to space with substantially smaller and less costly launch vehicles.”13

The extent to which those recommendations have influenced NRO’s Future Imagery Architecture plan is uncertain–although plans for large constellations of small satellites have not usually survived the budgetary process.

Document 23
Defining the Future of the NRO for the 21st Century, Final Report, Executive Summary
August 26, 1996
Unclassified
30 pp.

This report was apparently the first major outside review of the NRO conducted during the Clinton administration, and the first conducted after the NRO’s transformation to an overt institution and its restructuring were firmly in place.

Among those conducting the review were former Vice Chairman of the Joint Chiefs of Staff, Adm. David E. Jeremiah, former NRO director Martin Faga, and former Deputy Director of Central Intelligence John McMahon.  Issues studied by the panel included, inter alia, the existence of a possible alternative to the NRO, NRO’s mission in the 21st Century, support to military operations, security, internal organization, and the relationship with NRO’s customers.

After reviewing a number of alternatives, the panel concluded that no other arrangement was superior for carrying out the NRO mission.  It did, however, recommend, changes with regards to NRO’s mission and internal organization.  The panel concluded that where the NRO’s current mission is “worldwide intelligence,” its future mission should be “global information superiority,” which “demands intelligence capabilities unimaginable just a few years ago.”  The panel also recommended creation of a fourth NRO directorate, which was subsequently established, to focus solely on the development of advanced systems, in order to “increase the visibility and stature of technology innovation in the NRO.”

 

Notes
1. Michael R. Beschloss, Mayday: Eisenhower, Khrushchev and the U-2 Affair (New York: Harper & Row, 1986), pp.241-42; John Ranelagh, The Agency: The Rise and Decline of the CIA, From Wild Bill Donovan to William Casey (New York: Simon & Schuster, 1986), p. 319; Gregory W. Pedlow and Donald Welzenbach, The Central Intelligence Agency and Overhead Reconnaissance: The U-2 and OXCART Programs, 1954-1974 (Washington, D.C.: CIA, 1992), pp. 170-93.2. Kenneth Greer, “Corona,” Studies in Intelligence, Supplement 17, Spring 1973 in Kevin C. Ruffner (Ed.), CORONA: America’s First Satellite Program (Washington, D.C.: Central Intelligence Agency, 1995), pp. 3-40; Gen. Thomas D. White, Air Force Chief of Staff to General Thomas S. Power, Commander in Chief, Strategic Air Command, June 29, 1960, Thomas D. White Papers, Library of Congress, Box 34, Folder “2-15 SAC.”

3. “Special Meeting of the National Security Council to be held in the Conference Room of the White House from 8:30 a.m. to 10 a.m., Thursday, August 25, 1960, undated, National Security Council Staff Papers, 1948-61, Executive Secretary’s Subject File Series, Box 15, Reconnaissance Satellites [1960], DDEL.

4. “Reconnaissance Satellite Program,” Action No.1-b at Special NSC Meeting on August 25, 1960, transmitted to the Secretary of Defense by Memo of September 1, 1960; G.B. Kistiakowsky to Allen Dulles, August 25, 1960, Special Assistant for Science and Technology, Box No. 15, Space [July-Dec 1960], DDEL.

5. Carl Berger, The Air Force in Space Fiscal Year 1961, (Washington, D.C.: Air Force Historical Liaison Office, 1966), pp.41-42; Secretary of the Air Force Order 115.1, “Organization and Functions of the Office of Missile and Satellite Systems,” August 31, 1960; Robert Perry, A History of Satellite Reconnaissance, Volume 5: Management of the National Reconnaissance Program, 1960-1965, (Washington, D.C., NRO, 1969), p. 20; Secretary of the Air Force Order 116.1, “The Director of the SAMOS Project,” August 31, 1960.

6. Perry, A History of Satellite Reconnaissance, Volume 5, p. 20.

7. Jeffrey T. Richelson, “Undercover in Outer Space: The Creation and Evolution of the NRO,” International Journal of Intelligence and Counterintelligence, 13, 3 (Fall 2000): 301-344.

8. Ibid.; GRAB: Galactic Radiation and Background (Washington, D.C.: NRL, 1997); Dwayne A. Day, “Listening from Above: The First Signals Intelligence Satellite,” Spaceflight, August 1999, pp. 339-347; NRO, Program Directors of the NRO: ABC&D, 1999.

9. Perry, A History of Satellite Reconnaissance, Volume 5, pp. 93, 96-97.

10. Pierre Thomas, “Spy Unit’s Spending Stuns Hill,” Washington Post, August 9, 1994, pp. A1, A6.

11. Walter Pincus, “Spy Agency Defended by House Panel,” Washington Post, August 12, 1994, p. A21; U.S. Congress, House Permanent Select Committee on Intelligence, NRO Headquarters Project (Washington, D.C.: U.S. Government Printing Office, 1995), pp. 3-4.

12. Walter Pincus, “Congress Debates Adding Smaller Spy Satellites to NRO’s Menu,” Washington Post, October 5, 1995, p. A14; Joseph C. Anselmo, “House, Senate at Odds Over Intel Small Sats,” Aviation Week & Space Technology, January 1, 1996, p. 19.

13. Small Satellite Review Panel, Memorandum for: Director of Central Intelligence, Subject: Small Satellite Review Panel, July 1996.

Mighty Derringer – TOP SECRET – U.S. Nuclear Terrorism Exercise Leaves Indianapolis in “Ruins”

https://i0.wp.com/www.gwu.edu/~nsarchiv/nukevault/ebb380/39_thumb.jpg

 

 

 

Washington, D.C., May 29, 2012 – A secret exercise in 1986 by a U.S. government counter-terrorist unit uncovered a host of potential problems associated with disrupting a nuclear terrorist plot in the United States. Declassified documents released under the Freedom of Information Act (FOIA) and posted today by the National Security Archive offer the first detailed public look at the inner workings of the agencies, military units and other U.S. entities responsible for protecting the country from a terrorist nuclear attack.

Today’s posting consists of over 60 documents related to MIGHTY DERRINGER, an exercise that focused on Indianapolis in December 1986. The materials provide background on the creation, in 1974-1975, of the Nuclear Emergency Search Team (NEST), a group assigned to respond to plausible threats of nuclear terrorism or extortion. Today, NEST (now the Nuclear Emergency Support Team) conducts exercises to assess its capability to respond to the possible presence of a terrorist device and test the ability of NEST and critical cooperating organizations (including military units)to work together.

While the MIGHTY DERRINGER exercise and resulting documents are over two decades old, the institutions participating in the exercise retain their roles today, and the issues confronting them in 1986 are similar to the ones that they would face in responding to a nuclear threat in 2012 (and beyond).

This posting is notable for being the first publication of documents that provide in-depth exposure into all aspects of such an exercise – including the state-of-play at key points and the array of issues involved in disabling terrorist devices. Of particular interest are references to the participation of the Joint Special Operations Command and Delta Force – mirroring the role they would have in a real-world incident. In addition, after-action reports reveal the assorted problems that can arise in coordinating the response to a nuclear terrorist threat among a large number of organizations.

* * * *

THE MIGHTY DERRINGER EXERCISE

In late January and early February 2012, members of the Department of Energy’s Nuclear Emergency Support Team (NEST) patrolled Lucas Oil Stadium as well as surrounding areas of Indianapolis as a precautionary measure in advance of Super Bowl XLVI. An initial survey to gather information on background levels of radiation was followed by an actual search for signatures associated with either a nuclear explosive device or a radiation dispersal device (a ‘dirty bomb’).1 Fortunately, none was found.

Over twenty-five years earlier, for a few days in early December 1986, NEST personnel also patrolled Indianapolis, also in search of a nuclear device. That search was triggered by an intelligence report that suggested that an Improvised Nuclear Device (IND) might have been smuggled into the city by terrorists. With the assistance of the Delta Force, U.S. personnel were able to recover and disable the device in a fictitious neighboring country; unfortunately the Indianapolis device exploded and 20 square blocks in downtown Indianapolis were completely destroyed.

As it happens, the terrorist group, the intelligence report, and the detonation were fictional – elements of a NEST exercise designated MIGHTY DERRINGER, one of a number of tests designed to anticipate and prevent the potential real-world catastrophe of a terrorist nuclear strike in a major American city. Documents published today by the National Security Archive provide newly declassified details on how the MIGHTY DERRINGER exercise unfolded and how the participants later evaluated it.

This is the most extensive set of declassified documents on any nuclear counterterrorism exercise, covering every phase of the response, from concept to critiques, and it offers valuable insights into a world that is usually hidden from public scrutiny. Among the disclosures:

§ The role of the top secret Joint Special Operations Command’s Delta Force in carrying out the assault on the terrorist cell in the fictional country of Montrev.

§ Descriptions of the different types of disablement techniques U.S. forces utilize – emergency destruct, standard destruction, and hard entry.

§ Assessments of the coordination problems and different perspectives of agencies that would be involved in a real-world response.

The instruction to establish NEST, known until 2002 as the Nuclear Emergency Search Team, took the form of a November 18, 1974 memo from Maj. Gen. Ernest Graves, the Atomic Energy Commission’s assistant general manager for military application, to Mahlon Gates, the manager of the commission’s Nevada Operations Office. (Document 1). Gates was “directed and authorized” to assume responsibility for the planning and execution of field operations employing AEC radiation detection systems for the “search and identification of lost or stolen nuclear weapons and special nuclear materials, bomb threats, and radiation dispersal threats.”

Personnel for NEST would come from AEC’s nuclear weapons laboratories – Lawrence Livermore, Sandia, and Los Alamos – as well as key AEC contractors. Almost all those individuals would continue in their regular positions full-time and become part of a NEST effort when required.

What inspired Graves’ memo was an incident that had taken place in May of that year. The Federal Bureau of Investigation received a letter demanding $200,000. Failure to comply would result in the detonation of a nuclear bomb somewhere in Boston. Personnel and equipment were quickly assembled and transported to Griffiss Air Force Base in Rome, New York. But before the team could make it to the threatened city, the crisis receded when no-one came to pick up the $200,000 in phony bills left at the designated site. 2

But the incident and the difficulties involved in responding to the threat convinced senior leaders that there was a need for a dedicated capability to deal with any attempt at nuclear extortion or nuclear terrorism. From its inception, NEST devoted considerable time and effort to conducting exercises designed to allow the team to test its readiness, procedures, and equipment in a variety of scenarios. In addition, since confronting a nuclear threat would involve not only NEST but a multitude of organizations, exercises provided an opportunity to identify potential problems in interagency cooperation.

MIGHTY DERRINGER was a particularly notable exercise in exploring the organizational, governmental, and technical problems that might arise in responding to a nuclear terrorist threat. While the existence of MIGHTY DERRINGER has been reported previously, the documents obtained by the National Security Archive and posted in this briefing book provide far more detail than previously available on the scenario, results, and after-action assessments of the assorted organizations involved. Since NEST and these other government entities are still critical components of America’s counter-terrorist capability, these records are valuable for the insight they offer into how a current-day nuclear detection operation would unfold and particularly what kinds of problems might be encountered.3

The exercise took place in two locations – Camp Atterbury, Indiana, near Indianapolis, and Area A-25 of the Energy Department’s Nevada Test Site – which corresponded to the two locations involved in the exercise scenario. One of the those locations was Indianapolis while the other was the country of ‘Montrev’ – a rather transparent fictional version of Mexico (since Montrev shared a border with the United States, its capital city was ‘Montrev City’, and its primary security agency was the Directorate for Federal Security – the same as Mexico’s).

Montrev was the initial focus of the exercise, with a terrorist group commanded by “Gooch” threatening to detonate an improvised nuclear device (IND) near the country’s Bullatcha oil field. According to the scenario, terrorists had stolen the devices from a new nuclear weapons state. Eventually, the participants discovered that that there was a second nuclear device and it appeared that it was being infiltrated into the United States, possibly with Pittsburgh as a target – although it was subsequently determined that the target was Indianapolis. While U.S. forces (with Delta Force assistance) were able to recover and disable the device in Montrev, Indianapolis experienced a 1 kiloton nuclear detonation that resulted in “total devastation over a 20 square block area.” (Document 38) The scenario had originally posited a successful disarming, but the exercise controllers decided to introduce a new element.

The scenario allowed for all aspects of a possible response to a nuclear terrorist/extortionist threat to be practiced – from initial assessment of the threat to the management of the “consequences” of a detonation. The documents posted cover, with varying detail, the core aspects of a response – intelligence collection, technical and behavioral assessments, search, access/defeat of terrorist forces, recovery of a device, diagnostics, hazards and effects estimation, disablement and damage limitation, safe transportation of the device, and consequence management of a detonation. In addition, they also concern a variety of important aspects of a response – including security, command and control, communications, logistics, radiological measurement and containment, weather forecasting, public information, and interaction with local officials.

The documents also identify the large number of organizations involved in the exercise. There is NEST and the organizations that contributed members or capabilities – including Lawrence Livermore National Laboratory, Los Alamos National Laboratory, and contractor EG&G. Additional organizations whose participation is evident include the State Department, Central Intelligence Agency, Federal Bureau of Investigation, Joint Special Operations Command, Special Forces Operation Detachment – Delta (Delta Force), several military explosive ordnance disposal units (from the Army and Navy), the Federal Radiological Monitoring and Assessment Center, the Environmental Protection Agency, and the Federal Emergency Management Agency.

Beyond detailing participants and describing different aspects of the exercise and static plans, some of the documents (the ‘Sitreps’- Document 19, Document 23, Document 32) provide a more dynamic view of the state of play at various points in the exercise. In addition, the post-exercise critiques provide different individual and institutional perspectives as to either the realism of the exercise or what the exercise revealed about strengths and weaknesses of the then current U.S. ability to respond to a nuclear terrorist threat.

Thus, Vic Berkinklau, an engineer with the Atomic Energy Commission, in addition to describing MIGHTY DERRINGER as an “Excellent, well managed exercise,” had an additional eight observations which concerned subjects such as uncertainty as to the number of NEST personnel needed in Montrev, the relationship between NEST and the Explosive Ordinance Disposal (EOD) team, and the need for more detailed analysis of the consequences of a nuclear detonation in a populated area (Document 43). L.J. Wolfson of the Navy Explosive Ordnance Disposal Technical Center contributed an eight-page single-spaced analysis concerning a variety of topics, including the nuclear device, assessment and intelligence, command and control and disablement. He observed (Document 47) that “there is too great a prevalence to believe what might, and probably is, very inconclusive intelligence information” and that “the entire operation was slowed and overburdened by the number of personnel involved.”

Commenting on the terrorism phase of the exercise (Document 50), William Chambers, NEST member and site controller for the Indianapolis component of the exercise, wrote that liaison between the FBI’s Hostage Rescue Team, NEST, and EOD personnel was “excellent” but that “the joint procedures for withdrawing the HRT and survivors, securing the perimeter, and clearing access to the device need clarification.” An unattributed comment (Document 66) suggested that the Delta Force players did not appreciate the “gravity of dealing with a nuclear device.”

In the subsequent twenty-five years, NEST and other organizations concerned with nuclear terrorism have conducted a significant number of exercises – particularly following the attacks of September 11, 2001.4 However, because of its scale and scope MIGHTY DERRINGER remains one of the more notable nuclear counterterrorism exercises.

The Energy Department is keeping secret significant aspects of MIGHTY DERRINGER, but more may be learned about the exercise and the State Department’s role in it from the response to a pending request. Moreover, files on MIGHTY DERRINGER at the Ronald Reagan Presidential Library will eventually be declassified and shed light on the National Security Council’s role.

(Note: A list of abbreviations used in the documents appears below.)


READ THE DOCUMENTS

Background

Document 1: Ernest Graves, Assistant General Manager for Military Application, Atomic Energy Commission, to M.E. Gates, Nevada Operations, “Responsibility for Search and Detection Operations,” November 18, 1974. Secret.

Source: Department of Energy FOIA Release

With this memo General Graves assigned Gates and the AEC’s Nevada Operations Office responsibility for search and detection operations with respect to lost and stolen nuclear weapons and special nuclear material as well as responding to nuclear bomb and radiation dispersal threats. The memo became the basis for the creation of the Nuclear Emergency Search Team (NEST).
Document 2: Director of Central Intelligence, IIM 76-002, The Likelihood of the Acquisition of Nuclear Weapons by Terrorist Groups for Use Against the United States, January 8, 1976. Secret.

Source: CIA FOIA Release.

An interagency group of intelligence analysts explored the constraints on the exploitation of nuclear explosives, attitudes and behavior toward the United States, means of acquiring nuclear explosives, the ways in which nuclear devices might be used against the United States, and the capabilities of existing terrorist groups. While the authors considered it unlikely that the U.S. would be the target of a nuclear terrorist attack “in the next year or two,” they also noted that, in the longer term, “we would expect a corresponding erosion of the constraints against terrorist use of nuclear explosives.”
Document 3: Energy Research and Development Administration, “Nuclear Emergency Search Team (NEST),” n.d. (but 1977). Unclassified.

Source: Energy Research and Development Administration

NEST began its existence as an unacknowledged government organization, but in 1977 it was concluded that NEST would have to interact with local law enforcement and political authorities in dealing with nuclear threats, and thus its existence would need to be acknowledged. This fact sheet, distributed to the press by ERDA, was the means by which NEST’s existence was quietly announced.
Document 4: E.J. Dowdy, C.N. Henry, R.D. Hastings, S.W. France, LA-7108, Nuclear Detector Suitcase for the Nuclear Emergency Search Team, February 1978. Unclassified.

Source: Los Alamos National Laboratory

 

This technical paper describes one piece of equipment designed specifically for NEST personnel – a portable Neutron Detection system that could be carried in any vehicle. The paper describes the detectors, the electronics, and the operations.
Document 5: Director of Central Intelligence, NIE 6-86, The Likelihood of Nuclear Acts by Terrorist Groups, April 1986, Secret, excised copy

Source: Mandatory Review Request; release by Interagency Security Classification Appeals Panel.

 

This estimate examined several incentives and constraints with regard to nuclear terrorism – including the availability of nuclear information, material, and trained personnel; changing levels of protection for nuclear weapons and other sources of nuclear/radioactive material; and terrorist capabilities and motivations (including possible state support to nuclear terrorism). The authors concluded that there was only a “low to very low” probability of nuclear terrorism that involved detonation of an improvised nuclear device or nuclear weapon – or the dispersal of radioactive material in a way that would threaten mass casualties or produce widespread contamination.
 

Preparations

 

Document 6: William Hoover, Deputy Assistant Secretary of Energy for Defense Programs, to DCI William Casey, 23 September 1985, with CIA routing memos, Confidential

Source: CREST, National Archives II

A senior Energy Department official informed Director of Central Intelligence William J. Casey of the Department’s conclusion on the need for a large-scale nuclear exercise in the early 1987 fiscal year and requested the CIA’s participation.
Document 7: Robert B. Oakley, State Department Counter-Terrrorism Center, to Executive Secretary Nicholas Platt, MIGHTY DERRINGER Exercise Planning,” 4 April 1986, with memorandum to Vice Admiral John Poindexter attached, Confidential

Source: State Department FOIA release

This memorandum, from the head of the State Department’s Counter-Terrorism Center, along with that attached memo to the president’s national security adviser, described the level of State Department participation in MIGHTY DERRINGER.
Document 8: Peter Borg, State Department Counter-Terrorism Center, to Richard Kennedy et al., “Exercise MIGHTY DERRINGER,” 6 October 1986, Secret

Source: State Department FOIA release

A number of State Department officials were recipients of this secret memo, which informed them of the nature of MIGHTY DERRINGER, when it would take place, some requirements for the exercise to be realistic, and the State Department’s participation.
 

The Exercise

 

Document 9: Don McMaster, Behavioral Assessment Report/PLC, n.d. [circa 2 December 1986], Incomplete copy, Secret

Source: Energy Department FOIA release

This behavioral assessment mirrors the earliest phases of responding to an actual threat, especially trying to assess its credibility. It discusses the reliability of a source, motivations of other key figures in the terrorist group, and concludes that a credible threat exists to both the United States and ‘Montrev.’
Document 10: F.W. Jessen, Lawrence Livermore National Laboratory, “Summary Assessment,” 2 December 1986, Secret, Incomplete copy

Source: Energy Department FOIA release

This assessment, conducted at Lawrence Livermore, where much of the credibility assessment effort has been located, reports that the available information suggests that the terrorist group possesses two improvised nuclear devices but that LLNL and Los Alamos National Laboratory disagree over the technical credibility of the threat.
Document 11: “Aggregate Assessment – – One Hour – – Of Threat Message and Sketch,”

n.d., Secret, Page 1 only

Source: Energy Department FOIA release

The title of this memo indicates that a sketch of a device was included with the threat message. Technical experts had already begun to draw conclusions about the device in Montrev as well as the implications for finding a second device in the United States.
Document 12: Thomas R. Clark, Manager, Nevada Operations Office, Department of Energy, “NEST Alert Status,” 3 December 1986, Confidential, excised copy

Source: Energy Department FOIA release

This message, from a Department of Energy manager, informs NEST participants at key laboratories and contractors that NEST is on “alert.” The Department of State has received a threat and the Department of Energy has been asked to evaluate it. Other actions have been taken.
Document 13: “Security Plan for NEST Retrograde Operation, December 1986,” n.d., Secret

Source: Energy Department FOIA release

The plan described in this document notes the classification levels and types of information involved in the exercise as well as measures for the protection of cryptological matter and classified documents.
Document 14: Peter Mygatt, Exercise Mighty Derringer, “Chronological Media Play, ‘Site City,’ Beginning 12/7/86,” n.d., Secret

Source: Energy Department FOIA release

The MIGHTY DERRINGER scenario writers assumed that if it was a real-world event, part of it would be visible and covered extensively by the media. This document summarizes reports of fictional news services and television stations as well as interaction between the media and FBI and Department of Energy.
Document 15: NEST On-Scene Commander, Subject: Event Mighty Derringer Sitrep No. 1 OCONUS, Prepared at 00:15 PST on 12/06/86, Secret

Source: Energy Department FOIA release

The first Situation Report (Sitrep) of the part of the exercise that takes place in Montrev summarizes the current situation (including the number of personnel in country) as well as
the status of a variety of subjects – including command and control, intelligence, disablement, and weather.
Document 16: W. Rogers, NEST Paramedic Coordinator, to V. Withirill, N.T.S.O, “MIGHTY DERRINGER, MEDICAL EMERGECY RESPONSE,” 6 December 1986, Secret

Source: Energy Department FOIA release

This memo reports that MIGHTY DERRINGER was being conducted in area A-25 of the Nevada Test Site and would involve approximately 450 people. It focuses on “areas of responsibility … and those assets available” in the event of an actual medical emergency.
Document 17: “NEST Evacuation Plan,” n.d., Secret

Source: Energy Department FOIA release

This plan addresses the evacuation of NEST personnel and equipment from Montrev City in the event of a nuclear detonation at the nearby Bullatcha Refinery No. 5. It focuses on execution, logistics, and command and control.

Document 18: NEST On-Scene Coordinator/Exercise Mighty Derringer, to Director, Emergency Management Team, DOE-EDC, Washington, D.C., Event Mighty Derringer Sitrep No. 2, Prepared at 1100 PST 6 December 1986, Secret

Source: Energy Department FOIA release

This report updates the Sitrep that had been prepared just after midnight on December 6 and reports on the significant developments that had occurred during the day. It covers thirteen different topics, and provides significant details of the terrorist site in Montrev, a summary of the behavioral assessment based on communications intelligence, and an assessment of the device. It notes that a “second nuclear device may be enroute [to] CONUS” and there is no confidence that the device is one-point safe, that is, the risk of an accidental nuclear detonation had to be taken into account (to be one-point safe there must be less than 1 in one million probability of producing a nuclear yield exceeding the equivalent of 4 pounds of TNT when the high explosive inside the weapon is detonated at any single point).
Document 19: NEST On-Scene Coordinator /Exercise Mighty Derringer, to Director, Emergency Management Team, DOE-EDC, Washington, D.C., Subject: Event Mighty Derringer Sitrep No. 3, Prepared at 00:10, on 12/07/86, Secret

Source: Energy Department FOIA release

This Sitrep prepared an about one hour after Sitrep No. 2, notes that “prestaging of equipment for access has been completed.”
Document 20: Assessment/McMaster, to Standard Distribution, “IRT Intelligence Summary 061200-062400,” 7 December 1986 02:30, Secret

Source: Energy Department FOIA release

This assessment reports on attempts to determine the presence of a nuclear device at the terrorist site, the movements of the terrorist group’s leader, the weapons and equipment possessed by the group, and a conclusion regarding the capability of Montrev’s armed forces to secure the terrorist site.
Document 21: Assessment/McMaster, to Standard Distribution, “Status Montrev Forces,” 7 December 1986 05:30, Secret

Source: Energy Department FOIA release

The status of Montrev’s forces is reported in this memo, which is based on information received from the Defense Intelligence Agency. It discusses their location, vehicle lift capability, and maintenance issues.
Document 22: CN1 to All, “Mighty Derringer,” 7 December 1986 8:44, Secret

Source: Energy Department FOIA release

This memo conveys a report from the IWS news service on events in Montrev.
Document 23: NEST On-Scene Coordinator, Subject: Event Mighty Derringer, Sitrep No. 4, OCONUS, Prepared at 09:40 on 12/07/86, Secret

Source: Energy Department FOIA release

This Sitrep indicates a successful assault by forces of the Joint Special Operations Command, resulting in their control of both the north and south sites that had been under terrorist control. It reports on the status of the nuclear device and the initial implementation of the emergency disablement plan.
Document 24: Summary Assessment to Standard Distribution, “Summary Assessment,” 7 December 1986 10:30, Secret

Source: Energy Department FOIA release

The technical assessment has been entirely redacted from this document, but the operational and behavioral assessments have been released in their entirety. They note that “The adversary has set up the Montrev situation in such a way that if and when he surfaces in CONUS and makes an explicit threat and demand, he must be taken seriously.”
Document 25a: CN1 to All, “Mighty Derringer,” 7 December 1986 12:28, Secret

Document 25b: CN1 to All, “Mighty Derringer,” 7 December 1986 13:07, Secret

Document 25c: CN1 to All, “Mighty Derringer,” 7 December 1986 15:48, Secret

Source: Energy Department FOIA release

These bulletins convey various media reports of developments in Montrev, including the presence of NEST personnel.
Document 26: Assessment/F. Kloverstrom to Standard Distribution, “Results of examination of containers found in south building,” 7 December 1986 18:10, Secret

Source: Energy Department FOIA release

This memo reports on the discovery, after the assault, of two containers, which appear to contain radioactive material.
Document 27: Jim Boyer, “Suggested Procedure for Joint DOE/Montrev News Releases,” 7 December 1986, Secret

Source: Energy Department FOIA release

Among the recommendations in this short memo are obtaining input from the Montrev Ministry of Information “to get an idea of what El Presidente will approve,” developing a cover for the NEST operation, but preparing to admit NEST participation during the last phase of the operation.
Document 28: “Time Line/Event/Decision Sequence,” 8 December 1986 19:00, Secret

Source: Energy Department FOIA release

This document focuses on the essential steps in disabling the nuclear device seized in Montrev and limiting damage. Thus, it addresses access, diagnostics, disablement, damage limitation, and hazards and effects.
Document 29: “Damage Limitation Containment Implementation,”8 December 1986, Secret

Source: Energy Department FOIA release

This eight-page memo has been almost completely redacted but the opening paragraph notes the location of the Montrev device and that its location presents a “formidable problem” but that all participants reached a common conclusion for the solution.
Document 30: “Hazards and Effects Analysis Prior to Montrev Disablement,” n.d. [8 December 1986?], Secret

Source: Energy Department FOIA release

This three-paragraph memo notes that hazard predictions (involving fallout dose and exposure rates) considered a variety of possible yields, wind projections, and the vulnerability of “the small village of Taco Caliente.”
Document 31: A/I [Assessment & Intelligence] Behavioral, “Booby Traps/Tamper Proof,” n.d. [8 December 1986?], Secret

Source: Energy Department FOIA release

This assessment focuses on the likelihood that the terrorist group and its leader would have installed booby traps to prevent tampering with the nuclear device seized in Montrev. It notes the implications of the extensive anti-personnel attack defenses around the area.
Document 32: James K. Magruder, On-Scene Commander, to Director, Emergency Management Team, DOE-EOC, Washington, D.C, Event Mighty Derringer Sitrep No. 7, 8 December 1986 23:00, Secret

Source: Energy Department FOIA release

This Sitrep notes presumed deadlines for nuclear device detonation and a proposed disablement schedule, the number of personnel on site, an extensive report on current intelligence, and that an “emergency destruct plan has been prepared.”
Document 33: Assessment & Intelligence/F. Jessen to Standard Distribution, “A&I Summary/8 December 2130,” 8 December 1986, Secret

Source: Energy Department FOIA release

This assessment notes the credibility of a threat message claiming the existence of a second nuclear device based on experimental measurements of the device seized in Montrev. The memo’s contents suggest a U.S. target for the second device.
Document 34: J.A. Morgan, Disablement Team Leader, to On-Scene Commander, “Disablement Plan,” 9 December 1986, Secret

Source: Energy Department FOIA release

The memo includes a computer sketch of the terrorist nuclear device and the disablement method, as well as the reentry and evacuation plans – all of which have been redacted.
Document 35: “Exercise Mighty Derringer Post-Event Plan to Safe and Remove the Device,” circa 9 December 1986, Secret

Source: Energy Department FOIA release

This heavily-redacted memo covers four topics – the situation, mission, execution, and administration and logistics. The released portion notes that disablement action had been completed and that an intact physics package had been recovered.
Document 36: “NEST Demobilization Plan,” 10 December 1986, Secret

Source: Energy Department FOIA release

This memo marks plans for the ending the exercise – specifying the responsibilities of the individual organizations, procedures for transportation to the airport and the loading of aircraft, and command and control.
Document 37: Assessment/M. Miron, to Standard Distribution, “Resemblance of Montrev Device to Tahoe Bomb,” 9 December 1986 20:35, Secret

Source: Energy Department FOIA release

In 1980, a sophisticated improvised (non-nuclear) explosive device placed at Harvey’s Wagon Wheel Casino did substantial damage when disablement efforts failed. The memo suggests that publicly available information about the device may have been employed to construct the Montrev device.
Document 38: Cal Wood, Livermore National Laboratory, to Bob Nelson, Controller Team Leader, “Preliminary Evaluation of Players’ Device Estimate,” 10 December 1986, Secret

Source: Energy Department FOIA release

This heavily redacted memo notes that “the diagnostic techniques used by the team produced a rather good estimate of both the materials present and their configuration.”
Document 39: Director FEMA to National Security Council, “Situation Report on MONTREV/Indianapolis Terrorist Situation,” 11 December 1986 17:00 EST, Secret

Source: Energy Department FOIA release

The FEMA director begins with the observation that “At 0700, 11 December 1986, a nuclear detonation occurred in the City of Indianapolis” devastating 20 square blocks. He does not describe the type of damage produced, for example, whether the detonation led to any fires, or the extent to which it caused local fallout hazards. The FEMA director then describes the consequence management phase of the exercise, including involvement of state and federal authorities and agencies.
 

Critiques

Document 40: Carl Henry, Los Alamos National Laboratory, “Mighty Derringer Report,” 2 February 1987, enclosing comments by Ray D. Duncan, n.d., Secret

Source: Energy Department FOIA release

Some weeks after the exercise, Los Alamos official Carl Henry sent a large package of commentary on MIGHTY DERRINGER, which is presented below, piece by piece, except for the critique by Ray D. Duncan,which is attached to the Henry memorandum. Duncan, a manager at the Nevada Test Site, produced an extensive review which raised a number of issues, including the “unusual challenges” MIGHTY DERRINGER raised for NEST if it was ever deployed to a foreign country for a “covert operation.” Perhaps some incident during the exercise led him to the recommendation for educational training for Delta Force and the Joint Special Operations Command so that their members “understand the potential consequences of moving or unintentionally shooting an IND [improvised nuclear device].”
Document 41: Untitled, unattributed document, Secret, incomplete

Source: Energy Department FOIA release

This critique gives some detail on how the NEST group entered Montrev during the crisis. The State Department had created an approved access list and a simulated Montrev consulate processed the players when they entered the country. When players realized that they had forgotten some equipment, they were easily able to retrieve it as it was only 65 miles away. The commentator noted that in a “real world situation, the NEST contingent could be thousands of miles away from necessary equipment or supplies.”
Document 42: Eric Schuld to Bob Nelson, “Comments on Mighty Derringer – OCONUS Issues,” n.d., Secret

Source: Energy Department FOIA release

Schuld listed issues brought up by the “Outside Continental United States” exercise. For example, the JSOC solved its problem through a “quick assault” that created problems for other organizations in the exercise.
Document 43: Vic Berniklau to Bob Nelson, “Issues/Major Observations/Lessons Learned,” n.d., Secret

Source: Energy Department FOIA release

Like many of the commentators, Berniklau saw the exercise as “excellent” and “well managed,” but he raised problems that others also brought up, such as fragmentation of information and “confusion.”
Document 44: T.T. Scolman, Comments, n.d., Secret

Source: Energy Department FOIA release

Scolman, whose role was “Commander for Science,” also saw an information management problem and pointed to other concerns, such as lack of support staff.
Document 45: Richard F. Smale, HSE, to Carl Henry/Bill Chambers, “First Impressions: Mighty Derringer: Consequence Phase,” n.d., Classification unknown

Source: Energy Department FOIA release

The “consequence phase” referred to the aftermath of the nuclear detonation in Indianapolis. Smale saw “great things” in the exercise, such as its technical organization, but he pointed to concerns such as the failure to present information that would be accessible to a non-technical audience and the lack of time to “develop good fallout plots.”
Document 46: L J. O’Neill, “Exercise Impressions,” 9 December 1986, Secret

Source: Energy Department FOIA release

O’Neill was impressed by the participation of “foreign speaking actors” which helped the participants to enter “wholeheartedly into the play.”
Document 47: L.J. Wolfson to R. Nelson, “Exercise Mighty Derringer,” 10 December 1986, Classificaion unknown, excised copy

Source: Energy Department FOIA release

Like O’Neill, Wolfson pointed to the “good actor play,” especially by the actor who had the role of Montrev’s “El General.” Nevertheless, he argued that “too many people” slowed down the operation.
Document 48: William Nelson, Mighty Derringer Washington Controller, to Captain Ronald St. Martin, National Security Council, “Mighty Derringer Meeting at FBI Headquarters, 12 December 1986, Classification unknown

Source: Energy Department FOIA release

The discussion at FBI headquarters on organizational issues produced a consensus on the need for a White House-designated “leader,” possibly at the cabinet level, responsible for managing post-nuclear disaster recovery activities.
Document 49: Kathy S. Gant, Emergency Technology Program, Oak Ridge National Laboratory, to William Chambers, Los Alamos National Laboratory, 17 December 1986, enclosing “Comments on Exercise Mighty Derringer,” 18 December 1986, Classification unknown

Source: Energy Department FOIA release

Seeing a need for better integration of the consequences phase into MIGHTY DERRINGER, Gant emphasized the need for state and local actors to play a stronger role in such exercises to give them greater realism. Her discussion of the Federal Radiological Response Plan led to a recommendation that NEST staffers play a role in post-incident field monitoring of radiation hazards because they would be the “first available federal personnel.”
Document 50: William H. Chambers, CONUS Site Controller, to Carl Henry, Chief Controller, “‘Quick Look,’ Report, Mighty Derringer CONUS,” 19 December 1986, Secret

Source: Energy Department FOIA release

Chambers provided some detail on the role of the Indianapolis nuclear detonation in MIGHTY DERRINGER. According to the script, the device had been “rendered-safe,” but the exercise leaders “deviated” from the script by improvising a “simulated nuclear detonation.”
Document 51: Zolin Burson, EG&G Energy Measurements, to Carl Henry, 29 December 1986, Secret

Source: Energy Department FOIA release

Like Gant, Burson pointed to the need for more involvement by state and local actors in such exercises, suggesting that “if the real Governor and Mayor” had been present, “they would have had a much stronger influence.”
Document 52: Richard F. Smale, Associate Group Leader, to Jesse Aragon, HSE Division Leader, “Trip Report December 7 to 13, Camp Atterbury (Indianapolis), Indiana,” 7 January 1987, Secret

Source: Energy Department FOIA release

Smale provides more detail on the role of nuclear devices in the exercise scenario, noting that “terrorists had stolen two … from a developing nuclear capable country.” He also observed that “when control of the device had been obtained, the NEST scientists could have disabled it.”
Document 53: Thomas S. Dahlstrom, EG&G Measurements, to William H. Chambers, Carl Henry, and Norm Bailey, “Mighty Derringer Observations,” 13 January 1987, Classification unknown, excised copy

Source: Energy Department FOIA release

After noting that his “overall reaction” was “quite positive,” Dahlstrom believed that “confusion” emanated from a basic problem: the players did “not comprehend the complexity of an OCONUS deployment – specifically how the State Department controls the matter.”
Document 54: F. Jessen/LLNL to G. Allen and W. Adams/NVO, “Mighty Derringer Critique,” 16 December 1986, Rev[ised] 13 January 1987, Secret, excised copy

Source: Energy Department FOIA release

Jessen pointed to a number of problems, for example, that “many of the participating agencies were not serious players,” the “unrealistic background information” on the “fictitious” countries and people, “bad guidance on the use of existing proliferant country data,” and failure to recognize that “information to be assessed related to intelligence reports of a nuclear terrorist threat.” Especially disturbing was the relocation of the command post to a “safe location,” while NEST personnel were not notified”: “the blatant lack of concern for [their] safety … is inexcusable.”
Document 55: Julie A. Orcutt/HSE, Los Alamos National Laboratory, to Jesse Aragon, HSE Division Leader, “Trip Report: Mighty Derringer Exercise, Montrev Site,” 13 January 1987, Secret

Source: Energy Department FOIA release

During the exercise, the on-scene commander at Indianapolis had decided against building a “containment structure” to prevent the spread of hazardous material because of the risks. That meant, however, that plutonium would be scattered about which presented dangers of “lung doses.” Los Alamos staffer Julie Orcutt recommended the provision of more anti-contamination equipment, such as foam mitigation, to reduce dangers to officials entering the blast area.
Document 56: J. Doyle to Gylan C. Allen, “EG&G Comments for Mighty Derringer,” 14 January 1987, Classification unknown, excised, incomplete copy

Source: Energy Department FOIA release

Noting that the exercise provided “very valuable training,” Doyle saw such problems as the “sheer magnitude” in numbers of players, cramped space, and inadequate communications staffing.
Document 57: G.C. Allen, USDOE/NVO, “Mighty Derringer: Comments and Observations,” 15 January 15, 1987, Classification unknown, excised copy

Source: Energy Department FOIA release

Among the shortcomings cited in Allen’s rather critical evaluation were poor communications and weaknesses in interagency coordination.
Document 58: William E. Nelson, Emergency Response, Lawrence Livermore National Laboratory, to Carl Henry, Los Alamos National Laboratory, “‘Quick Look,’ Report, Mighty Derringer,” 21 January 1987, Secret, excised copy

Source: Energy Department FOIA release

Jumping the gun was a weakness cited in Nelson’s critique: players “did not wait for establishment of credibility before acting,” which made a “shambles of an orderly assessment of information.” He also observed that NEST search team “escorts” needed “experience in covert operations” to “prevent inadvertent acts that would alert terrorists.” Nelson’s report included a number of observations made by other participants.
Document 59: J. Strickfadden, LANL, to Bob Nelson, “Mighty Derringer Comments,” n.d., Secret
Source: Energy Department FOIA release

The overall positive evaluation – the “most realistic exercise ever conducted by the NEST community” – included some criticisms, such as “chaotic” operations at the Working Point [WP] and a shambolic state of affairs at the “reentry” point (detonation zone).
Document 60: Milt Madsen (Monitor) to Bob Nelson, “Mighty Derringer Observations,” n.d., Secret, excised, incomplete copy

Source: Energy Department FOIA release

Madsen’s comments included suggestions for future improvements in NEST’s organization: for example, to avoid fragmented committee operations, NEST needed a technical program manager.
Document 61: Peter Mygatt, “Mighty Derringer – Media Play Report,” n.d., Secret

Source: Energy Department FOIA release

Energy Department spokesperson Mygatt’s evaluation of the player’s management of the media was generally positive, although he saw a few failings, e.g., the Joint Information Center never called a news conference, “which is unheard of in an emergency.”.
Document 62: Walter Nervik, Senior Command Controller, to Robert M. Nelson, Exercise Mighty Derringer Controller, “Lessons Learned,” n.d., Secret

Source: Energy Department FOIA release

An official at Lawrence Livermore Laboratory, Nervik wondered who would provide security after JSOC operatives attacked the terrorists in an overseas environment. Special forces personnel would leave the scene but the NEST would still need security resources.
Document 63: Walter Nervik to Bob Nelson, “Lessons Learned,” n.d., Secret

Source: Energy Department FOIA release

Nervik was critical in another evaluation: the NEST team was far too large, players were complacent about a nuclear threat, there were no “penalties” for making a mistake, and playing conditions were “unreal.” With respect to the latter point, the fact that the Montrev phase of the exercise occurred on U.S.-controlled territory, (the Nevada Test Site), “severely limits the stress placed on players in unfamiliar surroundings, dealing with strangers, and relying on untested sources of support.” Nervik also saw a danger that participants would see exercises as “more of a game than a serious test of all facets of the NEST capabilities.”
Document 64: Jack Campbell, Public Information, to Robert M. Nelson, Exercise Mighty Derringer Controller, n.d., Secret

Source: Energy Department FOIA release

Campbell pointed to a weakness: higher level officials did not really “play.” For example, after the JSOC assault, the State Department left Montrev, even though “lives of American correspondents were in jeopardy.” Another surprise was that the Department of Energy NEST team did not establish a “public affairs” function, although in real life such a group would be highly active.
Document 65: “Mighty Derringer 86,” unattributed, n.d., Secret, excised copy

Source: Energy Department FOIA release

These handwritten notes raised several issues, such as the interaction between EOD and the Delta force players and the impact of the “play” in the United States on decisions in the OCONUS (Montrev) activity. One impact was that a “risky” disablement option was taken in Montrev in order to preserve evidence to help raise the chance for a successful operation in “site city” (Indianapolis).
Document 66: “Mighty Derringer,” unattributed, n.d., Secret, excised copy

Source: Energy Department FOIA release

Handwritten notes by another player raised basic organizational issues. The absence of a “chain of command” prior to the deployment made it unclear who EOD worked for. A serious concern was that the Delta Force players did not appreciate the “gravity of dealing with a nuclear device,” an issue suggested by other reports (see document 41).
Document 67: “Mighty Derringer Search Planning,” unattributed, n.d., Secret, excised copy

Source: Energy Department FOIA release

This document provides a review of organizational arrangements established for the device search in Indianapolis.
Document 68: “Communications Observations (Site City),” unattributed, n.d., Classification unknown

Source: Energy Department FOIA release

This review of communications systems concluded that this was the “best NEST communications exercise that I have observed.”
Document 69: Second page of fax to Carl Henry, unattributed document, n.d., Classification unknown

Source: Energy Department FOIA release

This critique points to operational security (OPSEC) as the “real” problem, noting that players had organizational logos on their clothing and that “loose talk” in hotels and bars was “particularly bad.”


ABBREVIATIONS

CONUS Continental United States

EG&G Edgerton, Germeshausen, and Grier

EOC Emergency Operations Center

EOD Explosive Ordnance Disposal

EODTECHCTR Explosive Ordnance Disposal Technical Center (Navy)

ERDA Energy Research and Development Administration

EST Emergency Support Team

FBI Federal Bureau of Investigation

FCP Forward Control Point

FEMA Federal Emergency Management Agency

FRMAC Federal Radiation Monitoring Assessment Center

HRT Hostage Response Team

IND Improved Nuclear Device

JNACC Joint Nuclear Accident Coordination Center

JSOC Joint Special Operations Command

LANL Los Alamos National Laboratory

LLNL Lawrence Livermore National Laboratory

NEST Nuclear Emergency Search Team

NVO Nevada Operations Office

OCONUS Outside the Continental United States

OSC On-Scene Commander

REECo Reynolds Electrical Engineering Corporation

SAC Special-Agent-in Charge (FBI)

SFOD Special Forces Operational Detachment – Delta

SITREP Situation Report

TOC Tactical Operations Center

WP Working Point

TOP-SECRET from Cryptome – NSA TEMPEST Documents Repost

       NSA TEMPEST History: http://cryptome.org/2012/05/nsa-tempest-history.pdf

22 June 2011:

Joel McNamara’s comprehensive Complete, Unofficial TEMPEST Information Page has closed. A mirror: http://www.kubieziel.de/blog/uploads/complete_unofficial_tempest_page.pdf

6 April 2003: Add

NCSC 3 – TEMPEST Glossary, 30 March 1981

5 March 2002: Two security papers announced today on optical Tempest risks:

Information Leakage from Optical Emanations, J. Loughry and D.A. Umphress

Optical Time-Domain Eavesdropping Risks of CRT Displays, Markus Kuhn

For emissions security, HIJACK, NONSTOP and TEAPOT, see also Ross Anderson’s Security Engineering, Chapter 15.

HIJACK, NONSTOP, and TEAPOT Vulnerabilities

A STU-III is a highly sophisticated digital device; however, they suffer from a particular nasty vulnerability to strong RF signals that if not properly addressed can cause the accidental disclosure of classified information, and recovery of the keys by an eavesdropper. While the unit itself is well shielded, the power line feeding the unit may not have a clean ground (thus negating the shielding).

If the encryption equipment is located within six to ten wavelengths of a radio transmitter (such as a cellular telephone, beeper, or two way radio) the RF signal can mix with the signals inside the STU and carry information to an eavesdropper. This six to ten wavelengths is referred to as the “near field” or the wave front where the magnetic field of the signal is stronger then the electrical field.

The best way to deal with this is to never have a cellular telephone or pager on your person when using a STU, or within a radius of at least thirty feet (in any direction) from an operational STU (even with a good ground). If the STU is being used in a SCIF or secure facility a cell phone is supposed to be an excluded item, but it is simply amazing how many government people (who know better) forget to turn off their phone before entering controlled areas and thus cause classified materials to be compromised.

Spook Hint: If you have a powered up NEXTEL on your belt and you walk within 12 feet of a STU-III in secure mode you have just compromised the classified key.

Secure Telephone Units, Crypto Key Generators, Encryption Equipment, and Scramblers (offsite)

Files at Cryptome.org:

tempest-time.htm TEMPEST Timeline
tempest-old.htm TEMPEST History

NSA Documents Obtained by FOIA

nacsem-5112.htm NACSEM 5112 NONSTOP Evaluation Techniques
nstissi-7000.htm NSTISSI No. 7000 TEMPEST Countermeasures for Facilities           

nacsim-5000.htm NACSIM 5000 Tempest Fundamentals
nacsim-5000.zip NACSIM 5000 Tempest Fundamentals (Zipped 570K)
nsa-94-106.htm NSA No. 94-106 Specification for Shielded Enclosures
tempest-2-95.htm NSTISSAM TEMPEST/2-95 Red/Black Installation Guidance

nt1-92-1-5.htm NSTISSAM TEMPEST 1/92 - TOC and Sections 1-5
nt1-92-6-12.htm NSTISSAM TEMPEST 1/92 - Sections 6-12
nstissam1-92a.htm NSTISSAM TEMPEST 1/92 - Appendix A (TEMPEST Overview)
nt1-92-B-M.htm NSTISSAM TEMPEST 1/92 - Appendixes B-M
nt1-92-dist.htm NSTISSAM TEMPEST 1/92 - Distribution List

nsa-reg90-6.htm NSA/CSS Reg. 90-6, Technical Security Program
nsa-foia-app2.htm NSA Letter Releasing TEMPEST Documents
nsa-foia-app.htm NSA FOIA Appeal for TEMPEST Information
nsa-foia-req.htm NSA FOIA Request for TEMPEST Documents

Other TEMPEST Documents

nsa-etpp.htm NSA Endorsed TEMPEST Products Program
nsa-ettsp.htm NSA Endorsed TEMPEST Test Services Procedures
nsa-zep.htm NSA Zoned Equipment Program
nstissam1-00.htm Maintenance and Disposition of TEMPEST Equipment (2000)
nstissi-7000.htm TEMPEST Countermeasures for Facilities (1993)

tempest-fr.htm French TEMPEST Documentation (2000)
af-hb202d.htm US Air Force EI Tempest Installation Handbook (1999)
afssi-7010.htm US Air Force Emission Security Assessments (1998)
afssm-7011.htm US Air Force Emission Security Countermeasure Reviews (1998)
qd-tempest.htm Quick and Dirty TEMPEST Experiment (1998)

mil-hdbk-1195.htm Radio Frequency Shielded Enclsoures (1988)
emp.htm US Army Electromagnetic Pulse (EMP) and TEMPEST
 Protection for Facilities (1990)
zzz1002.htm National TEMPEST School Courses (1998)
navch16.htm Chapter 16 of US Navy's Automated Information Systems
 Security Guidelines

tempest-cpu.htm Controlled CPU TEMPEST emanations (1999)
tempest-door.htm TEMPEST Door (1998)
bema-se.htm Portable Radio Frequency Shielded Enclosures (1998)
datasec.htm Data Security by Architectural Design, George R. Wilson (1995)
rs232.pdf The Threat of Information Theft by Reception
 of Electromagnetic Radiation from RS-232 Cables,
 Peter Smulders (1990)

tempest-law.htm Laws On TEMPEST, Christopher Seline (1989)
tempest-leak.htm The Tempest Over Leaking Computers, Harold Highland (1988)
bits.pdf Electromagnetic Eavesdropping Machines for 
bits.htm Christmas?, Wim Van Eck (1988)
nsa-vaneck.htm NSA, Van Eck, Banks TEMPEST (1985)
emr.pdf Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?, Wim Van Eck (1985)


	

TOP-SECRET- The NSA Operation REGAL: Berlin Tunnel

Operation code name: PBJOINTLY Product code name: REGAL

The Berlin Tunnel operation was not a unique type of operation that was only run in Berlin. Prior to the Berlin Tunnel, the British ran a number of successful tunnel cable-tap operations in Vienna,[1] which at the time of these operations, was still an occupied city, divided into four sectors just like Berlin. The British cable taps began in 1948, and ran until the occupation of Austria ended, restoring state sovereignty to the country in 1955. The Soviets had a tap near Potsdam on a cable that served the American Garrison in Berlin.[2]

What has made the Berlin Tunnel famous, while the cable-tap tunnels of Vienna and Potsdam have faded into obscurity is the paradox of intelligence operations which results in fame being a measure of failure and obscurity being a measure of success. The Berlin Tunnel’s true claim to fame, therefore, is that it gained front-page notoriety when the Soviets “discovered” it.

The Official CIA history of the tunnel (prepared in August 1967 and declassified in February 2007) theorizes that the amount of publicity given to the Berlin Tunnel was the result of chance rather than of a conscious decision on the part of the Soviet leadership. During the planning phase of the tunnel, a consensus assessment had been reached which postulated that in the event of the discovery of the tunnel, the Soviet reaction would be to “suppress knowledge” of its existence, so as to save face, rather than have to admit that the West had the capability to mount such an operation. The CIA history of the project suggests that this expectation was defeated because the Soviet Commandant of the Berlin Garrison (who would normally have handled an event of this nature) was away from post at the time, and his deputy found himself in the position of having to make a decision about the tunnel “without benefit of advice from Moscow.”[3]

In his academic history of the Berlin Tunnel (Spies Beneath Berlin), David Stafford of the University of Edinburgh points out that, even though the tunnel was a joint American-British project, the British did not share in the limelight of publicity with the Americans when the tunnel was discovered. This was due, he says, to the fact that Soviet First Secretary Khrushchev was on an official state visit to the U.K.. The visit’s culmination, a visit to Windsor Castle and a reception by the Queen, was scheduled for the day following the discovery of the Berlin Tunnel. British participation in the project was officially hushed up by both the British and the Soviets so as not to spoil the success of the state visit.[4] To this day British Intelligence Services are usually tight-lipped when it comes to discussions of the Berlin Tunnel, or any post-1945 intelligence operation for that matter,[5] while the Americans have declassified the in-house history of the project and authorized one of its participants to include a chapter about it in a book on the Intelligence war in Berlin written in cooperation with one of the KGB veterans of that period (Battleground Berlin).

The intelligence fame/obscurity paradox aside, the Berlin Tunnel operation was, in the words of Allen Dulles (then DCI), “one of the most valuable and daring projects ever undertaken” by the CIA.[6]

The Berlin Tunnel, unlike the Vienna tunnels, was a major engineering feat. It stretched 1476 feet/454[7] meters through sandy ground[8] to reach a cable only 27 inches/68.5 cm beneath the surface,[9] on the edge of a major highway. One of the most difficult engineering problems that had to be overcome in the course of the project was to dig up to the cable from the main tunnel shaft without dropping some truck passing over the highway above into the tunnel.[10] This task was handled by the British,[11] who had their experience of Vienna to fall back on.

The total cost of the tunnel project was over six and a half million[12] 1950s dollars, which in 2007 dollars would be over 51 and a quarter million.[13] By way of comparison, the development and delivery of the first six U-2 aircraft, a project contemporary with the Berlin Tunnel, cost 22 million total,[14] or 3.6 million each. That means that the tunnel cost roughly as much as two U-2s.

According to Murphey, Kondrashev and Bailey in Battleground Berlin, the tale of the tunnel began in early 1951, when Frank Rowlett told Bill Harvey how frustrated he was by the loss of intelligence due to the Soviet shift from radio to landline.[15] The assessment process that preceded target selection continued throughout 1952, the year that saw Harvey reassigned to Berlin. Test recordings of the kind of traffic available from the cables were made in the spring and summer of 1953.[16] By August of 1953, plans for the tunnel were being readied for presentation to the DCI, Allen Dulles.[17]

Dulles approved the terms of reference for cooperaton with the British on the Berlin Tunnel in December 1953.[18] The “go” was given to start the construction of the warehouse that would serve as the cover for the tunnel, and construction was completed in August. The American engineering team that actually dug the tunnel arrived to take control of the compound on 28 August. Digging began on 2 September, but, on 8 September, the miners struck water and which necessitated that pumps be brought in. The tunnel reached its distant end on 28 February 1955,[19] and the tap chamber took another month to complete. The complex process of tapping into the three target cables without alerting the Soviets to what was going on was a slow one. It lasted from 11 May through 2 August 1955.[20] Collection of intelligence from the taps, however, began as soon as the first circuits were brought on-line.

During the night of 21-22 April 1956, the Soviets “discovered” the tunnel, and collection ceased. That did not close the project, however. The take from the Berlin Tunnel during the time that it was operational (11 months and 11 days) was so great that processing of the backlog of material continued through the end of September 1958.[21]

The loss of this valuable source was, of course, a blow to US/UK intelligence efforts against the Soviets at the time, but this loss was somewhat compensated for by the prestige that the CIA won in the press following the tunnel’s discovery. The article on the tunnel in the issue of Time magazine (07 May 1956) that followed the tunnel’s discovery said “It’s the best publicity the U.S. has had in Berlin for a long time.”

An urban legend that persistently continues to associate itself with the Berlin Tunnel is that the idea for the tunnel came from Reinhard Gehlen (the German Abwehr-Ost general who surrendered to the Americans and later became the head of the West German BND). Murphy, Kondrashev and Bailey flatly reject this assertion in Battleground Berlin.[22] David Stafford argues credibly against the validity of this legend in his academic history of the Berlin Tunnel. He notes that there is no evidence to support this theory, and “those most closely in the know in the CIA have strenuously denied it,”[23] essentially repeating Murphy, Kondrashev and Bailey. Stafford’s most telling argument against Gehlen’s involvement is that no mention of the Berlin Tunnel is to be found in Gehlen’s memoirs (The Service: The Memoirs of General Reinhard Gehlen, New York: World Publishing, 1972). “Never a modest man,” says Stafford, Gehlen “would surely have bid for some of the credit had he been any way involved. In fact, he does not even refer to it.”[24]

In the section “Recapitulation of Intelligence Derived” from the Berlin Tunnel, the CIA History of the project says that the “REGAL operation provided the United States and the British with a unique source of current intelligence on the Soviet Orbit of a kind and quality which had not been available since 1948. Responsible officials considered PBJOINTLY, during its productive phase, to be the prime source of early warning concerning Soviet intentions in Europe, if not world-wide.”[25] The section goes on to list general types of political, ground-forces, air-force and naval intelligence that the tunnel provided, many of them with glowing comments from consumers.

The debate about the value of the information derived from the Berlin Tunnel has been raging since 1961, when it was discovered that PBJOINTLY was compromised to the Soviets by the British mole George Blake who attended the meeting on the Berlin Tunnel between the British and Americans in London in December 1953. Many widely read books and articles on the tunnel contended that the KGB had used the tunnel to feed the Americans and the British disinformation. Stafford, however, convincingly dispels all suspicions that the Berlin Tunnel was turned into a disinformation counter-intelligence operation by the KGB. Drawing on the information that came to light during the “Teufelsberg” Conference on Cold-War intelligence operations that brought intelligence professionals from both the CIA and the KGB together in Berlin in 1999, Stafford concludes that “[f]ar from using the tunnel for misinformation and deception, the KGB’s First Chief Directorate had taken a deliberate decision to conceal its existence from the Red Army and GRU, the main users of the cables being tapped. The reason for this extraordinary decision was to protect “Diomid”, their rare and brilliant source George Blake.”[26]

Stafford ends his discussion of the legitimacy of the material collected from the Berlin Tunnel with a quote from Blake, who was still living in Moscow at the time of the “Teufelsberg” Conference. “I’m sure 99.9% of the information obtained by the SIS and CIA from the tunnel was genuine.”[27]

By T.H.E. Hill

DOWNLOAD THE ORIGINAL NSA DOCUMENT HERE

nsa-operation-regal

Cryptome – Office of the Director of National Intelligence and Department of Justice Joint Statement

REVISED GUIDELINES ISSUED TO ALLOW THE NCTC TO ACCESS AND ANALYZE CERTAIN FEDERAL DATA MORE EFFECTIVELY TO COMBAT TERRORIST THREATS

Director of National Intelligence James R. Clapper, Attorney General Eric Holder, and National Counterterrorism Center (NCTC) Director Matthew G. Olsen have signed updated guidelines designed to allow NCTC to obtain and more effectively analyze certain data in the government s possession to better address terrorism-related threats, while at the same time protecting privacy and civil liberties.

The Guidelines for Access, Retention, Use, and Dissemination by the National Counterrorism Center (NCTC) of Information in Datasets Containing Non-Terrorism Information effective Mar. 22, 2012, update November 2008 guidelines that governed NCTC s access, retention, use, and dissemination of terrorism information contained within federal datasets that are identified as also including non-terrorism information and information pertaining exclusively to domestic terrorism.

The updated Guidelines provide a framework that allows NCTC to obtain certain data held by other U.S. Government agencies to better protect the nation and its allies from terrorist attacks.  In coordination with other federal agencies providing data to the NCTC, NCTC will establish the timeline for the retention of individual datasets based upon the type of data, the sensitivity of the data, any legal requirements that apply to the particular data, and other relevant considerations.

Among other modifications, the revised Guidelines:

  • Permit NCTC to retain certain datasets that are likely to contain significant terrorism information and are already in the lawful custody and control of other federal agencies for up to five years, unless a shorter period is required by law.
  • Permit NCTC to query this data only to identify information that is reasonably believed to constitute terrorism information.
  • Provide that all data obtained by NCTC from another federal agency pursuant to the Guidelines, will be subject to appropriate safeguards and oversight mechanisms, including monitoring, recording, and auditing of access to and queries of the data, to protect privacy and civil liberties.
  • Require NCTC to undertake a number of additional compliance and reporting obligations to ensure robust oversight.

The updated Guidelines do not provide any new authorities for the U.S. Government to collect information, nor do they authorize acquisition of data from entities outside the federal government.  All information that would be accessed by NCTC under the Guidelines is already in the lawful custody and control of other federal agencies.  The Guidelines merely provide the NCTC with a more effective means of accessing and analyzing datasets in the government s possession that are likely to contain significant terrorism information.  They permit NCTC to consolidate disparate federal datasets that contain information of value to NCTC s critical counterterrorism mission.  Furthermore, the updated Guidelines do not supersede or replace any legal restrictions on information sharing (existing by statute, Executive Order, regulation, or international agreement).  Thus, the updated Guidelines do not give NCTC authority to require another agency to share any dataset where such sharing would contravene U.S. law or an international agreement.

One of the issues identified by Congress and the Intelligence Community after the 2009 Fort Hood shootings and the Christmas Day 2009 bombing attempt was the government s limited ability to query multiple federal datasets and to correlate information from many sources that might relate to a potential attack.  A review of government actions taken before these attacks recommended that the Intelligence Community push for the completion of state-of-the-art search and correlation capabilities, including techniques that would provide a single point of entry to various government databases.

Following the failed terrorist attack in December 2009, representatives of the counterterrorism community concluded it is vital for NCTC to be provided with a variety of datasets from various agencies that contain terrorism information, said Clapper, The ability to search against these datasets for up to five years on a continuing basis as these updated Guidelines permit will enable NCTC to accomplish its mission more practically and effectively than the 2008 Guidelines allowed.

The updated Guidelines have undergone extensive review within the Office of the Director of National Intelligence and the Department of Justice and have been coordinated throughout the Intelligence Community.  Under the National Security Act of 1947, NCTC is charged with serving as the primary organization in the U.S. Government for analyzing and integrating all intelligence possessed or acquired by the U.S. Government pertaining to terrorism and counterterrorism, excepting intelligence pertaining exclusively to domestic terrorists and domestic counterterrorism.  Consistent with this statutory mission, Executive Order 12333 provides that Intelligence Community elements may collect, retain, or disseminate information concerning United States Persons (USPs) only in accordance with procedures established by the head of the Intelligence Community element and approved by the Attorney General in consultation with the Director of National Intelligence.

The 2008 Guidelines required NCTC to promptly review USP information and then promptly remove it if it is not reasonably believed to constitute terrorism information.  This approach was a reasonable first step in 2008, but based on subsequent experience and lessons learned, the requirement to promptly remove USP information hampers NCTC s ability to identify terrorism information by connecting the dots across multiple datasets.

There are a number of protections built into the 2012 revised Guidelines, said Alexander Joel, ODNI Civil Liberties Protection Officer. Before obtaining a dataset, the Director of NCTC, in coordination with the data provider, is required to make a finding that the dataset is likely to contain significant terrorism information.

Once ingested, data is subject to a number of baseline safeguards carried over from the 2008 Guidelines, including restrictions that limit access to only those individuals with a mission need and who have received training on the Guidelines.

The approval of these Guidelines will significantly improve NCTC s ability to carry out its statutory mission said Clapper, Our citizens expect that we do everything in our power to keep them safe, while protecting privacy and other civil liberties. These Guidelines provide our counterterrorism analysts with the means to accomplish that task more effectively.

###

NCTC Guidelines: http://cryptome.org/2012/03/nctc-data-spy.pdf (2.2MB)

Cryptome – NSA Decryption Multipurpose Research Facility

The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)

By James Bamford

March 15, 2012

[Excerpts of excellent NSA overview to focus on the MRF decryption facility.]

When Barack Obama took office, Binney hoped the new administration might be open to reforming the program to address his constitutional concerns. He and another former senior NSA analyst, J. Kirk Wiebe, tried to bring the idea of an automated warrant-approval system to the attention of the Department of Justice’s inspector general. They were given the brush-off. “They said, oh, OK, we can’t comment,” Binney says.

Sitting in a restaurant not far from NSA headquarters, the place where he spent nearly 40 years of his life, Binney held his thumb and forefinger close together. “We are, like, that far from a turnkey totalitarian state,” he says.

There is still one technology preventing untrammeled government access to private digital data: strong encryption. Anyone—from terrorists and weapons dealers to corporations, financial institutions, and ordinary email senders—can use it to seal their messages, plans, photos, and documents in hardened data shells. For years, one of the hardest shells has been the Advanced Encryption Standard, one of several algorithms used by much of the world to encrypt data. Available in three different strengths—128 bits, 192 bits, and 256 bits—it’s incorporated in most commercial email programs and web browsers and is considered so strong that the NSA has even approved its use for top-secret US government communications. Most experts say that a so-called brute-force computer attack on the algorithm—trying one combination after another to unlock the encryption—would likely take longer than the age of the universe. For a 128-bit cipher, the number of trial-and-error attempts would be 340 undecillion (1036).

Breaking into those complex mathematical shells like the AES is one of the key reasons for the construction going on in Bluffdale. That kind of cryptanalysis requires two major ingredients: super-fast computers to conduct brute-force attacks on encrypted messages and a massive number of those messages for the computers to analyze. The more messages from a given target, the more likely it is for the computers to detect telltale patterns, and Bluffdale will be able to hold a great many messages. “We questioned it one time,” says another source, a senior intelligence manager who was also involved with the planning. “Why were we building this NSA facility? And, boy, they rolled out all the old guys—the crypto guys.” According to the official, these experts told then-director of national intelligence Dennis Blair, “You’ve got to build this thing because we just don’t have the capability of doing the code-breaking.” It was a candid admission. In the long war between the code breakers and the code makers—the tens of thousands of cryptographers in the worldwide computer security industry—the code breakers were admitting defeat.

So the agency had one major ingredient—a massive data storage facility—under way. Meanwhile, across the country in Tennessee, the government was working in utmost secrecy on the other vital element: the most powerful computer the world has ever known.

The plan was launched in 2004 as a modern-day Manhattan Project. Dubbed the High Productivity Computing Systems program, its goal was to advance computer speed a thousandfold, creating a machine that could execute a quadrillion (1015) operations a second, known as a petaflop—the computer equivalent of breaking the land speed record. And as with the Manhattan Project, the venue chosen for the supercomputing program was the town of Oak Ridge in eastern Tennessee, a rural area where sharp ridges give way to low, scattered hills, and the southwestward-flowing Clinch River bends sharply to the southeast. About 25 miles from Knoxville, it is the “secret city” where uranium- 235 was extracted for the first atomic bomb. A sign near the exit read: what you see here, what you do here, what you hear here, when you leave here, let it stay here. Today, not far from where that sign stood, Oak Ridge is home to the Department of Energy’s Oak Ridge National Laboratory, and it’s engaged in a new secret war. But this time, instead of a bomb of almost unimaginable power, the weapon is a computer of almost unimaginable speed.

In 2004, as part of the supercomputing program, the Department of Energy established its Oak Ridge Leadership Computing Facility for multiple agencies to join forces on the project. But in reality there would be two tracks, one unclassified, in which all of the scientific work would be public, and another top-secret, in which the NSA could pursue its own computer covertly. “For our purposes, they had to create a separate facility,” says a former senior NSA computer expert who worked on the project and is still associated with the agency. (He is one of three sources who described the program.) It was an expensive undertaking, but one the NSA was desperate to launch.

Known as the Multiprogram Research Facility, or Building 5300, the $41 million, five-story, 214,000-square-foot structure was built on a plot of land on the lab’s East Campus and completed in 2006. Behind the brick walls and green-tinted windows, 318 scientists, computer engineers, and other staff work in secret on the cryptanalytic applications of high-speed computing and other classified projects. The supercomputer center was named in honor of George R. Cotter, the NSA’s now-retired chief scientist and head of its information technology program. Not that you’d know it. “There’s no sign on the door,” says the ex-NSA computer expert.

At the DOE’s unclassified center at Oak Ridge, work progressed at a furious pace, although it was a one-way street when it came to cooperation with the closemouthed people in Building 5300. Nevertheless, the unclassified team had its Cray XT4 supercomputer upgraded to a warehouse-sized XT5. Named Jaguar for its speed, it clocked in at 1.75 petaflops, officially becoming the world’s fastest computer in 2009.

[Image]

1 Geostationary satellites

Four satellites positioned around the globe monitor frequencies carrying everything from walkie-talkies and cell phones in Libya to radar systems in North Korea. Onboard software acts as the first filter in the collection process, targeting only key regions, countries, cities, and phone numbers or email.

2 Aerospace Data Facility, Buckley Air Force Base, Colorado

Intelligence collected from the geostationary satellites, as well as signals from other spacecraft and overseas listening posts, is relayed to this facility outside Denver. About 850 NSA employees track the satellites, transmit target information, and download the intelligence haul.

3 NSA Georgia, Fort Gordon, Augusta, Georgia

Focuses on intercepts from Europe, the Middle East, and North Africa. Codenamed Sweet Tea, the facility has been massively expanded and now consists of a 604,000-square-foot operations building for up to 4,000 intercept operators, analysts, and other specialists.

4 NSA Texas, Lackland Air Force Base, San Antonio

Focuses on intercepts from Latin America and, since 9/11, the Middle East and Europe. Some 2,000 workers staff the operation. The NSA recently completed a $100 million renovation on a mega-data center here—a backup storage facility for the Utah Data Center.

5 NSA Hawaii, Oahu

Focuses on intercepts from Asia. Built to house an aircraft assembly plant during World War II, the 250,000-square-foot bunker is nicknamed the Hole. Like the other NSA operations centers, it has since been expanded: Its 2,700 employees now do their work aboveground from a new 234,000-square-foot facility.

6 Domestic listening posts

The NSA has long been free to eavesdrop on international satellite communications. But after 9/11, it installed taps in US telecom “switches,” gaining access to domestic traffic. An ex-NSA official says there are 10 to 20 such installations.

7 Overseas listening posts

According to a knowledgeable intelligence source, the NSA has installed taps on at least a dozen of the major overseas communications links, each capable of eavesdropping on information passing by at a high data rate.

8 Utah Data Center, Bluffdale, Utah

At a million square feet, this $2 billion digital storage facility outside Salt Lake City will be the centerpiece of the NSA’s cloud-based data strategy and essential in its plans for decrypting previously uncrackable documents.

9 Multiprogram Research Facility, Oak Ridge, Tennessee

Some 300 scientists and computer engineers with top security clearance toil away here, building the world’s fastest supercomputers and working on cryptanalytic applications and other secret projects.

10 NSA headquarters, Fort Meade, Maryland

Analysts here will access material stored at Bluffdale to prepare reports and recommendations that are sent to policymakers. To handle the increased data load, the NSA is also building an $896 million supercomputer here.

Oak Ridge National Laboratory – Multi-Program Research Facilityhttp://www.heery.com/Repository/Images/Oak_Ridge_National_Laboratories.jpg

[Image]

http://www.heery.com/portfolio/oak-ridge-national-laboratory.aspx?service=5

Oak Ridge National Laboratory – Multi-Program Research Facility

Oak Ridge, Tennessee

The Department of Energy (DOE) complex at Oak Ridge required the creation of a state of the art, large-scale, secure science and technology facility that would provide the appropriate infrastructure and environment to both integrate and consolidate multidisciplinary scientific capabilities for defense and homeland security activities. The Heery-designed and constructed Multi-Program Research Facility (MPRF) provides facilities for research and development activities in non-proliferation research, training and operations; cyber security research and development; geospatial analysis; inorganic membrane research and prototyping; and myriad other activities.

Based on Heery’s previous successful work with ORNL as part of a third-party development team, ORNL tapped the Keenan team to serve as its developer for the MPRF, with Heery in the role of design-builder.

The MPRF contains 218,000 SF of office and laboratory space. This highly secure building plays a key role in delivering the science and technology needed to protect homeland and national security. In addition, Heery International continues to work on various new assignments on the ORNL campus.

The goal was to develop cutting-edge facilities designed for sustainability and energy efficiency. Heery guided ORNL and the development team in delivering facilities to showcase energy and water efficiency and renewable energy improvements. With Heery’s assistance, ORNL now has the most LEED-certified space in the entire DOE system, having attained LEED certification for the firm’s earlier project, the East Campus Complex, and LEED Gold certification for the MPRF, which is the first LEED Gold facility on the ORNL campus.

Following images from bing.com/mapsThe MRF is at upper left.

[Image]

[Image]
[Image]
[Image]
[Image]
[Image]
http://femp.buildinggreen.com/overview.cfm?ProjectID=1125Oak Ridge National Laboratory Multiprogram Research Facility (MRF)

(ORNL Multiprogram Research Facility)

[Image]

Overview

Location: Oak Ridge, TN

Building type(s): Other, Laboratory, Commercial office

New construction

195,000 ft2 (18,100 m2)

Project scope: 5-story building

Rural setting

Completed October 2006

Rating: U.S. Green Building Council LEED-NC, v.2/v.2.1–Level: Gold (39 points)

The Multiprogram Research Facility (MRF) was implemented through a design-build contract, but is a complex mixture of labs and offices that have stringent operational, security, and environmental and energy requirements. The program was highly developed and has detailed technical parameters that could not be compromised.

Environmental Aspects

The building’s vertical orientation minimized its footprint on the landscape. Using native, drought-resistant plants in the landscape obviated the need for irrigation. This, along with the use of low-flow plumbing fixtures, reduced potable water usage by approximately 34%.

The building was projected to use 25% less energy than that of a comparable facility built in minimal compliance with code. A hybrid solar lighting system with rooftop solar collectors was installed to test the feasibility of using fiber optics for natural lighting.

The project team preferred materials with recycled content and those that were manufactured regionally. The team also recycled construction waste wherever possible.

Owner & Occupancy

Owned by Keenan Development Associates, LLC, Corporation, for-profit

Occupants: Federal government

Typically occupied by 318 people, 40 hours per person per week

Expected Building Service Life: 35 years

 

Building Programs

 

Indoor Spaces:

 

 

Other (43%), Office (18%), Laboratory (14%), Conference (6%), Data processing (6%), Mechanical systems (3%), Retail general (3%), Public assembly (2%), Restrooms (2%), Lobby/reception (2%), Cafeteria, Circulation, Gymnasium, Electrical systems

CONFIDENTIAL – NSA Opens $286 Million Cryptologic Facility in Georgia

The National Security Agency officially opened for business Monday in its new building on Fort Gordon.In a rare public ceremony for an agency typically cloaked in secrecy, NSA’s director and other dignitaries symbolically cut the ribbon inside a 200-seat rotunda that will serve as an operations center. When full occupancy is completed in late summer, about 4,000 civilian and military workers trained in linguistics and cryptology will report to what’s known as NSA Georgia.Army Gen. Keith Alexander, the commander of the Fort Meade, Md.,-based NSA, acknowledged the irony of inviting the public to a department jokingly referred to as “No Such Agency.”

He heaped praise, however, on the work done in Augusta to support national defense and military missions abroad.

NSA/CSS Opens Its Newest Facility In Georgia

The National Security Agency/Central Security Service officially opened the new NSA/CSS Georgia Cryptologic Center at a ribbon-cutting ceremony where officials emphasized how the $286 million complex will provide cryptologic professionals with the latest state-of-the-art tools to conduct signals intelligence operations, train the cryptologic workforce, and enable global communications.NSA/CSS has had a presence in Georgia for over 16 years on Ft. Gordon, when only 50 people arrived to establish one of NSA’s Regional Security Operations Centers.As a testament to this rich heritage, GEN Keith B. Alexander – Commander, U.S. Cyber Command, Director, NSA/Chief, CSS – told the guests at the ceremony, which included federal, state, and local officials, that the NSA/CSS workforce nominated Mr. John Whitelaw for the honor of having one of the buildings in the complex dedicated in his name, because they considered him influential to the establishment and success of the mission in Georgia. In 1995 Mr. Whitelaw was named the first Deputy Director of Operations for NSA Georgia and remained in that position until his death in 2004.

“And there have been many successes here at NSA Georgia as evidenced by the fact that this site has won the Travis Trophy six times,” said GEN Alexander. The Travis Trophy is an annual award presented to those whose activities have made a significant contribution to NSA/CSS’s mission.

“This new facility will allow the National Security Agency to work more effectively and efficiently in protecting our homeland,” said Sen. Saxby Chambliss. “It will also attract more jobs to the Augusta area. The opening of this complex means that Georgians will play an even greater role in ensuring the safety and security of our nation.”

The new NSA/CSS Georgia Cryptologic Center is another step in the NSA’s efforts to further evolve a cryptologic enterprise that is resilient, agile, and effective to respond to the current and future threat environment.

NSA/CSS opened a new facility in Hawaii in January 2012 and is also upgrading the cryptologic centers in Texas and Denver to make the agency’s global enterprise even more seamless as it confronts the increasing challenges of the future.

The Nuclear Vault – “Nobody Wins a Nuclear War” But “Success” is Possible

General Curtis LeMay, mid-1957, sometime during his transition from Commander-in-Chief of the Strategic Air Command [1948-1957] to Vice Chief of Staff, U.S. Air Force [1957-1961].  [Photo source: U.S. National Archives, Still Pictures Division, RG 342B, Box 507 B&W]

 

“The Power of Decision” may be the first (and perhaps the only) U.S. government film dramatizing nuclear war decision-making.  Commissioned by the Strategic Air Command in 1956, the film has the look of a 1950s TV drama, but the subject is the ultimate Cold War nightmare.  By the end of the film, after the U.S. Air Force has implemented war plan “Quick Strike” following a Soviet surprise attack, millions of Americans, Russians, Europeans, and Japanese are dead.  The narrator, a Colonel Dodd, asserts that “nobody wins a nuclear war because both sides are sure to suffer terrible damage.” Despite the “catastrophic” damage, one of the film’s operating assumptions is that defeat is avoidable as long as the adversary cannot impose its “will” on the United States.  The film’s last few minutes suggest that the United States would prevail because of the “success” of its nuclear air offensive.  Moscow, not the United States, is sending out pleas for a cease-fire.

The conviction that the United States could prevail was a doctrinal necessity because Air Force leaders assumed the decisiveness of air power.  The founding fathers of the U.S. Air Force came out of World War II with an unshakeable, if exaggerated, conviction that the strategic bombing of Germany and Japan had been decisive for the Allied victory and that air power would be crucial in future conflicts. (Note 1)  The film’s title: “Power of Decision” embodies that conviction. The title itself is a reference to a 1948 statement by General George C. Kenney, the Strategic Air Command’s first commander-in-chief: “A war in which either or both opponents use atomic bombs will be over in a matter of days…The Air Force that is superior in its capability of destruction plays the dominant role and has the power of decision.” (Note 2)  A confident statement made by one of the characters, General “Pete” Larson, near the close of reel 6 flows from that assumption: the Soviets “must quit; we have the air and the power and they know it.”
The story begins with Colonel Dodd, standing in the underground command post of the “Long Range Offense Force” (oddly, the Strategic Air Command is never mentioned by name).  Dodd discusses the Force’s strike capabilities, its mechanisms for keeping track of its strategic assets, and its war plans.  That hundreds of bombers, based in U.S. territories and overseas bases, are ready to launch at a moment’s notice is the “surest way to prevent war.”  Dodd does not think that the Soviets are likely to strike, but if deterrence fails and the Soviets launch an attack, “this is what will happen.”

What “happens” is the initial detection by U.S. air defense network of the approach of Soviet bombers over the Arctic Circle. That leads to General Larson’s decision to launch the SAC alert force under plan “Quick Strike”; airborne and nuclear-armed alert bombers fly toward the Soviet periphery, but stay at position until they receive an attack order (this was the concept of “Fail Safe” or “Positive Control” although those terms were not used in the film).  About an hour after the alert force is launched, General Larson receives reports of attacks on U.S. bases, followed by more information on Soviet nuclear attacks on cities and military bases in Japan and Western Europe. “That does it,” General Turner (one of Larson’s deputies) exclaims. He soon receives a call on the red phone from the Joint Chiefs, who with the President, are in a protected command post. The president has ordered the execution of “Quick Strike,” releasing bombers and missiles to strike the Soviet Union.  This simultaneous bomber-missile “double punch” is aimed at “all elements of [Soviet] air power” [bomber bases] along with “war making and war sustaining resources,” which meant strikes on urban-industrial areas and urban populations.  To depict the undepictable, the film’s producers use stock footage of nuclear tests and missile and bomber launches.

Once it is evident that the Soviets have launched a surprise air attack, Colonel Dodd observes that “By giving up the initiative, the West must expect to take the first blow.” This statement is not developed, but for Air Force planners, “initiative” meant a preemptive attack or a first strike.  By the early 1950, senior military planners and defense officials had begun considering the possibility of pre-emptive attacks on the basis of strategic warning; that is, if the United States intelligence warning system collected reliable information on an impending Soviet attack, decision-makers could approve strikes against Soviet military forces to disrupt it. (Note 3) Consistent with this, Strategic Air Command war plans assumed “two basic modes” for executing strike plans [See Document One below]. (Note 4) One was retaliation against a surprise attack; the other “plan was based on the assumption that the United States had strategic warning and had decided to take the initiative.”  The SAC strike force would then be “launched to penetrate en masse prior to the enemy attack; the main target would be the enemy’s retaliatory capability.”

In the last part of reel 6, Air Force intelligence briefings review the destruction of the Soviet military machine, including destruction of air bases, weapons storage centers, and government control centers, among other targets.  “Target M,” presumably Moscow, has “been destroyed” by a nuclear weapon which struck 300 yards from the aiming point.  The Soviet attack has done calamitous damage to the United States, with 60 million casualties, including 20 million wounded, but evidence was becoming available of the “success” of the U.S. air offensive.  The Soviet Air Force has been reduced to a handful of aircraft, it had stopped launching nuclear strikes outside of its territory, and SACEUR [Supreme Allied Commander Europe] reports the “complete disintegration of resistance” by Soviet ground forces. Moreover, cease-fire requests are coming in from the Soviets.  In this context, General Larson’s certainty that the “Soviets must quit” conveyed prevailing assumptions about the value of strategic air power.

Around the time when “The Power of Decision” as being produced, a statement by SAC Commander-in-Chief General Curtis LeMay made explicit what was implicit in Larson’s observation.  In an address before the Air Force’s Scientific Advisory Board in 1957 [see Document Two], LeMay argued that U.S. strategic forces could not be an effective deterrent unless they were “clearly capable of winning under operational handicaps of bad weather and no more than tactical warning.”  And by winning, LeMay said he meant “achieving a condition wherein the enemy cannot impose his will on us, but we can impose our will on him.” Larson’s statement about control of the air dovetailed exactly with LeMay’s assumptions about winning.

Little is known about the production and distribution of “The Power of Decision,” or even if it was actually shown.  According to the history of the Air Photographic and Charting Service for January through June 1957, on 28 May 1956, the Strategic Air Command requested the service to produce the film, which would be classified Secret.  SAC leaders may have wanted such a film for internal indoctrination and training purposes, to help officers and airmen prepare themselves for the worst active-duty situation that they could encounter.  Perhaps the relatively unruffled style of the film’s performers was to serve as a model for SAC officers if they ever had to follow orders that could produce a nuclear holocaust. In any event, the script for “Power of Decision” was approved on 10 May 1957 and a production planning conference took place on 29 May 1957. The contract productions section of the Air Photographic and Charting Service was the film’s producing unit. (Note 5)

The next step was to find actors with security clearances because even the synopsis of the film was classified secret (although later downgraded to “official use only”).  As the Air Force was not in the business of hiring actors, the production unit engaged the services of MPO Productions, a New York-based firm which produced commercials and industrial films. [References to MPO, Inc. are on the index cards and on “The End” frame at the close of reel 6].  What happened next, when the work on the film was completed, SAC’s assessment of the project, and whether, when, or where the film was shown, cannot presently be determined, although the information may be in the living memories of participants or viewers from those days.

Note: The relatively poor quality of this digital reproduction reflects the condition of the original reels as turned over to the National Archives by the Air Force.

 

Notes


1. For the development of ideas about air power and strategic bombing, see Tami Davis Biddle, Rhetoric and Reality in Air Warfare: The Evolution of British and American Ideas about Strategic Bombing, 1941–1945 ( Princeton University Press, 2002).  See page 293 for “overselling” of air power. See also Gian Peri Gentile, “Advocacy or Assessment? The United States Strategic Bombing Survey of Germany and Japan,” Pacific Historical Review 66 (1997): 53-79.

2. Quotation from Headquarters, Strategic Air Command,  History of Strategic Air Command, July-December 1959, Volume I,  191.  Information provided by Mr. Barry Spink, U.S. Air Force Historical Research Agency (AFHRA), Maxwell Air Force Base, Alabama,  e-mail 17 May 2010.   After his unsuccessful tour as first Commander-in-Chief Strategic Air Command, Kenney become notorious for his endorsement of preventive war against the Soviet Union. See Marc Trachtenberg, History and Strategy Princeton: Princeton University Press, 1991), 106.

3. See Trachtenberg, History and Strategy, 134-135.

4. For a briefing by SAC commander-in-chief Curtis LeMay of the nuclear war plan, see David A. Rosenberg, “Smoking Radiating Ruin at the End of Two Hours”: Documents on American Plans for Nuclear War with the Soviet Union, 1954-55,” International Security, 6 (Winter, 1981-1982): 3-38.

5. Information from “Air Photographic and Charting Service history for January through June 1957,” provided  by Mr. Barry Spink, AFHRA e-mail 13 May 2010.

 

TOP SECRET – CRYPTOME publishes – NSA Email Addresses, Nyms and Names

5 February 2012

NSA Email Addresses, Nyms and Names

 


A sends:

Below is unverified information posted 9 days ago on this .onion site:

http://4eiruntyxxbgfv7o.onion/snapbbs/736364f4/

(thread: “where to get confidential info”)

It may simply be the INSA list, but I lack the time to compare.

(Director of NSA)
KBalexanderLTG@nsa.gov
KBalex2@nsa.gov
;-)
RFTYGAR@NSA.GOV (Major General David B. Lacquement, Cybercom)
dfmuzzy@nsa.gov or dbmuzzy@nsa.gov
algorin@nsa.gov
bkind@nsa.gov
bmcrumm@nsa.gov
bmkaspa@nsa.gov
bmstite@nsa.gov
ceander@nsa.gov
dabonan@nsa.gov
dahatch@nsa.gov
daplunk@nsa.gov
dbbuie@nsa.gov
dcover@nsa.gov
dpcargo@nsa.gov
dpmatth@nsa.gov
drennis@nsa.gov
dvheinb@nsa.gov
eejorda@nsa.gov
elbauma@nsa.gov
fdbedar@nsa.gov
fjfleis@nsa.gov
fjorlos@nsa.gov
gafrisv@nsa.gov
gcnolte@nsa.gov
gdbartk@nsa.gov
ghevens@nsa.gov
grcotte@nsa.gov
hadavis@nsa.gov
hlriley@nsa.gov
jaemmel@nsa.gov
jcingli@nsa.gov
jcmorti@nsa.gov
jcsmart@nsa.gov
jdcohen@nsa.gov
jdheath@nsa.gov
jewhite@nsa.gov
jgrusse@nsa.gov
jhdoody@nsa.gov
jhohara@nsa.gov
jimathe@nsa.gov
jjbrand@nsa.gov
jksilk@nsa.gov
jllusby@nsa.gov
jmcusic@nsa.gov
jmjohns@nsa.gov
jrsmith@nsa.gov
jswalsm@nsa.gov
jtnader@nsa.gov
kamille@nsa.gov
kbalex2@nsa.gov
labaer@nsa.gov
landers@nsa.gov
lfgiles@nsa.gov
lkensor@nsa.gov
lphall@nsa.gov
lrstanl@nsa.gov
ltdunno@nsa.gov
mabeatt@nsa.gov
mawirt@nsa.gov
mgflemi@nsa.gov
mjgood@nsa.gov
mkmcnam@nsa.gov
mrevans@nsa.gov
mrredgr@nsa.gov
mthorto@nsa.gov
nasmith@nsa.gov
pacabra@nsa.gov
papitte@nsa.gov
plihnat@nsa.gov
plporte@nsa.gov
rdjones@nsa.gov
rdsiers@nsa.gov
relewis@nsa.gov
resunda@nsa.gov
rhkrysi@nsa.gov
rlcarte@nsa.gov
rlmeyer@nsa.gov
rmmeyer@nsa.gov
rpkelly@nsa.gov
sfdishe@nsa.gov
sfdonne@nsa.gov
sgmille@nsa.gov
sjmille@nsa.gov
sstanar@nsa.gov
swramsa@nsa.gov
taedwar@nsa.gov
tdsoule@nsa.gov
tjpeter@nsa.gov
twsager@nsa.gov
vacurti@nsa.gov
vnhalli@nsa.gov
wjmarsh@nsa.gov
wmmurph@nsa.gov
wmthomp@nsa.gov
wjseman@nsa.gov
--Korruptor posted 9 days 22 hours ago:

MTCLAYT@NSA.GOV
NCMUNKO@NSA.GOV
cjhuff@nsa.gov
RBQUINN@NSA.GOV

Lorenzo Mccormick lmccorm@nsa.gov
Angelina Mcclure ammccl3@nsa.gov
Timothy Gibbs tjgibbs@nsa.gov
Joshua Foredyce jdfored@nsa.gov
Nicole Morrison nnmorri@nsa.gov
Sally Smith sssmit3@nsa.gov
Todd Black tfblack@nsa.gov
Todd Black tfblack@nsa.gov
Viola Williams vrmclau@nsa.gov
Stephen Schultz UN:SRSYSENGINEER sjschul@nsa.gov
Yesenia Martinez yamarti@nsa.gov
Teresa Straniero tjstran@nsa.gov
Taj Holmes tlholm3@nsa.gov
Joseph Johnson jjohns5@nsa.gov
Hyon-chu karen Cho KAREN0120 hkcho@nsa.gov 
Nathan Nysether nenyset@nsa.gov
Everett Browning edbrow2@nsa.gov
Sean Williamson smwill8@nsa.gov
Kevin Standifer kmstand@nsa.gov
Maria Johnson msjohn8@nsa.gov

id=1607452 lastname=DEBOSE firstname=JULIUS email=JDDEBOS@NSA.GOV
id=1838179 lastname=MEADOWS firstname=ALLEN email=ALMEADO@NSA.GOV
id=1836143 lastname=FUNCHES firstname=DAVID email=DLFUNCH@NSA.GOV
id=1812268 lastname=PUFFENBARGER firstname=JAMES email=JGPUFFE@NSA.GOV
id=1840655 lastname=LOWRY firstname=CLINT email=CMLOWRY@NSA.GOV
id=1844703 lastname=SENYARD firstname=KRISTEN email=KSSENYA@NSA.GOV
id=1822902 lastname=DEEDS firstname=JENNIFER email=JLDEEDS@NSA.GOV
id=1424394 lastname=HEDRICK firstname=EVERETT email=EGHEDRI@NSA.GOV
id=1847023 lastname=MILO firstname=JOANNE email=JOANNE.M.MILO@USACE.ARMY.MIL
id=1319638 lastname=CLARK firstname=SARA email=SJDEBOE@NSA.GOV
id=1852085 lastname=GRANGER firstname=MELFORDE email=MAGRANG@NSA.GOV
id=1639154 lastname=WHITE firstname=ARLENE email=AFWHITE@NSA.GOV
id=1843795 lastname=RAWLINS firstname=BRITTANI email=BRITTANI.RAWLINS@TMA.OSD.MIL
id=1850937 lastname=CRISP firstname=KENNETH email=KCCRISP@NSA.GOV
id=1846228 lastname=WEEKS firstname=JEFFREY email=JSWEEK2@NSA.GOV
id=1847105 lastname=PATRICK firstname=MARY email=MJPATRI@NSA.GOV
id=972021  lastname=BROWN firstname=KIMBERLY email=KCBROWN@NSA.GOV
id=1843790 lastname=HOFFECKER firstname=FRANK email=FSHOFFE@NSA.GOV
id=1568245 lastname=ZUBACK firstname=KATHERINE email=KCZUBAC@NSA.GOV
id=1702604 lastname=MILLS firstname=HAROLYN email=HWMILL2@NSA.GOV
id=1706716 lastname=ANDERSON firstname=JARED email=JLAND11@NSA.GOV
id=1773809 lastname=FERTITTA-ZEPP firstname=MARY ROSE email=MTFERTI@NSA.GOV
id=1801498 lastname=MATTHEWS firstname=JACQUELINE email=JGMATT4@NSA.GOV
id=1827983 lastname=KELLY firstname=SHERI email=SRKELLY@NSA.GOV
id=881503  lastname=ROAKER firstname=AUDREY email=ADROAKE@NSA.GOV
id=1758757 lastname=HORGER firstname=ROBYN email=RHORGER@NSA.GOV
id=62230   lastname=SCOURTIS firstname=THEODORE email=TRSCOUR@NSA.GOV
id=1725805 lastname=JAROSINSKI firstname=JAMES email=JMJAROS@NSA.GOV
id=63369   lastname=PHILLIPS firstname=SUSAN email=SEPHIL3@NSA.GOV
id=1841784 lastname=BYAM firstname=NICOLE email=NABYAM@NSA.GOV
id=1837316 lastname=ACKERMANN firstname=SUSAN email=SACKERM@NSA.GOV
id=1838180 lastname=PALMER firstname=KEAVIONA email=KKPALM2@NSA.GOV
id=1620956 lastname=FINE firstname=CHET email=CBFINE@NSA.GOV
id=1193570 lastname=WHEELER firstname=DONALD email=DAWHEEL@NSA.GOV
id=1680358 lastname=FELTON firstname=SHARISSE email=SRFELTO@NSA.GOV
id=1299959 lastname=SCARDINA firstname=VONDA email=VRSCARD@NSA.GOV
id=952454  lastname=HOLMGREN firstname=CHRISTINE email=CMHOLMG@NSA.GOV
id=1836488 lastname=BARNES firstname=RAVEN email=RCBARN4@NSA.GOV
id=1809599 lastname=TOPIELEC firstname=DENNIS email=DRTOPI2@NSA.GOV
id=1544912 lastname=EICH firstname=ARTHUR email=ANEICH@NSA.GOV
id=1481136 lastname=WASSBERG firstname=MARK email=MCWASSB@NSA.GOV
id=1486369 lastname=SMITH firstname=ANTOINETTE email=ARSMITH@NSA.GOV
id=1809599 lastname=TOPIELEC firstname=DENNIS email=DRTOPI2@NSA.GOV
id=1261344 lastname=LAIRD firstname=JOHN email=JMLAIRD@NSA.GOV
id=1812529 lastname=KIMSEY firstname=JAYSON email=JEKIMSE@NSA.GOV
id=1744167 lastname=RAGER firstname=ZACHARY email=ZMRAGER@NSA.GOV
id=1839355 lastname=VIDMAR firstname=SAMUEL email=STVIDMA@NSA.GOV
id=1843789 lastname=LANGDON firstname=BRENDAN email=BMLANGD@NSA.GOV
id=1832260 lastname=PEREZ firstname=CADDIE email=CEPERE2@NSA.GOV
id=1831824 lastname=BROCATO firstname=ADAM email=ARBROCA@NSA.GOV
id=1567765 lastname=FLYNN firstname=JESSICA email=JRFLYNN@NSA.GOV
id=812143  lastname=WILLIAMS firstname=KIMBERLEE email=KVWILL2@NSA.GOV
id=55539   lastname=LEVINE firstname=DIANA email=DKLEVIN@NSA.GOV
id=1767656 lastname=COPELLO firstname=TRACY email=TKCOPEL@NSA.GOV
id=1809599 lastname=TOPIELEC firstname=DENNIS email=DRTOPI2@NSA.GOV
id=1699999 lastname=CRABTREE firstname=BRIAN email=BCCRABT@NSA.GOV
id=926230  lastname=MEJIA firstname=ADAM email=ADAM.MEJIA@NSA.NAPLES.NAVY.MIL
id=1699380 lastname=PARKER firstname=HELGA email=HSPARKE@NSA.GOV
id=92796   lastname=HATFIELD firstname=ELIZABETH email=ELHATFI@NSA.GOV
id=970496  lastname=BRIGHTWELL firstname=KALA email=KABRIG2@NSA.GOV
id=1619826 lastname=WONDERLY firstname=BRIAN email=BCWONDE@NSA.GOV
id=1599843 lastname=CONWAY-BRANCH firstname=CAROLYN email=CPCONWA@NSA.GOV
id=1613415 lastname=WHITTINGTON firstname=LISA email=LDWHITT2@NSA.GOV
id=1776880 lastname=COOPER firstname=DARYL email=DGCOOPE@NSA.GOV
id=1790953 lastname=DUNKER firstname=THOMAS email=TJDUNKE@NSA.GOV
id=1630878 lastname=BEELER firstname=RYAN email=RWBEELE@NSA.GOV
id=1726927 lastname=HESTER firstname=CARLA email=CJHESTE@NSA.GOV
id=1717359 lastname=TEDESCHI firstname=STEPHEN email=SPTEDES@NSA.GOV
id=1822638 lastname=WARD firstname=ELIZABETH email=ECWARD1@NSA.GOV
id=1587185 lastname=COOK firstname=TASHA email=TACOOK2@NSA.GOV
id=1740730 lastname=BROCKMEYER firstname=PETER email=PCBROCK@NSA.GOV
id=1219490 lastname=ZULLO firstname=KECIA email=KKZULLO@NSA.GOV
id=986360  lastname=ACKIES firstname=HENRY email=HLACKIE@NSA.GOV
id=1205401 lastname=HARVEY firstname=TRISTAN email=TDHARVE@NSA.GOV
id=1445825 lastname=HILD firstname=LAURA email=LLHILD@NSA.GOV
id=1618446 lastname=MARTINEAU firstname=NICHOLAS email=NDMART2@NSA.GOV
id=801833  lastname=BLAIS firstname=DAVID email=DMBLAIS@NSA.GOV
id=1744167 lastname=RAGER firstname=ZACHARY email=ZMRAGER@NSA.GOV
id=1727564 lastname=CROUSE firstname=JAMI email=JLCROU2@NSA.GOV
id=1848401 lastname=CORLEY firstname=SHANNON email=SMCORLE@NSA.GOV
id=1842936 lastname=MARQUARDT firstname=HOLLY email=HLMARQU@NSA.GOV
id=1568495 lastname=ELKINS firstname=GREGORY email=GSELKIN@NSA.GOV
id=1806965 lastname=TRELOAR firstname=BARRY email=BFTRELO@NSA.GOV
id=1729197 lastname=ELLWOOD firstname=PAULA email=PGELLWO@NSA.GOV
id=1262990 lastname=MYERS firstname=KENNETH email=KEMYERS@NSA.GOV
id=1836712 lastname=TROISI firstname=MARK email=MJTROIS@NSA.GOV
id=1616516 lastname=LOWE firstname=TRINA email=TMLOWE@NSA.GOV
id=1828431 lastname=HENSLEY firstname=MELISSA email=MCHENSL@NSA.GOV
id=1613083 lastname=RAMIREZ firstname=SHEILA email=STRAMIR@NSA.GOV
id=910975  lastname=JOHNSON firstname=TARA email=TRJOHN5@NSA.GOV
id=1572257 lastname=STALLINGS firstname=LACY email=LJSTAL2@NSA.GOV
id=1600853 lastname=DAVIS firstname=SARAH email=SEDAVI3@NSA.GOV
id=1608061 lastname=EVANS firstname=ERIC email=EDEVANS@NSA.GOV
id=1779020 lastname=LOOK firstname=KAREN email=KLLOOK@NSA.GOV
id=1809640 lastname=ARSENAULT firstname=ROBERT email=REARSEN@NSA.GOV
id=1520035 lastname=BURDETTE firstname=ROBERT email=RJBURD3@NSA.GOV
id=883230  lastname=LAKE firstname=BARRY email=BALAKE@NSA.GOV
id=1516236 lastname=HILTON firstname=ROBERT email=RJHILTO@NSA.GOV
id=86769   lastname=MAHER firstname=WENDY email=WAMAHER@NSA.GOV
id=1764117 lastname=GEIGER-ALSTON firstname=STACIA email=SLGEIGE@NSA.GOV
id=1746685 lastname=KINGERY firstname=JILL email=JAKINGE@NSA.GOV
id=1478578 lastname=MIKLUSAK firstname=GREGORY email=GVMIKLU@NSA.GOV
id=15637   lastname=PHELPS firstname=AMANDA email=AAPHELP@NSA.GOV
id=819655  lastname=CARSON firstname=WILLIAM email=WSCARSO@NSA.GOV =


 

see also

http://cryptome.org/2012/01/0086.htm


The National Security Archive – Cracking a Vietnam War Mystery

Washington, D.C., February, 2012 – Casting new light on one of the most controversial and enduring mysteries of the Vietnam War, a new book using evidence from long-hidden communist sources suggests that the U.S. Government missed a major chance to open peace talks with North Vietnam in late 1966, more than eighteen months before the opening of the Paris peace talks and more than six years before the accords that finally ended US direct involvement in the fighting. The revelations contained in Marigold: The Lost Chance for Peace in Vietnam by James G. Hershberg imply that the United States might have escaped its Vietnam predicament with a far lower toll: the secret Polish-Italian peace attempt code-named “Marigold” by U.S. officials culminated at a time when roughly 6,250 Americans had perished, compared to the more than 58,000 who ultimately died in the war.[1]

At one point the clandestine diplomacy verged on a breakthrough, with the apparent mutual agreement to hold an unprecedented meeting between US and North Vietnamese ambassadors in Warsaw to confirm Washington’s adherence to a ten-point formula for a settlement.  “I thought I had done something worthwhile in my life,” recalled the American ambassador in Saigon at the time, Henry Cabot Lodge, of that moment of seeming success with his diplomatic partners from Poland and Italy. “We had a drink on it.”[2]  A date was even tentatively set for the enemy ambassadors to meet: December 6, 1966.  But before the encounter could take place, the covert effort was first suspended—due, the Poles said, to the U.S. bombing of Hanoi, the first such strikes around the North Vietnamese capital in more than five months—and then collapsed, for reasons which were disputed in acrimonious private US-Polish exchanges at the time. Before long, those arguments seeped into the press, sparking an international scandal and leaving behind a convoluted historical mystery—until now.

The inside story of these murky diplomatic machinations, as well as other revelations concerning the Vietnam War, the Cold War, the Sino-Soviet split, and American politics and journalism in the 1960s, can now be found in Hershberg’s book, published this week by the Stanford University Press and the Woodrow Wilson Center Press. Challenging the conventional wisdom that both Washington and Hanoi were so dug in at the time that no real chance for peace (or even serious peace talks) then existed, the study utilizes more than a decade of archival research in more than a dozen countries, both communist (and former communist) and Western, as well as interviews with veterans of the events in Poland, Vietnam, Italy, and the United States—including roughly 50 hours of interviews in Warsaw with the key figure in the affair, former Polish diplomat Janusz Lewandowski, who comes in from the cold war to offer his perspective openly and in depth for the first time.

Background

First—some context. Between early 1965, when the United States sharply escalated its military involvement in Vietnam, and the spring of 1968, when Washington and Hanoi finally agreed to talk in Paris, hundreds of attempts were made to bring the warring sides to the bargaining table.  Some were public, some secret; some by third countries, some by individuals, some by institutions or organizations; some involved letters, some appeals, some “plans” or “points” or “formulas,” some citations of past accords or international laws or conventions; some were purported “peace feelers” or “signals” so subtle—a wink-and-nod or linguistic wrinkle in an otherwise mundane statement, or a barely discernable decrease in certain military activities—that no one really knew whether they even existed or (if sent) were noticed by their intended target; some were derided by Lyndon Johnson and his secretary of state, Dean Rusk, as pipe-dreams spun by eccentric egotists or idealistic schemers who had contracted “Nobel Peace Prize fever”; others were sophisticated, painstakingly-planned diplomatic ventures designed and conducted at the highest levels of statesmanship.

But they all had one thing in common: they all failed.  And over those three years, as U.S. forces in Vietnam mushroomed from 25,000 to more than half a million and the war crippled the Johnson Presidency and poisoned American politics, the death and destruction ground on ceaselessly, with thousands of Vietnamese and Americans lives lost every month and countless more ruined.  Most of the ill-fated negotiating initiatives undertaken during the 1965-1968 period of escalating conflict never had a real chance: the opposing sides simply weren’t seriously prepared to consider peace, or even peace talks, on terms acceptable to the other.  (Some were even designed to fail, to impress public opinion and justify subsequent, already planned military escalation.[3])  Rather than risk defeat or humiliation at the bargaining table, powerful factions on both sides preferred to seek military victory—another Dien Bien Phu, the North Vietnamese imagined, recalling the triumph over the French; or, the Americans calculated, pounding the enemy until it swallowed the status quo ante, the division between north and south, as in Korea.

But, there was one exception to this pattern of inevitable, over-determined deadlock: Using new evidence that has emerged only since the end of the Cold War, Marigold: The Lost Chance for Peace in Vietnam contends that in late 1966 the United States likely missed a genuine opportunity to begin winding down its disastrous military involvement in Vietnam, on politically-palatable terms; that, at a minimum, the Johnson Administration botched a chance to enter into direct talks with Hanoi at that time, that it misconstrued the most crucial aspects of the secret diplomatic initiative that nearly achieved that goal, and then—at the time and later, in press leaks and memoirs and covert international contacts—covered up its own errors.  Moreover, it shows that the initiative’s collapse, as misunderstood by both sides (each of which thought the other had acted in bad faith), not only signified their shared failure to open a political track that might have led to genuine negotiations, but made it more difficult later on to overcome mutual distrust and enmity and enter into direct discussions—in effect, dealing a double blow to peace hopes, laying the groundwork for further escalation (including Hanoi’s decision to launch the January 1968 Tet Offensive), and probably delaying the ultimate beginning of negotiations and, perhaps, the end of the war.  (Marigold’s failure, once it seeped into public consciousness through press leaks, also roiled American politics, spurring charges from antiwar critics that President Johnson was insincere and/or incompetent in seeking peace in Vietnam, and widening the “credibility gap” that increasingly undermined his public standing.)

Uncovering the Marigold story has long challenged investigators, who were stymied by lack of access to key sources. Of the myriad secret efforts undertaken to promote the opening of U.S.-North Vietnamese peace talks between early 1965 and April 1968, the distinguished Vietnam War historian George C. Herring judged Marigold to be “one of the most controversial” and “in many ways the most intriguing,” a “possibly promising” diplomatic initiative whose “origins and denouement remain shrouded in mystery.”[4]

In their 1968 book The Secret Search for Peace in Vietnam, David Kraslow and Stuart H. Loory quoted an unidentified “close associate” of President Johnson as saying that they would “never get the inside story” of Marigold.

Why not?

“Because it makes our government look so bad.”[5]

Finally presenting the “inside story”—or as much as the declassified record finally reveals—Marigold: The Lost Chance for Peace corroborates the sentiment of this unnamed source (which the book identifies as Bill Moyers, LBJ’s protégé and former press secretary, who had recently left the White House[6]), but also concludes that blame for Marigold’s failure was shared, the consequence of misjudgments and errors by all three key participants: the U.S., Polish, and North Vietnamese governments.

A Cold War Anomaly:A Communist Ambassador in Saigon

At the heart of the affair was a cold war anomaly.  Not a single communist government recognized the Republic of Vietnam (South Vietnam), instead locating their embassies in Hanoi, the capital of the Democratic Republic of Vietnam (North Vietnam), and maintaining fraternal interparty relations with the ruling Vietnamese Workers’ Party, or Lao Dong.  Yet, there was a communist diplomat of ambassadorial rank based in Saigon throughout the war due to the presence of the International Control Commission (ICC) established by the 1954 Geneva Accords that ended the post-World War II conflict between colonial France and the communist/nationalist Viet Minh forces led by Ho Chi Minh.[7]  The East-West pact reached at Geneva split Vietnam at the 17th parallel, supposedly temporarily, pending elections to unify the country within two years, but the voting never took place and the division congealed into two rival regimes, the communist DRV in the north and the anti-communist RVN in the south, now backed by the Americans, who had replaced the French.  Yet, even though the Geneva Accords were essentially dead by the end of the 1950s, no one wanted to pull the plug on the group set up to monitor both sides’ compliance with them: the ICC (formally known as the International Committee for Control and Supervision).

As a cold war compromise, the ICC’s membership was delicately balanced between East and West, consisting of Poland, Canada, and neutral India as chair; as a result, the group unsurprisingly soon found itself stalemated, paralyzed, and ineffectual, but it continued to meet regularly even as the war escalated—and for logistical reasons was headquartered in Saigon, resulting in the incongruous presence of senior Polish diplomats and hundreds of Polish soldiers stationed in a capital of a country run by a strongly anticommunist regime which Poland, like all communist countries, virulently denounced as an American puppet and whose overthrow it militantly supported.  Representing Warsaw during the Marigold affair was a young diplomat (then 35 years old) named Janusz Lewandowski, who was based in Saigon, where he would routinely meet US and even South Vietnamese officials, but periodically shuttled (via neutral Phnom Penh in Cambodia and Vientiane in Laos) to Hanoi, where he became “comrade” Lewandowski and saw North Vietnamese leaders like Premier Pham Van Dong, Defense Minister Vo Nguyen Giap, and revolutionary icon Ho Chi Minh.

Lewandowski, who arrived in Saigon as Poland’s ICC commissioner in April 1966, was thus ideally poised to serve as a secret intermediary between Washington and Hanoi—which of course lacked normal relations or (except for a few rare, mostly formalistic instances) direct diplomatic contacts—and that is the role he assumed during Marigold.  (Interviewed in Warsaw, Lewandowski recalled that shortly before he left Warsaw for Saigon, Polish Foreign Minister Adam Rapacki gave him a secret charter to pursue peace possibilities outside his normal work with the ICC.[8]) His enthusiastic collaborator and co-conspirator was Italy’s ambassador to South Vietnam, Giovanni D’Orlandi, who, in line with the desires of his foreign minister, Amintore Fanfani, and his own passionate interest in the Vietnamese, ardently desired to promote peace.

The Marigold channel first sprang to life in late June 1966, when after a recent trip to Hanoi Lewandowski spoke with D’Orlandi and, the Italian excitedly told Henry Cabot Lodge, delivered a “very specific peace offer” from the North Vietnamese. Hopes in Washington that the channel might yield a breakthrough briefly surged in Washington—LBJ told an associate during a tape-recorded telephone conversation that “yesterday I had the most realistic, the most convincing, the most persuasive peace feeler I’ve had since I’ve been President”[9]—but the contacts fizzled as abruptly, and mysteriously, as they had begun.  The one positive result of this initial flurry of diplomacy involving the three Saigon diplomats was that the North Vietnamese, despite harshly condemning the latest U.S. military actions, did not reveal the Marigold channel, preserving it for potential future use.  After several months of desultory conversation amid further military escalation in the autumn of 1966, the Marigold channel revived for a second act in November and December.

Was Marigold for Real?

The most bitterly contested aspect of the Marigold story has been whether the Poles were actually authorized by Hanoi to set up the direct meeting between U.S. and North Vietnamese ambassadors in Warsaw to confirm Washington’s adherence to the positions which Lodge had relayed to Lewandowski in mid-November in Saigon, and which Lewandowski, in turn, had conveyed to DRV authorities during his subsequent trip to Hanoi.  Of course, the Poles insisted that they were acting with the full authorization of the North Vietnamese government, but once the initiative collapsed, top U.S. officials did their best to seed doubt on this score.  They hinted or even explicitly claimed that the Poles (or even Lewandowski personally) had acted independently, or perhaps at Soviet instigation, hoping to lure the Americans into a bombing halt or other military concessions, and/or to show their negotiating cards and bottom line for a settlement—all to benefit their North Vietnamese comrades’ quest for victory on the battlefield, rather than to promote peace.  After all, the Americans noted correctly, they had had no direct communications from the North Vietnamese, only with the Poles.

Feeling on the defensive after the Washington Post first disclosed the clandestine contacts in early February 1967 with an implication that—in the words of a prominently-quoted, unidentified pro-American diplomat at the United Nations (actually the Danish ambassador)—Washington had “bungled” a genuine chance for peace, U.S. officials used increasingly harsh language to question Warsaw’s motives and sincerity.  In conversations both with foreign diplomats and with reporters, and later in oral history interviews and memoirs, they used words like “fraud” or “sham” or “phony” to describe the Polish initiative.  In May 1967, the New York Times ran on its front page an expose of the affair, written by an Associated Press correspondent and informed by background leaks from Dean Rusk and other senior officials, broadly suggesting that Warsaw had never received Hanoi’s okay to set up a direct US-DRV meeting—an article that caused satisfaction in the State Department and outrage among Polish foreign ministry leaders, who felt that their integrity had been questioned.[10]

These Johnson Administration efforts to plant doubts about Poland’s role had considerable success—in public opinion, in foreign chancelleries, and in the historical record.  The affair’s “real enigma,” believed British foreign office aides, who undertook a secret post-mortem of the affair, was Hanoi’s role: Did Poland have a “clear mandate” from the North Vietnamese or had it not fully “‘sold'” them on a bargain Warsaw was trying to hammer out with the Americans?[11]  After hearing both the U.S. and Polish versions of the affair, London ended up concluding “that the Poles probably never had a sufficiently clear mandate from the North Vietnamese to the point of arranging a [direct U.S.-North Vietnamese] meeting” and were instead “trying an initiative on their own; they may have made a certain amount of progress with it because they had good contacts with the North Vietnamese; but they were never in the position of being able to ‘deliver’ their friends.”[12]

In his 1971 memoir The Vantage Point: Perspectives of the Presidency, 1963-1969, Lyndon B. Johnson wearily consigned the entire affair to the realm of academic investigators, asserting that it comprised far more shadow than substance:  Unlike Rusk, Johnson was too polite to call the Poles “crooks”—as the secretary of state described their actions in Marigold to Averell Harriman[13]—but his disdain shone through just the same. Brushing aside charges that he had squandered chances for peace, he stressed that Washington “never received through the Marigold exchanges anything that could be considered an authoritative statement direct from the North Vietnamese.”  He termed the channel a “dry creek” that was exposed as fraudulent when the DRV ambassador failed to show up for the 6 December 1966 meeting in Warsaw. “The simple truth, I was convinced, was that the North Vietnamese were not ready to talk to us.  The Poles had not only put the cart before the horse, when the time of reckoning came, they had no horse.”[14]  Johnson’s national security adviser, Walt Rostow, declared that the Poles “never had Hanoi sewed up”[15] and his National Security Council staff aides scoffed that Warsaw “just had absolutely no charter from Hanoi to represent them”[16] or was even acting out a disinformation script manufactured in Moscow by the KGB.[17]

Nearly two decades later, Dean Rusk still fumed at what he believed had been a Polish scam to snooker him and the United States into falsely believing that Warsaw had acted with a firm mandate from Hanoi.  Declaring that he had “doubted the authenticity of Marigold” all along, the former secretary of state called Lewandowski’s position “specious,” since he “simply didn’t reflect Hanoi’s views,” and-citing an assertion by a Hungarian defector-called the ICC commissioner “a Polish intelligence agent acting on his own” (a canard the new book conclusively refutes) and the entire Marigold initiative a “sham.”  Brushing off arguments that the bombings near Hanoi had ruined a promising approach, Rusk insisted that “there was nothing to collapse” in the first place.[18]

By contrast, several journalistic, scholarly, and internal government inquiries suggested that Marigold may have been for real. The most detailed classified post-mortem of Marigold during the Johnson Administration was undertaken as part of the Pentagon Papers inquest into Vietnam decision-making commissioned by Defense Secretary Robert McNamara and extensively using State and Pentagon (but not White House) files.  Although acknowledging that Hanoi’s role in the affair remained “veiled in mystery” since the Poles handled all communist transactions, the study concluded that North Vietnam most likely “did in fact agree to a meeting in Warsaw,” and it was “highly improbable” the Poles would have “gone far out on a limb” in its dealings with Americans, Italians, “and, apparently, the Russians,” without Hanoi’s commitment, given the consequences that would ensue from “the revelation that the whole venture was built on air.”[19]

The only prior English-language book on the affair[20], written by two Los Angeles Times reporters in 1968 who relied primarily on background interviews with dozens of officials from various governments but lacked access to classified documents or any informed North Vietnamese perspectives, judged that Marigold may have constituted a genuine opportunity to open peace talks. The Johnson Administration, wrote David Kraslow and Stuart H. Loory in their prize-winning The Secret Search for Peace in Vietnam, which used Marigold as the centerpiece of their investigation, “missed opportunities over the years to secure, if not peace, at least negotiations; if not negotiations, at least talks; and if not talks, at least a propaganda advantage over the enemy that would have improved the nation’s standing in the world community and the President’s credibility at home.”[21]

Perhaps the most thorough scholarly analysis of all the secret diplomatic probing efforts during this period to open Vietnam peace talks, written after the declassification of a substantial portion of the U.S. record, concluded in 1980 that, “With the benefit of hindsight, it appears that the MARIGOLD contact offered the best opportunity for the Johnson Administration to negotiate a settlement of the conflict.”[22]  Taking a somewhat more skeptical stand, George Herring three years later noted the lack of evidence for this argument, observing that it was “equally possible that the North Vietnamese were merely using the Poles to see what they might be able to get out of the United States or were offering vague responses simply to appear not to stand in the way of peace.”[23]

Was Warsaw in fact authorized by Hanoi to arrange the U.S-North Vietnamese meeting to confirm that the “ten points” represented Washington’s policy?  That was the heart of the Marigold mystery, and it can now be resolved.  The documents below describe the process of secret communist consultation in November 1966, hidden to U.S. officials at the time, that produced an authoritative North Vietnamese consent to the direct contact with an American representative in Warsaw and a politically significant promise to adopt a positive attitude towards talks with Washington should it genuinely confirm the stands that Lewandowski reported Lodge as having stated in Saigon.

CONFIDENTTIAL – NSA Refuses to “Confirm or Deny” That it Has a Relationship With Google

https://i0.wp.com/publicintelligence.net/wp-content/uploads/2011/07/google-schmidt.jpg

 

A federal judge has issued an opinion in EPIC v. NSA, and accepted the NSA’s claim that it can “neither confirm nor deny” that it had entered into a relationship with Google following the China hacking incident in January 2010. EPIC had sought documents under the FOIA because such an agreement could reveal that the NSA is developing technical standards that would enable greater surveillance of Internet users. The “Glomar response,” to neither confirm nor deny, is a controversial legal doctrine that allows agencies to conceal the existence of records that might otherwise be subject to public disclosure. EPIC plans to appeal this decision. EPIC is also litigating to obtain the National Security Presidential Directive that sets out the NSA’s cyber security authority. And EPIC is seeking from the NSA information about Internet vulnerability assessments, the Director’s classified views on how the NSA’s practices impact Internet privacy, and the NSA’s “Perfect Citizen” program.

Civil Case No. 10-1533 (RJL) MEMORANDUM OPINION (July 8, 2011) [#9, #11] (uscourts.gov):

On February 4, 2010, following media coverage of a possible partnership between the NSA and Google relating to an alleged cyber attack by hackers in China, EPIC submitted a FOIA request to NSA seeking:

1. All records concerning an agreement or similar basis for collaboration, final or draft, between the NSA and Google regarding cyber security;
2. All records of communication between the NSA and Google concerning Gmail, including but not limited to Google’s decision to fail to routinely encrypt Gmail messages prior to January 13,2010; and
3. All records of communications regarding the NSA’s role in Google’s decision regarding the failure to routinely deploy encryption for cloud-based computing service, such as Google Docs.

Compl. ¶ 12.

NSA denied EPIC’s request. Letter from Pamela N. Phillips, NSA, FOIA/PA Office, Mar. 10,2010 [#9-3]. While it acknowledged working “with a broad range of commercial partners and research associates,” the Agency refused to “confirm [ or] deny” whether it even had a relationship with Google. Id. In support of its response, NSA cited Exemption 3 of FOIA and Section 6 of the National Security Agency Act of 1959 (“NSA Act”), explaining that any response would improperly reveal information about NSA’s functions and activities. Id. Such a response – neither confirming nor denying the existence of requested documents – is known as a Glomar response.

With respect to EPIC’s specific request, the Declaration states that “[t]o confirm or deny the existence of any such records would be to reveal whether the NSA … determined that vulnerabilities or cybersecurity issues pertaining to Google or certain of its commercial technologies could make U.S. government information systems susceptible to exploitation or attack.” Id. ¶ 13. The Declaration further clarifies that even an acknowledgement of a relationship between the NSA and a commercial entity could potentially alert “adversaries to NSA priorities, threat assessment, or countermeasures,” and that, as such, the information relates to the Agency’s core functions and activities under its Information Assurance mission. Id. ¶¶ 13-14.

TOP SECRET – NSA’s Top Ten Technical Security Challenges

Not surprisingly in today’s world, National Security Systems are fundamentally dependent on commercial products and infrastructure, or interconnect with other systems that are. This creates new and significant common ground between the Department of Defense and broader U.S. Government and homeland security needs. More and more, we find that protecting National Security Systems demands teaming with public and private institutions to raise the information assurance level of products and services more broadly. If done correctly, this is a win-win situation that benefits the whole spectrum of Information Technology (IT) users, from warfighters and policymakers, to federal, state, and local governments, to the operators of critical infrastructure and major arteries of commerce. The “Top Ten Technical Security Challenges” reflect major focus areas for the Information Assurance Directorate (IAD) which may also present opportunities for industry.

NSA’s Top Ten Technical Security Challenges:

  1. Mobility, wireless networking, and secure mobile services
  2. Software assurance
  3. Virtualization, Separation, and Trusted Platforms
  4. Cloud computing
  5. Intrusion analysis and adversary tradecraft
  6. Platform Integrity – Compliance assurance – Continuous Monitoring
  7. Real-time situational awareness and CNO sync
  8. End client security
  9. Metrics and measurement for IA posture
  10. Commercial architectures for assistance

DECLASSIFIED – The National Security Agency Releases Over 50,000 Pages of Declassified Documents

The National Security Agency (NSA) announces today that it has declassified and released to the National Archives and Records Administration (NARA) over 50,000 pages of historic records. These records cover a time-frame from before World War I through the 1960s.

This release of documents is the first in a series of releases planned over the next two years as part of NSA/CSS’s commitment to meeting the requirements outlined in the President’s 21 January 2009 Memorandum on Openness and Transparency in Government (Executive Order 13526).

Highlights of this release include:

  • Manuals, charts, and other documents on the development of early computer systems at NSA/CSS, including the HARVEST. This innovative system was developed with IBM and was in use from 1962 to 1976;
  • Early publications on cryptography, including Cryptology: Instruction Book on the Art of Secret Writing from 1809;
  • Documents from World War II, including previously unreleased German documents from the Target Intelligence Committee (TICOM).

The released documents will be maintained by NARA and available for review at the National Archives at College Park, 8601 Adelphi Road, College Park, Maryland. A list of the documents is available on NSA’s Declassification and Transparency Webpage.

Since the records were physically transferred to NARA, NSA is no longer the custodian and does not maintain copies of the records for release under the Freedom of Information Act (FOIA). Information about conducting research at NARA is available on the National Archives Website.

For more information about the National Security Agency, please visit www.nsa.gov.

CONFIDENTIAL – NSA Launches New Crypto Mobile Game App

Outreach efforts designed to attract young adults to support cybersecurity initiatives

Fort Meade, MD. – The National Security Agency (NSA) announced today the launch of “NSA CryptoChallenge,” a mobile cryptograph game app available free of charge from the Apple App Store. The game is the latest digital communications effort designed to educate young adults on career opportunities with NSA and recruit the best and brightest to support NSA’s cybersecurity initiatives.

NSA’s CryptoChallenge game challenges today’s most intelligent college students and young adults to decode hundreds of puzzles, which test pattern recognition skills through a series of cryptographs under various categories, including famous quotes, science, technology, engineering and mathematics (STEM) trivia, pop culture factoids and more. It’s “you against the clock” to see how fast you can crack the code. Players can also choose to share their completion time to see how they stack up against other players across the globe, even sharing scores on Facebook and Twitter.

“This is the technology today’s college students use most to communicate and make important life decisions, so we have to use these tools to successfully recruit the top-tier technical talent we need to become future leaders of the Agency, ” said Kathy Hutson, NSA’s Director of Human Resources.

Serious brainiacs are unlikely to get bored by NSA’s CryptoChallenge, as players will find that the game includes an advanced level and uses multiple algorithms, so puzzles have a different encryption each time they appear. The game is also expected to be released for Android platforms in the near future.

NSA’s CryptoChallenge joins NSA’s other high-tech recruitment tool, the NSA Career Links app, which is available through the Apple App Store and Android Market Place. The app delivers real-time information updates directly to the user’s mobile device.

Confidential – Global Cryptologic Dominance through Responsive Presence and Network Advantage

NSA Statement:

 

We will:

  • Lead an expert workforce for our best efforts to advance and operate world-class cryptologic systems and tools;
  • Improve performance and integration of our core expertise and missions—exploit, protect and defend;
  • Sense, make sense of, and securely share electronically gathered information at the speed of global information networks; and
  • Increase measurably the security of national security systems and other critical operations and information when and where needed.

Our Mission

The National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses both Signals Intelligence (SIGINT) and Information Assurance (IA) products and services, and enables Computer Network Operations (CNO) in order to gain a decision advantage for the Nation and our allies under all circumstances.

GOAL 1: Succeeding in Today’s Operations – Enable wise policymaking, effective national security action, and U.S. freedom of action in cyberspace by exploiting foreign use of electronic signals and systems and securing information systems used by the U.S. and its allies, while protecting privacy and civil liberties.

GOAL 2: Preparing for the Future – Deliver next generation capabilities and solutions that meet the challenges of tomorrow and drive solutions from invention to operation in support of national security and U.S. Government missions.

GOAL 3: Enhancing and Leading an Expert Workforce – Attract, develop and engage an exceptional, diverse workforce prepared to overcome our cryptologic challenges.

GOAL 4: Implementing Best Business Practices – Provide timely data to inform optimal strategic and tactical investment decisions while ensuring organizational accountability for executing those decisions and realizing the associated performance improvement.

GOAL 5: Manifesting Principled Performance – Accomplishing our missions with a commitment to a principled and steadfast approach to performance through compliance, lawfulness, and protection of public trust must be paramount.


Core Values

We will protect national security interests by adhering to the highest standards of behavior:

  • Lawfulness – We will adhere to the spirit and the letter of the Constitution and the laws and regulations of the United States.
  • Honesty – We will be truthful with each other, and honor the public’s need for openness, balanced against national security interests.
  • Integrity – We will behave honorably and apply good judgment as we would if our activities were under intense public scrutiny.
  • Fairness – We will ensure equal opportunity and fairness in Agency policies, programs, and practices.
  • Accountability – We will be accountable for our actions and take responsibility for our decisions, practicing wise stewardship of public resources and placing prudent judgment over expediency.
  • Loyalty – We will be loyal to the nation, the mission, and each other, weighing ideas solely on the merits and ensuring that decisions enjoy vigorous debate while being made, followed by unified implementation.
  • Collaboration – We will cooperate with others in a respectful and open-minded manner, to our mutual success.
  • Innovation – We will seek new ways to accomplish our mission, planning for the future based on what we’ve learned from the past, and thinking ahead to the best of our ability to avoid unintended consequences.
  • Learning – We will acquire and transfer knowledge, provide the resources and training necessary for our people to remain at the forefront of technology, and individually pursue continuous learning.

DOWNLOAD ORIGINAL DOCUMENT HERE

nsacss_strategy

Report – NSA/CSS Unveils New Hawaii Center

https://i0.wp.com/www.nsa.gov/public_info/_images/rainbow.jpg

The National Security Agency/Central Security Service marked today the completion of a new regional operations center, officially named the CAPT Joseph J. Rochefort Building, at a ribbon-cutting ceremony where officials emphasized how the $358 million project will help to further integrate national security efforts.

NSA/CSS has had an operations center in Hawaii for more than 14 years. But even with recent renovations, the original facility, first built during World War II, has limitations stemming from its age, location, and structures. The new building will provide cryptology professionals with the tools necessary to better access and collaboratively interpret data from a broad variety of sources at various classification levels. Moreover, its enhanced capabilities will augment work that will still be carried out in the original center – eliminating physical, virtual, and other barriers to information sharing.

GEN Keith B. Alexander – Director, NSA/Chief, CSS/Commander, U.S. Cyber Command – told approximately 300 federal, state, and local officials at the ceremony that it was more than fitting to dedicate the new building in honor of CAPT Rochefort, who died in 1976. Several members of his family were also on hand. Rochefort was posthumously recognized with the Presidential Medal of Freedom in 1986 and in the NSA/CSS Hall of Honor in 2000 for leading a distinguished team of Pearl Harbor-based code breakers. Their daily intelligence reports were crucial in the 1942 Battle of Midway.

“CAPT Rochefort’s exceptional skills in cryptology and in mathematical analysis made him a unique national asset at an extremely trying time in U.S. history,” GEN Alexander said in an interview after the ceremony. “Likewise, the mission of NSA/CSS Hawaii is to produce foreign signals intelligence for decision-makers as global terrorism now jeopardizes the lives of our citizens, military forces, and international allies. We must continue to develop a global cryptologic enterprise that is agile and resilient in countering ever-changing threats to national security.”

CAPT Kathryn Helms – Commander, NSA/CSS Hawaii – agreed. “The design, infrastructure, and capabilities of this new center will allow us to continue to provide unparalleled cryptologic support,” she said after the event. State officials described the project as one that was good for both the nation and Hawaii.

The original center is adjacent to Schofield U.S. Army Barracks. The new center is a part of the Joint Base Pearl Harbor Hickam Annex. A groundbreaking ceremony was held in 2007.

NSA/CSS is also upgrading its cryptologic centers in Texas and Georgia to make the agency’s global enterprise even more seamless as it confronts increasingly networked adversaries.

From the NSA Document 1: NSCID 9, “Communications Intelligence,” March 10, 1950

National Security Council Intelligence Directives have provided the highest-level policy guidance for intelligence activities since they were first issued in 1947.

This document establishes and defines the responsibilities of the United States Communications Intelligence Board. The Board, according to the directive, is to provide “authoritative coordination of [the] Communications Intelligence activities of the Government and to advise the Director of Central Intelligence in those matters in the field of Communications Intelligence for which he is responsible.”

The particularly sensitive nature of communications intelligence (COMINT) activities was highlighted by paragraph 6, which noted that such activities should be treated “in all respects as being outside the framework of other or general intelligence activities.” Thus, regulations or directives pertaining to other intelligence activities were not applicable to COMINT activities.

DOWNLOAD ORIGINAL DOCUMENT HERE

nsa01

TOP-SECRET – The National Security Agency Declassified

Internet wiretapping mixes “protected” and targeted messages,
Info Age requires rethinking 4th Amendment limits and policies,
National Security Agency told Bush administration

“Transition 2001” report released through FOIA,
Highlights collection of declassified NSA documents
Posted on Web by National Security Archive, GWU

National Security Archive Electronic Briefing Book No. 24

Edited by Jeffrey Richelson

Washington, D.C., March 11, 2005 – The largest U.S. spy agency warned the incoming Bush administration in its “Transition 2001” report that the Information Age required rethinking the policies and authorities that kept the National Security Agency in compliance with the Constitution’s 4th Amendment prohibition on “unreasonable searches and seizures” without warrant and “probable cause,” according to an updated briefing book of declassified NSA documents posted today on the World Wide Web.

Wiretapping the Internet inevitably picks up mail and messages by Americans that would be “protected” under legal interpretations of the NSA’s mandate in effect since the 1970s, according to the documents that were obtained through the Freedom of Information Act by Dr. Jeffrey Richelson, senior fellow of the National Security Archive at George Washington University.

The NSA told the Bush transition team that the “analog world of point-to-point communications carried along discrete, dedicated voice channels” is being replaced by communications that are “mostly digital, carry billions of bits of data, and contain voice, data and multimedia,” and therefore, “senior leadership must understand that today’s and tomorrow’s mission will demand a powerful, permanent presence on a global telecommunications network that will host the ‘protected’ communications of Americans as well as targeted communications of adversaries.”

The documents posted today also include a striking contrast between the largely intact 1998 NSA organizational chart for the Directorate of Operations and the heavily redacted 2001 chart for the Signals Intelligence Directorate (as the operations directorate was renamed), which contains no information beyond the name of its director. “The 2001 organization charts are more informative for what they reveal about the change in NSA’s classification policy than for what they reveal about the actual structure of NSA’s two key directorates,” commented Dr. Richelson. The operations directorate organization chart was provided within three weeks of its being requested in late 1998. In contrast, the request for the Signals Intelligence Directorate organization chart was made on April 21, 2001, and NSA did not provide its substantive response until April 21, 2004 – three years instead of three weeks.

Introduction

The National Security Agency (NSA) is one of the most secret (and secretive) members of the U.S. intelligence community. The predecessor of NSA, the Armed Forces Security Agency (AFSA), was established within the Department of Defense, under the command of the Joint Chiefs of Staff, on May 20, 1949. In theory, the AFSA was to direct the communications intelligence and electronic intelligence activities of the military service signals intelligence units (at the time consisting of the Army Security Agency, Naval Security Group, and Air Force Security Service). In practice, the AFSA had little power, its functions being defined in terms of activities not performed by the service units. (Note 1)

The creation of NSA resulted from a December 10, 1951, memo sent by Walter Bedell Smith to James B. Lay, Executive Secretary of the National Security Council. The memo observed that “control over, and coordination of, the collection and processing of Communications Intelligence had proved ineffective” and recommended a survey of communications intelligence activities. The proposal was approved on December 13, 1951, and the study authorized on December 28, 1951. The report was completed by June 13, 1952. Generally known as the “Brownell Committee Report,” after committee chairman Herbert Brownell, it surveyed the history of U.S. communications intelligence activities and suggested the need for a much greater degree of coordination and direction at the national level. As the change in the security agency’s name indicated, the role of the NSA was to extend beyond the armed forces. (Note 2)

In the last several decades some of the secrecy surrounding NSA has been stripped away by Congressional hearings and investigative research. In the late 1990s NSA had been the subject of criticism for failing to adjust to the post-Cold War technological environment as well as for operating a “global surveillance network” alleged to intrude on the privacy of individuals across the world. The following documents provide insight into the creation, evolution, management and operations of NSA, including the controversial ECHELON program.  Also included are newly released documents (11a – 11g) that focus on the restrictions NSA places on reporting the identities of U.S. persons – including former president Jimmy Carter and first lady Hillary Clinton, and NSA Director Michael Hayden’s unusual public statement (Document 24) before the House Intelligence Committee.

Some of the documents that appear for the first time in this update shed additional light on the history of NSA. They concern the NSA’s participation in the space reconnaissance program (Document 3), NSA’s success in deciphering Soviet communications in the 1960s (Document 4), the efficacy of NSA activities in the late mid-to-late 1960s (Document 5), and Israel’s attack on the USS Liberty during the 1967 war (Document 10). Others provide new insight on NSA’s assessment of key issues in the new century (Document 21, Document 23), on NSA’s attempts to adapt to the changing world and communications environment, (Document 22), on the agency’s regression to old policies with regard to organizational secrecy (Document 26a, Document 26b), and on NSA activities before and after the events of 9/11 (Document 25).

Several of these documents also appear in either of two National Security Archive collections on U.S. intelligence. The U.S. Intelligence Community: Organization, Operations and Management: 1947-1989 (1990) and U.S. Espionage and Intelligence: Organization, Operations, and Management, 1947-1996 (1997) publish together for the first time recently declassified documents pertaining to the organizational structure, operations and management of the U.S. Intelligence Community over the last fifty years, cross-indexed for maximum accessibility. Together, these two sets reproduce on microfiche over 2,000 organizational histories, memoranda, manuals, regulations, directives, reports, and studies, totalling more than 50,000 pages of documents from the Office of the Director of Central Intelligence, the Central Intelligence Agency, National Reconnaissance Office, National Security Agency, Defense Intelligence Agency, military service intelligence organizations, National Security Council, and other official government agencies and organizations.

FROM THE ARCHIVES OF THE NSA: Records Regarding the Assassination of John F. Kennedy Part 1

Under the President John F. Kennedy Assassination Records Collection Act of 1992 (Public Law 102-526), NSA is required to review all records relating to the assassination and provide copies to the Assassination Records Review Board (ARRB). The Board, in turn, provides copies to the National Archives and Records Administration (NARA). NARA has over 170,000 records relating to the J.F.K. assassination of which only a small number originated with NSA. The documents listed are the ones released by NSA to date.

The documents marked with * and ** were released directly to NARA in 1993 by NSA prior to the formation of the ARRB. The documents preceded by ** were released under the FOIA in the late 1970’s/early 1980’s, and the copies of the documents appear as they were released to the FOIA requester(s) at that time. Documents released to NARA by the ARRB in August 1997 are indicated by #, documents released to NARA by the ARRB in January 1998 are indicated by ## and documents released to NARA by the ARRB in October 1998 are indicated by ###. XXXXX has been inserted in a title if a portion of the title was deleted prior to release.

  1. * Letter to General Counsel Lee Richards, President’s Commission on the Assassination of President Kennedy from NSA Director Lt Gen Gordon A. Blake,jfk00023 (download file)
  2. * Memorandum for the Special Assistant to the Secretary and Deputy Secretary of Defense – SUBJECT: Further Requests by Senate Select Committee on Oswald,jfk00024 (download file)
  3. * Memorandum for the Assistant Secretary of Defense (PUBLIC AFFAIRS) – SUBJECT: Freedom of Information Act (Kessler), jfk00025 (download file)
  4. * Note to NSA Director – SUBJECT: Correspondence from House Assassination Committee, jfk00026 (download file)
  5. ** Memorandum for the Record – SUBJECT: Phone Call from House Select Committee on Assassinations, jfk00027 (download file)
  6. * Letter to Robert Blakey, Chief Counsel and Director, Select Committee on Assassinations from NSA’s Chief, Legislative Affairs, jfk00028  (download file)
  7. ** Memorandum for the Record – SUBJECT: 8 November Meeting with Mr. Blakey, jfk00029 (download file)
  8. ** Memorandum for the Record – SUBJECT: House Assassination Committee Inquiry, jfk00030 (download file)
  9. ** Note to Judy Miller from NSA’s Chief, Legislative Affairs, jfk00031 (download file)
  10. ** Draft note to G. Robert Blakey, Chief Counsel and Director, Select Committee on Assassinations from John G. Kester, Special Assistant to the Secretary, jfk00032 (download file)
  11. ** Memorandum for the Record – SUBJECT: Visit to House Select Committee on Assassinations, jfk00033 (download file)
  12. * Freedom of Information Act (FOIA) response to Mark Allen, jfk00034 (download file)
  13. * Letter to Stanley Brand, General Counsel, Office of the Clerk, House of Representatives from NSA’s FOIA Appeals Coordinator, jfk00035   (download file)
  14. * Memorandum for the Record – SUBJECT: Meeting with Congressional Committee on Disclosure of Kennedy Assasasination Records, jfk00036 (download file)
  15. # Plot to Assassinate Castro Reported (Communications Intelligence/COMINT report), jfk00037 (download file)
  16. # Report on Cuba’s Internal Problems With Rebels (Communications Intelligence/COMINT report), jfk00038 (download file)
  17. # NSA SIGINT Command Center – Record of Event for 22 November 1963, jfk00039  (download file)

TOP-SECRET FROM THE ARCHIVES OF THE NSA: THE CUBA CRISIS 1963 UNVEILLED

8_january_dirnsa_requests_results

9_january_status_summary_asa_ops

15_january_meeting_review

february_study_group

21_february_buildup

19_march_dirnsa_proposal

19_june_summary_soviet_ships

TOP-SECRET FROM THE ARCHIVES OF THE NSA: THE CUBA CRISIS 1962 UNVEILLED PART 2

24_july_unusual_number7_august_further_unusual

31_july_possible_reflections

17_august_whiff

23_august_status_soviet_shipping

24_august_reflection

28_august_night

31_august_further_info

7_september_further_info

7_september_increase_flight

11_september_cuban_migs

11_september_reporting

12_september_definition

17_september_nsa_need

19_september_new_radar

21_september_iff_signal

25_september_further_info

2_october_further_info

october_blank_sample

TOP-SECRET FROM THE ARCHIVES OF THE NSA: THE CUBA CRISIS 1962 UNVEILLED PART 1


january_handwritten_summary

11_april_handwritten_summary

13_april_extension

18_april_reference

2_may_dry_cargo

5_june_new_soviet

6_june_first_elint

19_june_cuban_air

22_june_electronic_intercepts

28_june_night_flights

19_july_memo_sec_nav

19_july_dirnsa_request

TOP-SECRET: Cuban Missile Crisis Document Archive – from the NSA Archives unveiled

Download the NSA DOCUMENTS BY CLICKING ON THE FILES HERE:cuban_missile_crisispilot_training_june_19

operators_chatter

pilot_training_feb_1

radar_installed

soviet_arms

soviet_freighters

soviet_merchant_ship

spanish_speaking_pilots

Cuban Missile Crisis

Part of the Cold War
Soviet-R-12-nuclear-ballistic missile.jpg
CIA reference photograph of Soviet R-12 intermediate-range nuclear ballistic missile (NATO designation SS-4) in Red SquareMoscow
Date October 14 – November 20, 1962
Location Cuba
Result
Belligerents
 United States Turkey  Soviet Union Cuba
Commanders and leaders
United States John F. KennedyTurkey Cemal Gürsel Soviet Union Nikita KhrushchevCuba Fidel Castro
Casualties and losses
1 aircraft shot down
1 aircraft damaged
1 pilot killed

The Cuban Missile Crisis (known as the October Crisis in Cuba or Caribbean Crisis (Russ: Kарибский кризис) in the USSR) was a confrontation among the Soviet Union, Cuba and the United States in October 1962, during the Cold War. In August 1962, after some unsuccessful operations by the U.S. to overthrow the Cuban regime (Bay of PigsOperation Mongoose), the Cuban and Soviet governments secretly began to build bases in Cuba for a number ofmedium-range and intermediate-range ballistic nuclear missiles (MRBMs and IRBMs) with the ability to strike most of the continental United States. This action followed the 1958 deployment of Thor IRBMs in the UK (Project Emily) and Jupiter IRBMs to Italy and Turkey in 1961 – more than 100 U.S.-built missiles having the capability to strike Moscow with nuclear warheads. On October 14, 1962, a United States Air Force U-2 plane on a photoreconnaissancemission captured photographic proof of Soviet missile bases under construction in Cuba.

The ensuing crisis ranks with the Berlin Blockade as one of the major confrontations of the Cold War and is generally regarded as the moment in which the Cold War came closest to turning into a nuclear conflict.[1] It also marks the first documented instance of the threat of mutual assured destruction (MAD) being discussed as a determining factor in a major international arms agreement.[2][3]

The United States considered attacking Cuba via air and sea, and settled on a military “quarantine” of Cuba. The U.S. announced that it would not permit offensive weapons to be delivered to Cuba and demanded that the Soviets dismantle the missile bases already under construction or completed in Cuba and remove all offensive weapons. The Kennedy administration held only a slim hope that the Kremlin would agree to their demands, and expected a military confrontation. On the Soviet side, Premier Nikita Khrushchev wrote in a letter to Kennedy that his quarantine of “navigation in international waters and air space” constituted “an act of aggression propelling humankind into the abyss of a world nuclear-missile war.”

The Soviets publicly balked at the U.S. demands, but in secret back-channel communications initiated a proposal to resolve the crisis. The confrontation ended on October 28, 1962, when President John F. Kennedy and United Nations Secretary-General U Thant reached a public and secret agreement with Khrushchev. Publicly, the Soviets would dismantle their offensive weapons in Cuba and return them to the Soviet Union, subject to United Nations verification, in exchange for a U.S. public declaration and agreement never to invade Cuba. Secretly, the U.S. agreed that it would dismantle all U.S.-built Thor and Jupiter IRBMs deployed in Europe and Turkey.

Only two weeks after the agreement, the Soviets had removed the missile systems and their support equipment, loading them onto eight Soviet ships from November 5–9. A month later, on December 5 and 6, the Soviet Il-28 bombers were loaded onto three Soviet ships and shipped back to Russia. The quarantine was formally ended at 6:45 pm EDT on November 20, 1962. Eleven months after the agreement, all American weapons were deactivated (by September 1963). An additional outcome of the negotiations was the creation of the Hotline Agreement and the Moscow–Washington hotline, a direct communications link between Moscow and Washington, D.C.

Earlier actions by the United States

In 1959 US PGM-19 Jupiter intermediate range ballistic missiles targeting the USSR were deployed in Italy and Turkey.

In 1959 Cuban revolution took place and under the new government of Fidel Castro Cuba allied with the USSR. However, for a Latin American country to ally openly with the USSR was regarded by the US government as unacceptable. Such an involvement would also directly defy the Monroe Doctrine; a United States policy which, originally conceived to limit European power’s involvement in the Western Hemisphere, expanded to include all other major powers. The aim of the doctrine is to make sure the United States is the only hegemonic power in the Americas and keeping all others out of its “backyard”.

Bay of Pigs Invasion was launched in April 1961 under President John F. Kennedy by Central Intelligence Agency-trained forces of Cuban exiles but the invasion failed and the United States were embarrassed publicly. Afterward, former President Dwight D. Eisenhower told Kennedy that “the failure of the Bay of Pigs will embolden the Soviets to do something that they would otherwise not do.”[4]:10 The half-hearted invasion left Soviet premier Nikita Khrushchev and his advisers with the impression that Kennedy was indecisive and, as one Soviet adviser wrote, “too young, intellectual, not prepared well for decision making in crisis situations … too intelligent and too weak.”[4] U.S. covert operations continued in 1961 with the unsuccessful Operation Mongoose.[5]

In addition, Khrushchev’s impression of Kennedy’s weakness was confirmed by the President’s soft response during the Berlin Crisis of 1961, particularly the building of the Berlin Wall. Speaking to Soviet officials in the aftermath of the crisis, Khrushchev asserted, “I know for certain that Kennedy doesn’t have a strong background, nor, generally speaking, does he have the courage to stand up to a serious challenge.” He also told his son Sergei that on Cuba, Kennedy “would make a fuss, make more of a fuss, and then agree.”[6]

In January 1962, General Edward Lansdale described plans to overthrow the Cuban Government in a top-secret report (partially declassified 1989), addressed to President Kennedy and officials involved withOperation Mongoose.[5] CIA agents or “pathfinders” from the Special Activities Division were to be infiltrated into Cuba to carry out sabotage and organization, including radio broadcasts.[7] In February 1962, the United States launched an embargo against Cuba,[8] and Lansdale presented a 26-page, top-secret timetable for implementation of the overthrow of the Cuban Government, mandating that guerrilla operations begin in August and September, and in the first two weeks of October: “Open revolt and overthrow of the Communist regime.”[5]

[edit]Balance of power

When Kennedy ran for president in 1960, one of his key election issues was an alleged “missile gap“, with the Soviets leading.

In fact, the United States led the Soviets. In 1961, the Soviets had only four intercontinental ballistic missiles (ICBMs). By October 1962, they may have had a few dozen, although some intelligence estimates were as high as 75.[9]

The United States, on the other hand, had 170 ICBMs and was quickly building more. It also had eight George Washington and Ethan Allen class ballistic missile submarines with the capability to launch 16 Polarismissiles each with a range of 2,200 kilometres (1,400 mi).

Khrushchev increased the perception of a missile gap when he loudly boasted that the USSR was building missiles “like sausages” whose numbers and capabilities actually were nowhere close to his assertion. However, the Soviets did have medium-range ballistic missiles in quantity, about 700 of them.[9]

In his memoirs published in 1970, Khrushchev wrote, “In addition to protecting Cuba, our missiles would have equalized what the West likes to call ‘the balance of massive nuclear missiles around the globe.’” [9]

[edit]Soviet deployment of missiles in Cuba

Soviet Premier Nikita Khrushchev conceived in May 1962 the idea of countering the United States’ growing lead in developing and deploying strategic missiles by placing Soviet intermediate-range nuclear missiles in Cuba. Khrushchev was also reacting in part to the Jupiter intermediate-range ballistic missiles which the United States had installed in Turkey during April 1962.[9]

From the very beginning, the Soviet’s operation entailed elaborate denial and deception, known in the USSR as Maskirovka.[10] All of the planning and preparation for transporting and deploying the missiles were carried out in the utmost secrecy, with only a very few told the exact nature of the mission. Even the troops detailed for the mission were given misdirection, told they were headed for a cold region and outfitted with ski boots, fleece-lined parkas, and other winter equipment.[10] The Soviet code name, Operation Anadyr, was also the name of a river flowing into the Bering Sea, the name of the capital of Chukotsky District, and a bomber base in the far eastern region. All these were meant to conceal the program from both internal and external audiences.[10]

In early 1962, a group of Soviet military and missile construction specialists accompanied an agricultural delegation to Havana. They obtained a meeting with Cuban leader Fidel Castro. The Cuban leadership had a strong expectation that the U.S. would invade Cuba again and they enthusiastically approved the idea of installing nuclear missiles in Cuba. Specialists in missile construction under the guise of “machine operators,” “irrigation specialists,” and “agricultural specialists” arrived in July.[10] Marshal Sergei Biryuzov, chief of the Soviet Rocket Forces, led a survey team that visited Cuba. He told Khrushchev that the missiles would be concealed and camouflaged by the palm trees.[9]

The Cuban leadership was further upset when in September Congress approved U.S. Joint Resolution 230, which authorized the use of military force in Cuba if American interests were threatened.[11] On the same day, the U.S. announced a major military exercise in the Caribbean, PHIBRIGLEX-62, which Cuba denounced as a deliberate provocation and proof that the U.S. planned to invade Cuba.[11][12]

Khrushchev and Castro agreed to place strategic nuclear missiles secretly in Cuba. Like Castro, Khrushchev felt that a U.S. invasion of Cuba was imminent, and that to lose Cuba would do great harm to the communist cause, especially in Latin America. He said he wanted to confront the Americans “with more than words… the logical answer was missiles.”[13]:29 The Soviets maintained their tight secrecy, writing their plans longhand, which were approved by Rodion Malinovsky on July 4 and Khrushchev on July 7.

The Soviet leadership believed, based on their perception of Kennedy’s lack of confidence during the Bay of Pigs Invasion, that he would avoid confrontation and accept the missiles as a fait accompli.[4]:1 On September 11, the Soviet Union publicly warned that a U.S. attack on Cuba or on Soviet ships carrying supplies to the island would mean war.[5] The Soviets continued their Maskirovka program to conceal their actions in Cuba. They repeatedly denied that the weapons being brought into Cuba were offensive in nature. On September 7, Soviet Ambassador Anatoly Dobrynin assured U.S. Ambassador to the United NationsAdlai Stevenson that the USSR was supplying only defensive weapons to Cuba. On September 11, the Soviet News Agency TASS announced that the Soviet Union has no need or intention to introduce offensive nuclear missiles into Cuba. On October 13, Dobrynin was questioned by former Undersecretary of State Chester Bowles about whether the Soviets plan to put offensive weapons in Cuba. He denied any such plans.[11] And again on October 17, Soviet embassy official Georgy Bolshakov brought President Kennedy a “personal message” from Khrushchev reassuring him that “under no circumstances would surface-to-surface missiles be sent to Cuba.[11]:494

As early as August 1962, the United States suspected the Soviets of building missile facilities in Cuba. During that month, its intelligence services gathered information about sightings by ground observers of Russian-built MiG-21 fighters and Il-28 light bombers. U-2 spyplanes found S-75 Dvina (NATO designation SA-2) surface-to-air missile sites at eight different locations. CIA director John A. McCone was suspicious. On August 10, he wrote a memo to President Kennedy in which he guessed that the Soviets were preparing to introduce ballistic missiles into Cuba.[9] On August 31, Senator Kenneth Keating (R-New York), who probably received his information from Cuban exiles in Florida,[9] warned on the Senate floor that the Soviet Union may be constructing a missile base in Cuba.[5]

Air Force General Curtis LeMay presented a pre-invasion bombing plan to Kennedy in September, while spy flights and minor military harassment from U.S. forces at Guantanamo Bay Naval Base were the subject of continual Cuban diplomatic complaints to the U.S. government.[5]

The first consignment of R-12 missiles arrived on the night of September 8, followed by a second on September 16. The R-12 was the first operational intermediate-range ballistic missile, the first missile ever mass-produced, and the first Soviet missile deployed with a thermonuclear warhead. It was a single-stage, road-transportable, surface-launched, storable propellant fueled missile that could deliver a megaton-classnuclear weapon.[14] The Soviets were building nine sites—six for R-12 medium-range missiles (NATO designation SS-4 Sandal) with an effective range of 2,000 kilometres (1,200 mi) and three for R-14 intermediate-range ballistic missiles (NATO designation SS-5 Skean) with a maximum range of 4,500 kilometres (2,800 mi).[15]

[edit]Cuba positioning

On October 7, Cuban President Osvaldo Dorticós spoke at the UN General Assembly: “If … we are attacked, we will defend ourselves. I repeat, we have sufficient means with which to defend ourselves; we have indeed our inevitable weapons, the weapons, which we would have preferred not to acquire, and which we do not wish to employ.”

[edit]Missiles reported

The missiles in Cuba allowed the Soviets to effectively target almost the entire continental United States. The planned arsenal was forty launchers. The Cuban populace readily noticed the arrival and deployment of the missiles and hundreds of reports reached Miami. U.S. intelligence received countless reports, many of dubious quality or even laughable, and most of which could be dismissed as describing defensive missiles. Only five reports bothered the analysts. They described large trucks passing through towns at night carrying very long canvas-covered cylindrical objects that could not make turns through towns without backing up and maneuvering. Defensive missiles could make these turns. These reports could not be satisfactorily dismissed.[16]

U-2 reconnaissance photograph of Soviet nuclear missiles in Cuba. Missile transports and tents for fueling and maintenance are visible. Courtesy of CIA

[edit]U-2 flights find missiles

Despite the increasing evidence of a military build-up on Cuba, no U-2 flights were made over Cuba from September 5 to October 14. The first problem that caused the pause in reconnaissance flights took place on August 30, an Air Force Strategic Air Command U-2 flew over Sakhalin Island in the Far East by mistake. The Soviets lodged a protest and the U.S. apologized. Nine days later, a Taiwanese-operated U-2 [17][18] was lost over western China, probably to a SAM. U.S. officials worried that one of the Cuban or Soviet SAMs in Cuba might shoot down a CIA U-2, initiating another international incident. At the end of September, Navy reconnaissance aircraft photographed the Soviet ship Kasimov with large crates on its deck the size and shape of Il-28 light bombers.[9]

On October 12, the administration decided to transfer the Cuban U-2 reconnaissance missions to the Air Force. In the event another U-2 was shot down, they thought a cover story involving Air Force flights would be easier to explain than CIA flights. There was also some evidence that the Department of Defense and the Air Force lobbied to get responsibility for the Cuban flights.[9] When the reconnaissance missions were re-authorized on October 8, weather kept the planes from flying. The U.S. first obtained photographic evidence of the missiles on October 14 when a U-2 flight piloted by Major Richard Heyser took 928 pictures, capturing images of what turned out to be an SS-4 construction site at San CristóbalPinar del Río Province, in western Cuba.[19]

[edit]President notified

On October 15, the CIA’s National Photographic Intelligence Center reviewed the U-2 photographs and identified objects that they interpreted as medium range ballistic missiles. That evening, the CIA notified the Department of State and at 8:30 pm EDT National Security Adviser McGeorge Bundy elected to wait until morning to tell the President. Secretary of Defense Robert McNamara was briefed at midnight. The next morning, Bundy met with Kennedy and showed him the U-2 photographs and briefed him on the CIA’s analysis of the images.[20] At 6:30 pm EDT Kennedy convened a meeting of the nine members of the National Security Council and five other key advisers[21] in a group he formally named the Executive Committee of the National Security Council (EXCOMM) after the fact on October 22 by National Security Action Memorandum 196.[22]

[edit]Responses considered

The U.S. had no plan in place because U.S. intelligence had been convinced that the Soviets would never install nuclear missiles in Cuba. The EXCOMM quickly discussed several possible courses of action, including:[12][23]

  1. No action.
  2. Diplomacy: Use diplomatic pressure to get the Soviet Union to remove the missiles.
  3. Warning: Send a message to Castro to warn him of the grave danger he, and Cuba were in.
  4. Blockade: Use the U.S. Navy to block any missiles from arriving in Cuba.
  5. Air strike: Use the U.S. Air Force to attack all known missile sites.
  6. Invasion: Full force invasion of Cuba and overthrow of Castro.

The Joint Chiefs of Staff unanimously agreed that a full-scale attack and invasion was the only solution. They believed that the Soviets would not attempt to stop the U.S. from conquering Cuba. Kennedy was skeptical.

They, no more than we, can not let these things go by without doing something. They can’t, after all their statements, permit us to take out their missiles, kill a lot of Russians, and then do nothing. If they don’t take action in Cuba, they certainly will in Berlin.[24]

Kennedy concluded that attacking Cuba by air would signal the Soviets to presume “a clear line” to conquer Berlin. Kennedy also believed that United States’ allies would think of the U.S. as “trigger-happy cowboys” who lost Berlin because they could not peacefully resolve the Cuban situation.[25]:332

President Kennedy and Secretary of Defense McNamara in an EXCOMM meeting.

The EXCOMM then discussed the effect on the strategic balance of power, both political and military. The Joint Chiefs of Staff believed that the missiles would seriously alter the military balance, but Secretary of Defense Robert McNamara disagreed. He was convinced that the missiles would not affect the strategic balance at all. An extra forty, he reasoned, would make little difference to the overall strategic balance. The U.S. already had approximately 5,000 strategic warheads,[26]:261 while the Soviet Union had only 300. He concluded that the Soviets having 340 would not therefore substantially alter the strategic balance. In 1990, he reiterated that “it made nodifference…The military balance wasn’t changed. I didn’t believe it then, and I don’t believe it now.”[27]

The EXCOMM agreed that the missiles would affect the political balance. First, Kennedy had explicitly promised the American people less than a month before the crisis that “if Cuba should possess a capacity to carry out offensive actions against the United States…the United States would act.”[28]:674-681 Second, U.S. credibility amongst their allies, and amongst the American people, would be damaged if they allowed the Soviet Union to appear to redress the strategic balance by placing missiles in Cuba. Kennedy explained after the crisis that “it would have politically changed the balance of power. It would have appeared to, and appearances contribute to reality.”[29]

President Kennedy meets with Soviet Foreign Minister Andrei Gromyko in the Oval Office (October 18, 1962)

On October 18, President Kennedy met with Soviet Minister of Foreign Affairs, Andrei Gromyko, who claimed the weapons were for defensive purposes only. Not wanting to expose what he already knew, and wanting to avoid panicking the American public,[30] the President did not reveal that he was already aware of the missile build-up.[31]

By October 19, frequent U-2 spy flights showed four operational sites. As part of the blockade, the U.S. military was put on high alert to enforce the blockade and to be ready to invade Cuba at a moment’s notice. The 1st Armored Division was sent to Georgia, and five army divisions were alerted for maximal action. The Strategic Air Command (SAC) distributed its shorter-ranged B-47 Stratojet medium bombers to civilian airports and sent aloft its B-52 Stratofortress heavy bombers.[32]

[edit]Operational Plans

Two Operational Plans (OPLAN) were considered. OPLAN 316 envisioned a full invasion of Cuba by Army and Marine units supported by the Navy following Air Force and naval airstrikes. However, Army units in the United States would have had trouble fielding mechanized and logistical assets, while the U.S. Navy could not supply sufficient amphibious shipping to transport even a modest armored contingent from the Army. OPLAN 312, primarily an Air Force and Navy carrier operation, was designed with enough flexibility to do anything from engaging individual missile sites to providing air support for OPLAN 316’s ground forces.[33]

[edit]Quarantine

Play sound
Kennedy addressing the nation on October 22, 1962 about the buildup of arms on Cuba

Problems listening to this file? See media help.

A U.S. Navy P-2H Neptune of VP-18 flying over a Soviet cargo ship with crated Il-28s on deck during the Cuban Crisis.[34]

Kennedy met with members of EXCOMM and other top advisers throughout October 21, considering two remaining options: an air strike primarily against the Cuban missile bases, or a naval blockade of Cuba.[31] A full-scale invasion was not the administration’s first option, but something had to be done. Robert McNamara supported the naval blockade as a strong but limited military action that left the U.S. in control. According to international law a blockade is an act of war, but the Kennedy administration did not think that the USSR would be provoked to attack by a mere blockade.[35]

Admiral AndersonChief of Naval Operations wrote a position paper that helped Kennedy to differentiate between a quarantine of offensive weapons and a blockade of all materials, indicating that a classic blockade was not the original intention. Since it would take place in international waters, Kennedy obtained the approval of the OAS for military action under the hemispheric defense provisions of the Rio Treaty.

Latin American participation in the quarantine now involved two Argentine destroyers which were to report to the U.S. Commander South Atlantic [COMSOLANT] at Trinidad on November 9. An Argentine submarine and a Marine battalion with lift were available if required. In addition, two Venezuelan destroyers and one submarine had reported to COMSOLANT, ready for sea by November 2. The Government of Trinidad and Tobago offered the use of Chaguaramas Naval Base to warships of any OAS nation for the duration of the quarantine. The Dominican Republic had made available one escort ship. Colombia was reported ready to furnish units and had sent military officers to the U.S. to discuss this assistance. The Argentine Air Force informally offered three SA-16 aircraft in addition to forces already committed to the quarantine operation.[36]

This initially was to involve a naval blockade against offensive weapons within the framework of the Organization of American States and the Rio Treaty. Such a blockade might be expanded to cover all types of goods and air transport. The action was to be backed up by surveillance of Cuba. The CNO’s scenario was followed closely in later implementing the quarantine.

On October 19, the EXCOMM formed separate working groups to examine the air strike and blockade options, and by the afternoon most support in the EXCOMM shifted to the blockade option.

President Kennedy signs the Proclamation for Interdiction of the Delivery of Offensive Weapons to Cuba at the Oval Office on October 23, 1962.

At 3:00 pm EDT on October 22, President Kennedy formally established the Executive Committee (EXCOMM) with National Security Action Memorandum (NSAM) 196. At 5:00 pm, he met with Congressional leaders who contentiously opposed a blockade and demanded a stronger response. In Moscow, Ambassador Kohler briefed Chairman Khrushchev on the pending blockade and Kennedy’s speech to the nation. Ambassadors around the world gave advance notice to non-Eastern Bloc leaders. Before the speech, U.S. delegations met with Canadian Prime Minister John Diefenbaker, British Prime Minister Harold Macmillan, West German Chancellor Konrad Adenauer, and French President Charles de Gaulle to brief them on the U.S. intelligence and their proposed response. All were supportive of the U.S. position.[37]

On October 22 at 7:00 pm EDT, President Kennedy delivered a nation-wide televised address on all of the major networks announcing the discovery of the missiles.

It shall be the policy of this nation to regard any nuclear missile launched from Cuba against any nation in the Western Hemisphere as an attack by the Soviet Union on the United States, requiring a full retaliatory response upon the Soviet Union.[38]

Kennedy described the administration’s plan:

To halt this offensive buildup, a strict quarantine on all offensive military equipment under shipment to Cuba is being initiated. All ships of any kind bound for Cuba, from whatever nation or port, will, if found to contain cargoes of offensive weapons, be turned back. This quarantine will be extended, if needed, to other types of cargo and carriers. We are not at this time, however, denying the necessities of life as the Soviets attempted to do in their Berlin blockade of 1948.[38]

During the speech a directive went out to all U.S. forces worldwide placing them on DEFCON 3. The heavy cruiser USS Newport News (CA-148) was designated flagship for the quarantine, with the USS Leary (DD-879) as Newport News’ destroyer escort.[39]

[edit]Crisis deepens

Khrushchev’s October 24, 1962 letter to President Kennedy stating that the Cuban Missile Crisis quarantine “constitute[s] an act of aggression…”

On October 23 at 11:24 am EDT a cable drafted by George Ball to the U.S. Ambassador in Turkey and the U.S. Ambassador toNATO notified them that they were considering making an offer to withdraw what the U.S knew to be nearly obsolete missiles from Italy and Turkey in exchange for the Soviet withdrawal from Cuba. Turkish officials replied that they would “deeply resent” any trade for the U.S. missile’s presence in their country.[40] Two days later, on the morning of October 25, journalist Walter Lippmann proposed the same thing in his syndicated column. Castro reaffirmed Cuba’s right to self-defense and said that all of its weapons were defensive and Cuba will not allow an inspection.[5]

[edit]International response

Kennedy’s speech was not well liked in Britain. The day after the speech, the British press, recalling previous CIA missteps, was unconvinced about the existence of Soviet bases in Cuba, and guessed that Kennedy’s actions might be related to his re-election.[41]

Three days after Kennedy’s speech, the Chinese People’s Daily announced that “650,000,000 Chinese men and women were standing by the Cuban people”.[37]

In Germany, newspapers supported the United States’ response, contrasting it with the weak-kneed American actions in the region during the preceding months. They also expressed some fear that the Soviets might retaliate in Berlin.[41] In France on October 23, the crisis made the front page of all the daily newspapers. The next day, an editorial in Le Monde expressed doubt about the authenticity of the CIA’s photographic evidence. Two days later, after a visit by a high-ranking CIA agent, they accepted the validity of the photographs. Also in France, in the October 29 issue of Le Figaro, Raymond Aron wrote in support of the American response.[41]

[edit]Soviet broadcast

At the time, the crisis continued unabated, and on the evening of October 24, the Soviet news agency Telegrafnoe Agentstvo Sovetskogo Soyuza (TASS) broadcast a telegram from Khrushchev to President Kennedy, in which Khrushchev warned that the United States’ “pirate action” would lead to war. However, this was followed at 9:24 pm by a telegram from Khrushchev to Kennedy which was received at 10:52 pm EDT, in which Khrushchev stated, “If you coolly weigh the situation which has developed, not giving way to passions, you will understand that the Soviet Union cannot fail to reject the arbitrary demands of the United States,” and that the Soviet Union views the blockade as “an act of aggression” and their ships will be instructed to ignore it.

[edit]U.S. alert level raised

Adlai Stevenson shows aerial photos of Cuban missiles to the United Nations. (October 25, 1962)

The United States requested an emergency meeting of the United Nations Security Council on October 25. In a loud, demanding tone, U.S. Ambassador to the UN Adlai Stevenson confronted Soviet Ambassador Valerian Zorin in an emergency meeting of the SC challenging him to admit the existence of the missiles. Ambassador Zorin refused to answer. The next day at 10:00 pm EDT, the U.S. raised the readiness level of SAC forces to DEFCON 2. For the only confirmed time in U.S. history, the B-52bombers were dispersed to various locations and made ready to take off, fully equipped, on 15 minutes notice.[42] One-eighth of SAC’s 1,436 bombers were on airborne alert, some 145 intercontinental ballistic missiles stood on ready alert, while Air Defense Command (ADC) redeployed 161 nuclear-armed interceptors to 16 dispersal fields within nine hours with one-third maintaining 15-minute alert status.[33]

“By October 22, Tactical Air Command (TAC) had 511 fighters plus supporting tankers and reconnaissance aircraft deployed to face Cuba on one-hour alert status. However, TAC and the Military Air Transport Service had problems. The concentration of aircraft in Florida strained command and support echelons; we faced critical undermanning in security, armaments, and communications; the absence of initial authorization for war-reserve stocks of conventional munitions forced TAC to scrounge; and the lack of airlift assets to support a major airborne drop necessitated the call-up of 24 Reserve squadrons.”[33]

On October 25 at 1:45 am EDT, Kennedy responded to Khrushchev’s telegram, stating that the U.S. was forced into action after receiving repeated assurances that no offensive missiles were being placed in Cuba, and that when these assurances proved to be false, the deployment “required the responses I have announced… I hope that your government will take necessary action to permit a restoration of the earlier situation.”

A recently declassified map used by the U.S. Navy’s Atlantic Fleet showing the position of American and Soviet ships at the height of the crisis.

[edit]Quarantine challenged

At 7:15 am EDT on October 25, the USS Essex and USS Gearing attempted to intercept the Bucharest but failed to do so. Fairly certain the tanker did not contain any military material, they allowed it through the blockade. Later that day, at 5:43 pm, the commander of the blockade effort ordered the USS Kennedy to intercept and board the Lebanese freighter Marucla. This took place the next day, and the Marucla was cleared through the blockade after its cargo was checked.[43]

At 5:00 pm EDT on October 25, William Clements announced that the missiles in Cuba were still actively being worked on. This report was later verified by a CIA report that suggested there had been no slow-down at all. In response, Kennedy issued Security Action Memorandum 199, authorizing the loading of nuclear weapons onto aircraft under the command of SACEUR (which had the duty of carrying out first air strikes on the Soviet Union). During the day, the Soviets responded to the quarantine by turning back 14 ships presumably carrying offensive weapons.[42]

[edit]Crisis stalemated

The next morning, October 26, Kennedy informed the EXCOMM that he believed only an invasion would remove the missiles from Cuba. However, he was persuaded to give the matter time and continue with both military and diplomatic pressure. He agreed and ordered the low-level flights over the island to be increased from two per day to once every two hours. He also ordered a crash program to institute a new civil government in Cuba if an invasion went ahead.

At this point, the crisis was ostensibly at a stalemate. The USSR had shown no indication that they would back down and had made several comments to the contrary. The U.S. had no reason to believe otherwise and was in the early stages of preparing for an invasion, along with a nuclear strike on the Soviet Union in case it responded militarily, which was assumed.[44]

[edit]Secret negotiations

At 1:00 pm EDT on October 26, John A. Scali of ABC News had lunch with Aleksandr Fomin at Fomin’s request. Fomin noted, “War seems about to break out,” and asked Scali to use his contacts to talk to his “high-level friends” at the State Department to see if the U.S. would be interested in a diplomatic solution. He suggested that the language of the deal would contain an assurance from the Soviet Union to remove the weapons under UN supervision and that Castro would publicly announce that he would not accept such weapons in the future, in exchange for a public statement by the U.S. that it would never invade Cuba.[45]The U.S. responded by asking the Brazilian government to pass a message to Castro that the U.S. would be “unlikely to invade” if the missiles were removed.[40]

Mr. President, we and you ought not now to pull on the ends of the rope in which you have tied the knot of war, because the more the two of us pull, the tighter that knot will be tied. And a moment may come when that knot will be tied so tight that even he who tied it will not have the strength to untie it, and then it will be necessary to cut that knot, and what that would mean is not for me to explain to you, because you yourself understand perfectly of what terrible forces our countries dispose.

Consequently, if there is no intention to tighten that knot and thereby to doom the world to the catastrophe of thermonuclear war, then let us not only relax the forces pulling on the ends of the rope, let us take measures to untie that knot. We are ready for this.

Letter From Chairman Khrushchev to President Kennedy, October 26, 1962[46]

On October 26 at 6:00 pm EDT, the State Department started receiving a message that appeared to be written personally by Khrushchev. It was Saturday at 2:00 am in Moscow. The long letter took several minutes to arrive, and it took translators additional time to translate and transcribe the long letter.[40]

Robert Kennedy described the letter as “very long and emotional.” Khrushchev reiterated the basic outline that had been stated to John Scali earlier in the day, “I propose: we, for our part, will declare that our ships bound for Cuba are not carrying any armaments. You will declare that the United States will not invade Cuba with its troops and will not support any other forces which might intend to invade Cuba. Then the necessity of the presence of our military specialists in Cuba will disappear.” At 6:45 pm EDT, news of Fomin’s offer to Scali was finally heard and was interpreted as a “set up” for the arrival of Khrushchev’s letter. The letter was then considered official and accurate, although it was later learned that Fomin was almost certainly operating of his own accord without official backing. Additional study of the letter was ordered and continued into the night.[40]

[edit]Crisis continues

Direct aggression against Cuba would mean nuclear war. The Americans speak about such aggression as if they did not know or did not want to accept this fact. I have no doubt they would lose such a war. —Ernesto “Che” Guevara, October 1962[47]

S-75 Dvina with V-750V 1D missile on a launcher. An installation similar to this one shot down Major Anderson’s U-2 over Cuba.

Castro, on the other hand, was convinced that an invasion was soon at hand, and he dictated a letter to Khrushchev that appeared to call for a preemptive strike on the U.S. However, in a 2010 interview, Castro said of his recommendation for the Soviets to bomb America “After I’ve seen what I’ve seen, and knowing what I know now, it wasn’t worth it at all.”[48] Castro also ordered all anti-aircraft weapons in Cuba to fire on any U.S. aircraft,[49] whereas in the past they had been ordered only to fire on groups of two or more. At 6:00 am EDT on October 27, the CIA delivered a memo reporting that three of the four missile sites at San Cristobal and the two sites at Sagua la Grande appeared to be fully operational. They also noted that the Cuban military continued to organize for action, although they were under order not to initiate action unless attacked.[citation needed]

At 9:00 am EDT on October 27, Radio Moscow began broadcasting a message from Khrushchev. Contrary to the letter of the night before, the message offered a new trade, that the missiles on Cuba would be removed in exchange for the removal of the Jupiter missiles from Italy and Turkey. At 10:00 am EDT, the executive committee met again to discuss the situation and came to the conclusion that the change in the message was due to internal debate between Khrushchev and other party officials in the Kremlin.[50]:300 McNamara noted that another tanker, the Grozny, was about 600 miles (970 km) out and should be intercepted. He also noted that they had not made the USSR aware of the quarantine line and suggested relaying this information to them via U Thant at the United Nations.

Lockheed U-2F, the high altitude reconnaissance type shot down over Cuba, being refueled by a Boeing KC-135Q. The aircraft in 1962 was painted overall gray and carried USAF military markings and national insignia.

While the meeting progressed, at 11:03 am EDT a new message began to arrive from Khrushchev. The message stated, in part,

You are disturbed over Cuba. You say that this disturbs you because it is ninety-nine miles by sea from the coast of the United States of America. But… you have placed destructive missile weapons, which you call offensive, in Italy and Turkey, literally next to us… I therefore make this proposal: We are willing to remove from Cuba the means which you regard as offensive… Your representatives will make a declaration to the effect that the United States … will remove its analogous means from Turkey … and after that, persons entrusted by the United Nations Security Council could inspect on the spot the fulfillment of the pledges made.

The executive committee continued to meet through the day.

Throughout the crisis, Turkey had repeatedly stated that it would be upset if the Jupiter missiles were removed. Italy’s Prime Minister Fanfani, who was also Foreign Minister ad interim, offered to allow withdrawal of the missiles deployed in Apulia as a bargaining chip. He gave the message to one of his most trusted friends, Ettore Bernabei, the general manager of RAI-TV, to convey to Arthur M. Schlesinger, Jr.. Bernabei was in New York to attend an international conference on satellite TV broadcasting. Unknown to the Soviets, the U.S regarded the Jupiter missiles as obsolete and already supplanted by the Polaris nuclear ballistic submarine missiles.[9]

The engine of the Lockheed U-2 shot down over Cuba on display at Museum of the Revolution in Havana.

On the morning of October 27, a U-2F (the third CIA U-2A, modified for air-to-air refueling) piloted by USAF Major Rudolf Anderson,[51] departed its forward operating location at McCoy AFB, Florida, and at approximately 12:00 pm EDT, the aircraft was struck by a S-75 Dvina (NATOdesignation SA-2 GuidelineSAM missile launched from Cuba. The aircraft was shot down and Anderson was killed. The stress in negotiations between the USSR and the U.S. intensified, and only much later was it learned that the decision to fire the missile was made locally by an undetermined Soviet commander acting on his own authority. Later that day, at about 3:41 pm EDT, several U.S. Navy RF-8A Crusader aircraft on low-level photoreconnaissance missions were fired upon, and one was hit by a 37 mm shell but managed to return to base.

At 4:00 pm EDT, Kennedy recalled members of EXCOMM to the White House and ordered that a message immediately be sent to U Thant asking the Soviets to “suspend” work on the missiles while negotiations were carried out. During this meeting, Maxwell Taylor delivered the news that the U-2 had been shot down. Kennedy had earlier claimed he would order an attack on such sites if fired upon, but he decided to not act unless another attack was made. In an interview 40 years later, McNamara said:

We had to send a U-2 over to gain reconnaissance information on whether the Soviet missiles were becoming operational. We believed that if the U-2 was shot down that—the Cubans didn’t have capabilities to shoot it down, the Soviets did—we believed if it was shot down, it would be shot down by a Soviet surface-to-air-missile unit, and that it would represent a decision by the Soviets to escalate the conflict. And therefore, before we sent the U-2 out, we agreed that if it was shot down we wouldn’t meet, we’d simply attack. It was shot down on Friday […]. Fortunately, we changed our mind, we thought “Well, it might have been an accident, we won’t attack.” Later we learned that Khrushchev had reasoned just as we did: we send over the U-2, if it was shot down, he reasoned we would believe it was an intentional escalation. And therefore, he issued orders to Pliyev, the Soviet commander in Cuba, to instruct all of his batteries not to shoot down the U-2.[note 1][52]

[edit]Drafting the response

Emissaries sent by both Kennedy and Nikita Khrushchev agreed to meet at the Yenching Palace Chinese restaurant in the Cleveland Park neighborhood of Washington D.C. on the evening of October 27.[53]Kennedy suggested that they take Khrushchev’s offer to trade away the missiles. Unknown to most members of the EXCOMM, Robert Kennedy had been meeting with the Soviet Ambassador in Washington to discover whether these intentions were genuine. The EXCOMM was generally against the proposal because it would undermine NATO‘s authority, and the Turkish government had repeatedly stated it was against any such trade.

As the meeting progressed, a new plan emerged and Kennedy was slowly persuaded. The new plan called for the President to ignore the latest message and instead to return to Khrushchev’s earlier one. Kennedy was initially hesitant, feeling that Khrushchev would no longer accept the deal because a new one had been offered, but Llewellyn Thompson argued that he might accept it anyway. White House Special Counsel and Adviser Ted Sorensen and Robert Kennedy left the meeting and returned 45 minutes later with a draft letter to this effect. The President made several changes, had it typed, and sent it.

After the EXCOMM meeting, a smaller meeting continued in the Oval Office. The group argued that the letter should be underscored with an oral message to Ambassador Dobrynin stating that if the missiles were not withdrawn, military action would be used to remove them. Dean Rusk added one proviso, that no part of the language of the deal would mention Turkey, but there would be an understanding that the missiles would be removed “voluntarily” in the immediate aftermath. The President agreed, and the message was sent.

An EXCOMM meeting on October 29, 1962 held in the White House Cabinet Room during the Cuban Missile Crisis. President Kennedy is to the left of the American flag; on his left is Secretary of Defense Robert McNamara and his right is Secretary of StateDean Rusk.

At Juan Brito’s request, Fomin and Scali met again. Scali asked why the two letters from Khrushchev were so different, and Fomin claimed it was because of “poor communications”. Scali replied that the claim was not credible and shouted that he thought it was a “stinking double cross”. He went on to claim that an invasion was only hours away, at which point Fomin stated that a response to the U.S. message was expected from Khrushchev shortly, and he urged Scali to tell the State Department that no treachery was intended. Scali said that he did not think anyone would believe him, but he agreed to deliver the message. The two went their separate ways, and Scali immediately typed out a memo for the EXCOMM.[citation needed]

Within the U.S. establishment, it was well understood that ignoring the second offer and returning to the first put Khrushchev in a terrible position. Military preparations continued, and all active duty Air Force personnel were recalled to their bases for possible action. Robert Kennedy later recalled the mood, “We had not abandoned all hope, but what hope there was now rested with Khrushchev’s revising his course within the next few hours. It was a hope, not an expectation. The expectation was military confrontation by Tuesday, and possibly tomorrow…”[citation needed]

At 8:05 pm EDT, the letter drafted earlier in the day was delivered. The message read, “As I read your letter, the key elements of your proposals—which seem generally acceptable as I understand them—are as follows: 1) You would agree to remove these weapons systems from Cuba under appropriate United Nations observation and supervision; and undertake, with suitable safe-guards, to halt the further introduction of such weapon systems into Cuba. 2) We, on our part, would agree—upon the establishment of adequate arrangements through the United Nations, to ensure the carrying out and continuation of these commitments (a) to remove promptly the quarantine measures now in effect and (b) to give assurances against the invasion of Cuba.” The letter was also released directly to the press to ensure it could not be “delayed.”[citation needed]

With the letter delivered, a deal was on the table. However, as Robert Kennedy noted, there was little expectation it would be accepted. At 9:00 pm EDT, the EXCOMM met again to review the actions for the following day. Plans were drawn up for air strikes on the missile sites as well as other economic targets, notably petroleum storage. McNamara stated that they had to “have two things ready: a government for Cuba, because we’re going to need one; and secondly, plans for how to respond to the Soviet Union in Europe, because sure as hell they’re going to do something there”.[citation needed]

At 12:12 am EDT, on October 27, the U.S. informed its NATO allies that “the situation is growing shorter… the United States may find it necessary within a very short time in its interest and that of its fellow nations in the Western Hemisphere to take whatever military action may be necessary.” To add to the concern, at 6 am the CIA reported that all missiles in Cuba were ready for action.

Later on that same day, what the White House later called “Black Saturday,” the U.S. Navy dropped a series of “signaling depth charges” (practice depth charges the size of hand grenades[54]) on a Soviet submarine (B-59) at the quarantine line, unaware that it was armed with a nuclear-tipped torpedo with orders that allowed it to be used if the submarine was “holed” (a hole in the hull from depth charges or surface fire).[55] On the same day, a U.S. U-2 spy plane made an accidental, unauthorized ninety-minute overflight of the Soviet Union’s far eastern coast.[56] The Soviets scrambled MiG fighters from Wrangel Island and in response the American sent aloft F-102 fighters armed with nuclear air-to-air missiles over the Bering Sea.[57]

[edit]Crisis ends

After much deliberation between the Soviet Union and Kennedy’s cabinet, Kennedy secretly agreed to remove all missiles set in southern Italy and in Turkey, the latter on the border of the Soviet Union, in exchange for Khrushchev removing all missiles in Cuba.

At 9:00 am EDT, on October 28, a new message from Khrushchev was broadcast on Radio Moscow. Khrushchev stated that, “the Soviet government, in addition to previously issued instructions on the cessation of further work at the building sites for the weapons, has issued a new order on the dismantling of the weapons which you describe as ‘offensive’ and their crating and return to the Soviet Union.”

Kennedy immediately responded, issuing a statement calling the letter “an important and constructive contribution to peace”. He continued this with a formal letter: “I consider my letter to you of October twenty-seventh and your reply of today as firm undertakings on the part of both our governments which should be promptly carried out… The U.S. will make a statement in the framework of the Security Council in reference to Cuba as follows: it will declare that the United States of America will respect the inviolability of Cuban borders, its sovereignty, that it take the pledge not to interfere in internal affairs, not to intrude themselves and not to permit our territory to be used as a bridgehead for the invasion of Cuba, and will restrain those who would plan to carry an aggression against Cuba, either from U.S. territory or from the territory of other countries neighboring to Cuba.”[58]:103

The U.S continued the quarantine, and in the following days, aerial reconnaissance proved that the Soviets were making progress in removing the missile systems. The 42 missiles and their support equipment were loaded onto eight Soviet ships. The ships left Cuba from November 5–9. The U.S. made a final visual check as each of the ships passed the quarantine line. Further diplomatic efforts were required to remove the Soviet IL-28 bombers, and they were loaded on three Soviet ships on December 5 and 6. Concurrent with the Soviet commitment on the IL-28’s, the U.S. Government announced the end of the quarantine effective at 6:45 pm EDT on November 20, 1962.[32]

In his negotiations with the Soviet Ambassador Anatoly Dobrynin, U.S. Attorney General Robert Kennedy informally proposed that the Jupiter missiles in Turkey would be removed “within a short time after this crisis was over.”[59]:222 The last U.S. missiles were disassembled by April 24, 1963, and were flown out of Turkey soon after.[60]

The practical effect of this Kennedy-Khrushchev Pact was that it effectively strengthened Castro’s position in Cuba, guaranteeing that the U.S. would not invade Cuba. It is possible that Khrushchev only placed the missiles in Cuba to get Kennedy to remove the missiles from Italy and Turkey and that the Soviets had no intention of resorting to nuclear war if they were out-gunned by the Americans.[61] Because the withdrawal of the Jupiter missiles from NATO bases in Southern Italy and Turkey was not made public at the time, Khrushchev appeared to have lost the conflict and become weakened. The perception was that Kennedy had won the contest between the superpowers and Khrushchev had been humiliated. This is not entirely the case as both Kennedy and Khrushchev took every step to avoid full conflict despite the pressures of their governments. Khrushchev held power for another two years.[58]:102-105

[edit]Aftermath

The Jupiter intermediate-range ballistic missile. The U.S. secretly agreed to withdraw these missiles from Italy and Turkey.

Ibrahim-2 Jupiter Missile in Turkey.

The compromise was a particularly sharp embarrassment for Khrushchev and the Soviet Union because the withdrawal of U.S. missiles from Italy and Turkey was not made public—it was a secret deal between Kennedy and Khrushchev. The Soviets were seen as retreating from circumstances that they had started—though if played well, it could have looked just the opposite. Khrushchev’s fall from power two years later can be partially linked to Politburo embarrassment at both Khrushchev’s eventual concessions to the U.S. and his ineptitude in precipitating the crisis in the first place.

Cuba perceived it as a partial betrayal by the Soviets, given that decisions on how to resolve the crisis had been made exclusively by Kennedy and Khrushchev. Castro was especially upset that certain issues of interest to Cuba, such as the status of Guantanamo, were not addressed. This caused Cuban-Soviet relations to deteriorate for years to come.[62]:278 On the other hand, Cuba continued to be protected from invasion.

One U.S. military commander was not happy with the result either. General LeMay told the President that it was “the greatest defeat in our history” and that the U.S. should have immediately invaded Cuba.

The Cuban Missile Crisis spurred the Hotline Agreement, which created the Moscow–Washington hotline, a direct communications link between Moscow and Washington, D.C. The purpose was to have a way that the leaders of the two Cold War countries could communicate directly to solve such a crisis. The world-wide U.S. Forces DEFCON 3 status was returned to DEFCON 4 on November 20, 1962. U-2 pilot Major Anderson’s body was returned to the United States and he was buried with full military honors in South Carolina. He was the first recipient of the newly-created Air Force Cross, which was awarded posthumously.

Although Anderson was the only combat fatality during the crisis, eleven crew members of three reconnaissance Boeing RB-47 Stratojets of the 55th Strategic Reconnaissance Wing were also killed in crashes during the period between September 27 and November 11, 1962.[63]

Critics including Seymour Melman[64] and Seymour Hersh[65] suggested that the Cuban Missile Crisis encouraged U.S. use of military means, such as in the Vietnam War. This Soviet-American confrontation was synchronous with the Sino-Indian War, dating from the U.S.’s military quarantine of Cuba; historians[who?] speculate that the Chinese attack against India for disputed land was meant to coincide with the Cuban Missile Crisis.[66]

[edit]Post-crisis history

A U.S. Navy HSS-1 Seabat helicopter hovers over Soviet submarine B-59, forced to the surface by U.S. Naval forces in the Caribbean near Cuba (October 28–29, 1962)

Arthur M. Schlesinger, Jr., a historian and adviser to John F. Kennedy, told National Public Radio in an interview on October 16, 2002 that Castro did not want the missiles, but that Khrushchev had pressured Castro to accept them. Castro was not completely happy with the idea but the Cuban National Directorate of the Revolution accepted them to protect Cuba against U.S. attack, and to aid its ally, the Soviet Union.[62]:272 Schlesinger believed that when the missiles were withdrawn, Castro was angrier with Khrushchev than he was with Kennedy because Khrushchev had not consulted Castro before deciding to remove them.[note 2]

In early 1992, it was confirmed that Soviet forces in Cuba had, by the time the crisis broke, received tactical nuclear warheads for their artillery rockets and Il-28 bombers.[67] Castro stated that he would have recommended their use if the U.S. invaded despite knowing Cuba would be destroyed.[67]

Arguably the most dangerous moment in the crisis was only recognized during the Cuban Missile Crisis Havana conference in October 2002. Attended by many of the veterans of the crisis, they all learned that on October 26, 1962 the USS Beale had tracked and dropped signaling depth charges (the size of hand grenades) on the B-59, a Soviet Project 641 (NATO designation Foxtrot) submarine which, unknown to the U.S., was armed with a 15 kiloton nuclear torpedo. Running out of air, the Soviet submarine was surrounded by American warships and desperately needed to surface. An argument broke out among three officers on the B-59, including submarine captain Valentin Savitsky, political officer Ivan Semonovich Maslennikov, and Deputy brigade commander Captain 2nd rank (US Navy Commander rank equivalent) Vasili Arkhipov. An exhausted Savitsky became furious and ordered that the nuclear torpedo on board be made combat ready. Accounts differ about whether Commander Arkhipov convinced Savitsky not to make the attack, or whether Savitsky himself finally concluded that the only reasonable choice left open to him was to come to the surface.[68]:303, 317 During the conference Robert McNamara stated that nuclear war had come much closer than people had thought. Thomas Blanton, director of the National Security Archive, said, “A guy called Vasili Arkhipov saved the world.”

The crisis was a substantial focus of the 2003 documentary, The Fog of War, which won the Academy Award for Best Documentary Feature.

TOP-SECRET: CUBAN CRISIS 1961- ORIGINAL DOCUMENTS FROM THE ARCHIVES OF THE NATIONAL SECURIYT AGENCY (NSA)

operators_chatter

pilot_training_feb_1

pilot_training_june_19

radar_installed

soviet_arms

soviet_freighters

soviet_merchant_shipspanish_speaking_pilots