Thirty Years Of NSA 'Oversight' And The Only Change Is Better Snooping Technology

from the downhill-with-the-wind-at-its-back dept

Thirty years down the road from a Senate select committee investigation into the NSA and what's changed for the intelligence agency? Based on this 1983 New York Times article (via Bruce Sterling), it appears the only difference is computing power and storage capacity. The NSA began as a virtually uncontrolled entity in 1952 and the next thirty years only saw it expand its grasp.

The power of the N.S.A., whose annual budget and staff are believed to exceed those of either the F.B.I. or the C.I.A., is enhanced by its unique legal status within the Federal Government. Unlike the Agriculture Department, the Postal Service or even the C.I.A., the N.S.A. has no specific Congressional law defining its responsibilities and obligations. Instead, the agency, based at Fort George Meade, about 20 miles northeast of Washington, has operated under a series of Presidential directives. Because of Congress's failure to draft a law for the agency, because of the tremendous secrecy surrounding the N.S.A.'s work and because of the highly technical and thus thwarting character of its equipment, the N.S.A. is free to define and pursue its own goals.
Is it any wonder the agency is prone to abuse? It may claim other entities have oversight, but at this point, it's had 60 years of setting its own agenda and tactics. Concerns that the NSA's power and reach could be misused were voiced by Frank Church (of the Church Committee), whose investigation resulted in the only "oversight" the agency has had to date -- the establishment of the FISA court in 1978.
During the course of the investigation, its chairman, Senator Frank Church, repeatedly emphasized his belief that the N.S.A.'s intelligence-gathering activities were essential to the nation's security. He also stressed that the equipment used to watch the Russians could just as easily ''monitor the private communications of Americans.'' If such forces were ever turned against the country's communications system, Senator Church said, ''no American would have any privacy left. ... There would be no place to hide.''
This was a concern in 1983, well before the internet served as the main communication route for millions of Americans and long before storage capacity was measured in zettabytes. And the NSA did turn it on American citizens. Repeatedly. The article states the NSA surveilled 75,000 Americans between 1952-1974. These files were shared with the CIA, another agency supposedly charged with targeting non-Americans only. Together, the CIA and NSA developed files on over 300,000 Americans during this time frame. This program, along with a telegram-reading program that ran from 1945-1975, was illegal. Both shut down in May of 1975, when the Senate committee expressed an interest in them.

Thirty years ago, there were also concerns about the NSA's "oversight," as the agency's techniques and programs were pretty much incomprehensible to its Congressional oversight.
Several months after the hearing, the Senate intelligence committee issued a report that expressed great concern about both the N.S.A.'s activities and the failure of Congress and the Federal courts to comprehend them. ''The watch-list activities and the sophisticated capabilities that they highlight present some of the most crucial privacy issues now facing this nation,'' the committee warned. ''Space-age technology has outpaced the law. The secrecy that has surrounded much of the N.S.A.'s activities and the lack of Congressional oversight have prevented, in the past, bringing statutes in line with the N.S.A.'s capabilities. Neither the courts nor Congress have dealt with the interception of communications using the N.S.A.'s highly sensitive and complex technology.''
Over the past three decades, the NSA has had an active hand in the development of technology that aids its collection activities.
The already expansive appetite of American intelligence analysts was further sharpened by technical advances that were occurring, not entirely by chance, at the same time. The technology in question was the digital computer, the wondrous tool diligently developed by American scientists working for such companies as I.B.M., the RCA Corporation and Sperry Rand, and covertly underwritten in a major way by the N.S.A.
The article also details how the NSA first got its hooks into American telecom companies. After learning the Soviet Union was conducting "wholesale eavesdropping" on communications in four major cities, the Carter administration called for the installation of 100 "voice scramblers" for government use. The switching point for the voice encryption was handled by the NSA, something the administration didn't bother telling other agencies utilizing the service. In addition, the NSA was sent out to protect American communication from Soviet surveillance, laying the groundwork for its communication interception programs.
Telephone links in the areas where Soviet spies were known to be listening were rerouted via underground cable. To further reduce the leakage of the new category of information, the President directed the N.S.A. to approach large corporations and other institutions, collect information about their communications networks and assist them in safeguarding their material. The Carter directive sanctioning the N.S.A.'s involvement in the planning, organization and development of private communications systems not handling classified secrets was only one of several ways in which the power of the agency grew.
The agency has also guided developments in cryptography for more than three decades, beginning with a 1978 gag order issued to George Davida to prevent him from revealing details on his invention, a computer security device utilizing a stream cipher. A rare public speech addressing communication security given by NSA director Bobby Ray Inman in 1979 saw him calling for an "open dialogue" between intelligence agencies and the academic world. This bizarrely resulted in many institutes of higher learning applying voluntary "prior restraint" to cryptographic research.
The result of this dialogue so far has been the recommendation by a special committee of the American Council on Education, a prestigious organization of over 1,400 colleges and universities, that all researchers engaged in cryptographic research submit their work to the N.S.A. before publication.
In addition to this prior restraint on cryptographic inventions and research, the NSA further insinuated itself into the development process.
Today, the National Science Foundation routinely allows the N.S.A. to review any request for the funding of cryptographic research. The N.S.A. also has begun providing financial support for related unclassified civilian research.
We're at the point now where the NSA has 30+ years of "intercepting" cryptographic research, which gives it a head start when it comes to decrypting collected communication. Of course, the encryption method doesn't really matter if the NSA has already inserted itself into the communication stream at the pre-encryption point. And if it hasn't, it will just hold the data until it can crack it.

The NSA has been in operation for over 60 years and its history shows it's always been prone to abuse, thanks to a minimum of oversight and a nearly impenetrable cloak of secrecy. Only now, six decades later, is it finally being forced to deal with the repercussions of its actions. But what's happening now is far too little way too late, thanks to a very compliant administration and two fawning intelligence committees.

The only thing the last thirty years has brought the NSA is better, faster tools and techniques. And the efforts to rein in the agency haven't kept pace.

Filed Under: history, nsa, nsa surveillance

Reader Comments

Subscribe: RSS

View by: Time | Thread

  1. identicon
    theOtherDude, 27 Aug 2013 @ 8:43am

    You cant handle the truth!

    "And the efforts to rein in the agency haven't kept pace."

    What effort?

Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here

Subscribe to the Techdirt Daily newsletter

Comment Options:

  • Use markdown. Use plain text.
  • Remember name/email/url (set a cookie)

Follow Techdirt
Techdirt Gear
Shop Now: Copying Is Not Theft
Report this ad  |  Hide Techdirt ads
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Chat
Report this ad  |  Hide Techdirt ads
Recent Stories
Report this ad  |  Hide Techdirt ads


Email This

This feature is only available to registered users. Register or sign in to use it.