Thirty Years Of NSA 'Oversight' And The Only Change Is Better Snooping Technology

from the downhill-with-the-wind-at-its-back dept

Thirty years down the road from a Senate select committee investigation into the NSA and what's changed for the intelligence agency? Based on this 1983 New York Times article (via Bruce Sterling), it appears the only difference is computing power and storage capacity. The NSA began as a virtually uncontrolled entity in 1952 and the next thirty years only saw it expand its grasp.

The power of the N.S.A., whose annual budget and staff are believed to exceed those of either the F.B.I. or the C.I.A., is enhanced by its unique legal status within the Federal Government. Unlike the Agriculture Department, the Postal Service or even the C.I.A., the N.S.A. has no specific Congressional law defining its responsibilities and obligations. Instead, the agency, based at Fort George Meade, about 20 miles northeast of Washington, has operated under a series of Presidential directives. Because of Congress's failure to draft a law for the agency, because of the tremendous secrecy surrounding the N.S.A.'s work and because of the highly technical and thus thwarting character of its equipment, the N.S.A. is free to define and pursue its own goals.
Is it any wonder the agency is prone to abuse? It may claim other entities have oversight, but at this point, it's had 60 years of setting its own agenda and tactics. Concerns that the NSA's power and reach could be misused were voiced by Frank Church (of the Church Committee), whose investigation resulted in the only "oversight" the agency has had to date -- the establishment of the FISA court in 1978.
During the course of the investigation, its chairman, Senator Frank Church, repeatedly emphasized his belief that the N.S.A.'s intelligence-gathering activities were essential to the nation's security. He also stressed that the equipment used to watch the Russians could just as easily ''monitor the private communications of Americans.'' If such forces were ever turned against the country's communications system, Senator Church said, ''no American would have any privacy left. ... There would be no place to hide.''
This was a concern in 1983, well before the internet served as the main communication route for millions of Americans and long before storage capacity was measured in zettabytes. And the NSA did turn it on American citizens. Repeatedly. The article states the NSA surveilled 75,000 Americans between 1952-1974. These files were shared with the CIA, another agency supposedly charged with targeting non-Americans only. Together, the CIA and NSA developed files on over 300,000 Americans during this time frame. This program, along with a telegram-reading program that ran from 1945-1975, was illegal. Both shut down in May of 1975, when the Senate committee expressed an interest in them.

Thirty years ago, there were also concerns about the NSA's "oversight," as the agency's techniques and programs were pretty much incomprehensible to its Congressional oversight.
Several months after the hearing, the Senate intelligence committee issued a report that expressed great concern about both the N.S.A.'s activities and the failure of Congress and the Federal courts to comprehend them. ''The watch-list activities and the sophisticated capabilities that they highlight present some of the most crucial privacy issues now facing this nation,'' the committee warned. ''Space-age technology has outpaced the law. The secrecy that has surrounded much of the N.S.A.'s activities and the lack of Congressional oversight have prevented, in the past, bringing statutes in line with the N.S.A.'s capabilities. Neither the courts nor Congress have dealt with the interception of communications using the N.S.A.'s highly sensitive and complex technology.''
Over the past three decades, the NSA has had an active hand in the development of technology that aids its collection activities.
The already expansive appetite of American intelligence analysts was further sharpened by technical advances that were occurring, not entirely by chance, at the same time. The technology in question was the digital computer, the wondrous tool diligently developed by American scientists working for such companies as I.B.M., the RCA Corporation and Sperry Rand, and covertly underwritten in a major way by the N.S.A.
The article also details how the NSA first got its hooks into American telecom companies. After learning the Soviet Union was conducting "wholesale eavesdropping" on communications in four major cities, the Carter administration called for the installation of 100 "voice scramblers" for government use. The switching point for the voice encryption was handled by the NSA, something the administration didn't bother telling other agencies utilizing the service. In addition, the NSA was sent out to protect American communication from Soviet surveillance, laying the groundwork for its communication interception programs.
Telephone links in the areas where Soviet spies were known to be listening were rerouted via underground cable. To further reduce the leakage of the new category of information, the President directed the N.S.A. to approach large corporations and other institutions, collect information about their communications networks and assist them in safeguarding their material. The Carter directive sanctioning the N.S.A.'s involvement in the planning, organization and development of private communications systems not handling classified secrets was only one of several ways in which the power of the agency grew.
The agency has also guided developments in cryptography for more than three decades, beginning with a 1978 gag order issued to George Davida to prevent him from revealing details on his invention, a computer security device utilizing a stream cipher. A rare public speech addressing communication security given by NSA director Bobby Ray Inman in 1979 saw him calling for an "open dialogue" between intelligence agencies and the academic world. This bizarrely resulted in many institutes of higher learning applying voluntary "prior restraint" to cryptographic research.
The result of this dialogue so far has been the recommendation by a special committee of the American Council on Education, a prestigious organization of over 1,400 colleges and universities, that all researchers engaged in cryptographic research submit their work to the N.S.A. before publication.
In addition to this prior restraint on cryptographic inventions and research, the NSA further insinuated itself into the development process.
Today, the National Science Foundation routinely allows the N.S.A. to review any request for the funding of cryptographic research. The N.S.A. also has begun providing financial support for related unclassified civilian research.
We're at the point now where the NSA has 30+ years of "intercepting" cryptographic research, which gives it a head start when it comes to decrypting collected communication. Of course, the encryption method doesn't really matter if the NSA has already inserted itself into the communication stream at the pre-encryption point. And if it hasn't, it will just hold the data until it can crack it.

The NSA has been in operation for over 60 years and its history shows it's always been prone to abuse, thanks to a minimum of oversight and a nearly impenetrable cloak of secrecy. Only now, six decades later, is it finally being forced to deal with the repercussions of its actions. But what's happening now is far too little way too late, thanks to a very compliant administration and two fawning intelligence committees.

The only thing the last thirty years has brought the NSA is better, faster tools and techniques. And the efforts to rein in the agency haven't kept pace.

Filed Under: history, nsa, nsa surveillance


Reader Comments

Subscribe: RSS

View by: Time | Thread


  1. icon
    JTReyn (profile), 27 Aug 2013 @ 10:34am

    Watch the hit video: "Spies Gone Wild"

    Coming soon, the uncensored video, "Spies Gone Wild," with NSA spies dressed in black and hi-fiving each other as they crowd around a monitor going gaga watching Lady Gaga on her bedroom laptop webcam. Or Kate Upton. Or Sarah Palin. Or... does it matter? It may even be you.

    I'm sorry but The Patriot Act justification doesn't wash anymore: "We're hunting terrorists. We don't need no stinking 4th Amendment."

    As other commenters have said, after 30 years it's not going to stop. We've got to take matters into our own hands. Use Tails & TOR for browsing, Textcrypt for text messages and Cellcrypt for mobile phone calls. Then, take everything off of Dropbox, Instagram, iCloud, etc, and stash it all in a Cloudlocker (www.cloudlocker.it) which works just the same but stays in the house where they still need a warrant to get inside.

    What a shame that it's come to this. We need to protect us from the people supposed to protect us.

Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here



Subscribe to the Techdirt Daily newsletter




Comment Options:

  • Use markdown. Use plain text.
  • Remember name/email/url (set a cookie)

Follow Techdirt
Techdirt Gear
Shop Now: Copying Is Not Theft
Advertisement
Report this ad  |  Hide Techdirt ads
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Chat
Advertisement
Report this ad  |  Hide Techdirt ads
Recent Stories
Advertisement
Report this ad  |  Hide Techdirt ads

Close

Email This

This feature is only available to registered users. Register or sign in to use it.