By David Burnham
A Federal Court of Appeals recently
ruled that the largest and most secretive intelligence agency of the
United States, the National Security Agency, may lawfully intercept the
overseas communications of Americans even if it has no reason to believe
they are engaged in illegal activities. The ruling, which also allows
summaries of these conversations to be sent to the Federal Bureau of
Investigation, significantly broadens the already generous authority of
the N.S.A. to keep track of American citizens.
The decision by
the United States Court of Appeals for the Sixth Circuit involves the
Government surveillance of Abdeen Jabara, a Michigan-born lawyer who for
many years has represented Arab-American citizens and alien residents,
and reverses a 1979 ruling that the N.S.A.'s acquisition of Jabara's
overseas messages violated his Fourth Amendment right to be free of
''unreasonable searches and seizures.'' Even while refusing the
plaintiff's request for reconsideration, the Court curiously
acknowledged the far-reaching nature of the case, recognizing that the
N.S.A.'s interception of overseas telecommunications and their
dissemination to ''other Federal agencies has great potential for
abuse.'' The Court, however, held that the problem was ''a policy matter
that lies in the domain of the executive or legislative branch of our
Government.''
The N.S.A. is much more than a massive
computerized funnel that collects, channels and sorts information for
the President and such organizations as the Central Intelligence Agency
and F.B.I. The National Security Agency, an arm of the Defense
Department but under the direct command of the Director of Central
Intelligence, is an electronic spying operation, and its leverage is
based on a massive bank of what are believed to be the largest and most
advanced computers now available to any bureaucracy in the world:
computers to break codes, direct spy satellites, intercept electronic
messages, recog- nize target words in spoken communications and store,
organize and index all of it.
Over the years, this virtually
unknown Federal agency has repeatedly sought to enlarge its power
without consulting the civilian officials who theoretically direct the
Government, while it also has sought to influence the operation and
development of all civilian communications networks. Indeed, under Vice
Adm. Bobby Ray Inman, N.S.A. director from 1977 to 1981, the agency
received an enlarged Presidential mandate to involve itself in
communications issues, and successfully persuaded private corporations
and institutions to cooperate with it.
Yet over the three
decades since the N.S.A. was created by a classified executive order
signed by President Truman in 1952, neither the Congress nor any
President has publicly shown much interest in grappling with the
far-reaching legal conflicts surrounding the operation of this
extraordinarily powerful and clandestine agency. A Senate committee on
intelligence, warning that the N.S.A.'s capabilities impinged on crucial
issues of privacy, once urged that Congress or the courts develop a
legislative or judicial framework to control the agency's activities. In
a nation whose Constitution demands an open Government operating
according to precise rules of fairness, the N.S.A. remains an unexamined
entity. With the increasing computerization of society, the conflicts
it presents become more important. The power of the N.S.A., whose annual
budget and staff are believed to exceed those of either the F.B.I. or
the C.I.A., is enhanced by its unique legal status within the Federal
Government. Unlike the Agriculture Department, the Postal Service or
even the C.I.A., the N.S.A. has no specific Congressional law defining
its responsibilities and obligations. Instead, the agency, based at Fort
George Meade, about 20 miles northeast of Washington, has operated
under a series of Presidential directives. Because of Congress's failure
to draft a law for the agency, because of the tremendous secrecy
surrounding the N.S.A.'s work and because of the highly technical and
thus thwarting character of its equipment, the N.S.A. is free to define
and pursue its own goals.
Despite the impenetrable secrecy
surrounding the agency - no public briefings or access to its premises
is allowed - its mission was first discussed openly in the 1975 hearings
of the Senate Select Committee to Study Government Operations with
Respect to Intelligence Activities. Various aspects of the agency's
responsibilities also have been touched upon in a handful of depositions
filed by the agency in Federal courts, several recent executive orders
and a few aging documents found in the towering stacks of the National
Archives.
According to these sources, the N.S.A. has two broad
goals, one offensive, one defensive. First, the agency aggressively
monitors international communications links searching for ''foreign
intelligence,'' intercepting electronic messages as well as signals
generated by radar or missile launchings. Second, the agency prevents
foreign penetration of communications links carrying information bearing
on ''national security.''
According to an unpublished analysis
by the House Government Operations Committee, the N.S.A. may have
employed 120,000 people in 1976 when armed-services personnel were
included in the official count. (According to a letter from the Joint
Chiefs of Staff, overseas listening posts numbered 2,000.) In
comparison, the F.B.I. had one employee for every six working for the
N.S.A. The House report also estimated that the agency's annual
expenditures were as high as $15 billion.
The Senate select
committee's study of the N.S.A., one of the most extensive independent
examinations ever made of the agency, was initiated in the wake of
Watergate and the disclosure of other abuses by Federal intelligence
agencies. During the course of the investigation, its chairman, Senator
Frank Church, repeatedly emphasized his belief that the N.S.A.'s
intelligence-gathering activities were essential to the nation's
security. He also stressed that the equipment used to watch the Russians
could just as easily ''monitor the private communications of
Americans.'' If such forces were ever turned against the country's
communications system, Senator Church said, ''no American would have any
privacy left. ... There would be no place to hide.'' Over the years,
N.S.A. surveillance activities have indeed included Americans who were
merely stating their political beliefs. The agency first became involved
in this more questionable kind of surveillance in the early 1960's when
either Attorney General Robert F. Kennedy or the F.B.I. asked it to
monitor all telephone calls between the United States and Cuba. This
list of international calls was significantly enlarged during the
Johnson Administrtion as Federal authorities became concerned that
foreign governments might try to influence American civil-rights
leaders. The N.S.A. gradually developed a ''watch list'' of Americans
that included those speaking out against the Vietnam War.
According to the subsequent investigation by the Senate Intelligence
Committee, a total of 1,200 Americans were targeted by the N.S.A.
between 1967 and 1973 because of their political activities. The
subjects - chosen by the F.B.I., the Secret Service, the C.I.A. and the
Defense Intelligence Agency -included members of radical groups,
celebrities and ordinary citizens. When it appeared that Congress might
learn about the eavesdropping, the surveillance halted.
The
Senate intelligence committee also discovered a second illegal
surveillance program, under which the N.S.A., and its military
predecessors, examined most of the telegrams entering or leaving the
country between 1945 and 1975. The program was abruptly halted in May
1975, a date coinciding with the Senate committee's first expression of
interest in it.
The records obtained by the committee indicate
that from the project's earliest stages, both Government officials and
corporate executives understood that the surveillance flatly violated a
Federal law against intercepting or divulging telegrams. Certainly, they
were aware that such interception violated the Fourth Amendment,
guaranteeing against unreasonable searches and seizures, which also
holds that a court warrant can be issued only when there is probable
cause to believe a crime has been committed.
Using the
information thus gathered, the N.S.A. between 1952 and 1974 developed
files on approximately 75,000 Americans, some of whom undoubtedly
threatened the nation's security. However, the agency also developed
files on civil-rights and antiwar activists, Congressmen and other
citizens who lawfully questioned Government policies. For at least 13 of
the 22 years the agency was building these files, the C.I.A. had access
to them and used the data in its Operation Chaos, another computerized
and illegal tracking system set up during the Vietnam War. At its peak,
the Chaos files had references to more than 300,000 Americans.
Several months after the hearing, the Senate intelligence committee
issued a report that expressed great concern about both the N.S.A.'s
activities and the failure of Congress and the Federal courts to
comprehend them. ''The watch-list activities and the sophisticated
capabilities that they highlight present some of the most crucial
privacy issues now facing this nation,'' the committee warned.
''Space-age technology has outpaced the law. The secrecy that has
surrounded much of the N.S.A.'s activities and the lack of Congressional
oversight have prevented, in the past, bringing statutes in line with
the N.S.A.'s capabilities. Neither the courts nor Congress have dealt
with the interception of communications using the N.S.A.'s highly
sensitive and complex technology.'' The committee recommended that
Congress approve specific legislation spelling out the precise
obligations and limitations of the agency. With the end of World War II
and the start of the cold war, the value of effective intelligence
remained high. In 1952, a special Presidential committee recommended the
establishment of the N.S.A., replacing the four separate surveillance
agencies within the Defense Department, concluding that a unified effort
was essential because electronic surveillance of international
communications ''ranks as our most important single source of
intelligence today.''
The logic of the cold war also dictated
that intelligence include not only secret blueprints for the latest
weapon or infiltrating the enemy's ranks with spies, but also early
signs that a blight had hit China's rice crop, indications that a new
oil field had been located in a remote corner of Russia and analysis of
radio traffic at an important Soviet-bloc airport.
The already
expansive appetite of American intelligence analysts was further
sharpened by technical advances that were occurring, not entirely by
chance, at the same time. The technology in question was the digital
computer, the wondrous tool diligently developed by American scientists
working for such companies as I.B.M., the RCA Corporation and Sperry
Rand, and covertly underwritten in a major way by the N.S.A. The
computers' ability to acquire, organize, store and retrieve huge amounts
of data was an essential factor leading to the agency's enlarged
definition of intelligence.
The importance of the broadest
possible intelligence gathering became even more critical when computer
know-how began to spread beyond a technological elite based primarily in
the United States to scientists in many nations. Simply stated, the
spread of advanced computer skills and the related mathematical concepts
meant that governments could reduce the chances that their top-secret
messages would be intercepted and decoded, while at the same time
increasing their ability to collect all kinds of economic and technical
intelligence.
As a result of these changes, according to
several United States officials, the intelligence apparatus of the
Soviet Union began eavesdropping on millions of telephone conversations
between Washington and New York and several other major cities in the
early 1970's. Because of the unusual sensitivity of the subjects,
however, the Federal Government did not exactly trumpet the news of the
Soviet surveillance.
In 1977, about three years after this
surveillance became known to the United States Government, the Carter
Administration formally announced that the Russians were conducting
wholesale eavesdropping from at least four locations in three different
cities, New York, Washington and San Francisco. The targets of real
concern were the Government, defense contractors and other large
companies whose activities would contribute to Soviet collection of
economic intelligence. Henceforth, classified information relating to
national defense and foreign relations would be transmitted only by
secure means. The Administration proposed the immediate purchase of an
additional 100 ''voice scramblers'' for what is called the Executive
Secure Voice Network. The central switching point for the network was
determined to be the N.S.A., a fact that was unacknowledged by the
Administration.
President Carter's decision immediately
broadened the category of information requiring Government scrutiny and
significantly extended the authority of the N.S.A. Yet no unclassified
document defines what kinds of information would be useful to an
adversary. A timetable of the trains running between Washington and New
York could be useful to an enemy spy. Newspaper articles could serve as
source material for intelligence operatives all over the world.
Certainly, prececent had been established in 1971, when the N.S.A. was
the lead agency in the Nixon Administration's attempt to stop newspapers
from printing the Pentagon Papers, the bureaucratic history of the war
in Vietnam. After blocking publication for 15 days, the Supreme Court
ruled that the Government had failed to show why the material should not
be published and that ''without compelling reasons'' prior restraint
would be an unreasonable infringement of the freedom of the press.
Until that time, the Federal Government sought to control and protect
only those military and diplomatic secrets that had been declared
confidential, secret or top secret under a long-established and formally
prescribed classification procedure. But now, President Carter had
decided to create a huge new category of material worthy of Government
protection: information that ''would be useful to an adversary.''
Telephone links in the areas where Soviet spies were known to be
listening were rerouted via underground cable. To further reduce the
leakage of the new category of information, the President directed the
N.S.A. to approach large corporations and other institutions, collect
information about their communications networks and assist them in
safeguarding their material. The Carter directive sanctioning the
N.S.A.'s involvement in the planning, organization and development of
private communications systems not handling classified secrets was only
one of several ways in which the power of the agency grew. Within the
last few years, for example, the N.S.A. has forcefully moved to control
the development and dissemination of inventive approaches intended to
help the individual citizen, corporation or political organization
maintain privacy.
On April 21, 1978, George I. Davida, then
professor of electrical engineering and computer science at the
University of Wisconsin at Milwaukee, received an order to keep secret
all details of his invention, a computer security device. The N.S.A.
informed Davida that under a little-known provision of the patent law a
violation of the order could subject him to up to two years in jail and a
10,000 fine.
After the agency's orders were publicized by
several newspapers and magazines, the N.S.A. decided to pull in its
horns. Inman, the N.S.A.'s director, told a House committee that the two
orders exemplified ''not a faulty law but inadequate Government
attention to its application.'' He characterized the agency's handling
of the voice-scrambling equipment as a ''well-meaning attempt to hold
the line that had clearly already been passed by.''
A few years
before, the director of the National Science Foundation, Richard C.
Atkinson, and Inman had begun privately discussing whether the role of
the spy agency in supervising cryptographic research should be expanded.
The precise outcome of the talks remains murky, but the N.S.A.
apparently won the debate. Today, the National Science Foundation
routinely allows the N.S.A. to review any request for the funding of
cryptographic research. The N.S.A. also has begun providing financial
support for related unclassified civilian research. The first recipients
of such support were two Stanford professors of electrical engineering,
John T. Gill 3d, and Martin E. Hellman, a code expert who for many
years had been sharply critical of the N.S.A.
''Five years ago,
I was very much on the opposite side of the fence from N.S.A.,'' said
Hellman. ''I wouldn't say I have been co-opted. As a result of them
being more friendly and coming part way, I felt I should be more
friendly. I guess I am now the first guinea pig.''
Hellman is
not sure why the agency was interested in funding nonclassified
research, and he acknowledges potential problems. ''One of the fears is
that they are trying to buy people. If they support you, then they own
you, and you really are going against them if they ask you not to
publish something and you do.''
There are, of course, many ways
to influence men. In early 1979, Inman spoke to the Armed Forces
Communications and Electronics Association, the first public speech ever
given by a top N.S.A. official. Speaking in the guarded language of his
profession, Inman noted that the agency's mission could ''no longer
remain entirely in the shadows.'' One reason for this change, he
explained, was that the protection of communications was no longer of
interest just to the Government; it also had become a major concern to
private institutions. Because of this new interest, tensions, which he
did not define, had developed between ''the national-security interests
of the Government and the telecommunications-security interests of both
the public and private sector.'' The time had come, he said, to begin a
dialogue between the N.S.A. and the academic and industrial worlds.
The result of this dialogue so far has been the recommendation by a
special committee of the American Council on Education, a prestigious
organization of over 1,400 colleges and universities, that all
researchers engaged in cryptographic research submit their work to the
N.S.A. before publication. Only one of the nine members of the special
committee opposed this ''voluntary'' system of prior restraint, George
Davida. Davida, who believes such a system Page 67 is unconstitutional,
said, ''The increase in the computerization of society has led to the
construction of a large number of data bases that are 'electronic
windows' into the most intimate details of people's lives. What is even
more disturbing is that it is usually impossible to know who is looking
in. Thus, these data bases are like one-way mirrors.''
''Encryption,'' he continued, referring to the coding of material placed
in computers, ''can serve as a curtain. Therefore, the need for
civilian (or nongovernmental) effort in cryptography is a strong one.''
Davida noted that the data bases used right now for statistical
purposes, employment records, credit-card operations and many other
operations essential to American life are all subject to possible N.S.A.
scrutiny. ''The only effective method for maintaining separation of
such data involves encryption,'' he declared.
Shortly after
Inman persuaded the academic community to accept his system of prior
restraint for cryptology, he was named Deputy Director of Central
Intelligence by President Reagan, who replaced him with Air Force Lieut.
Gen. Lincoln D. Faurer.(Later, Inman left the C.I.A. to become the
director of the Microelectronics and Computer Technology Corporation, a
private consortium of 10 high-technology companies.) Inman soon warned
that many researchers would face mandatory Government censorship of
their papers unless a system of review was established to limit the
access of the Soviet Union to the benefits of American technology.
Speaking before the annual meeting of the American As-sociation for the
Advancement of Science last year, Inman said that other areas where
restrictions were required because publication of certain ''technical
information could affect the national security in a harmful way.
Examples include computer hardware and software, other electronic gear
and techniques, lasers, crop projections and manufacturing procedures.''
Many scientists immediately objected. ''If you want to win the
Indianapolis 500, you build the fastest car; you don't throw nails on
the track,'' commented Peter J. Denning, head of Purdue University's
Department of Computer Sciences and former president of the Association
for Computing Machinery.
The American Association for the
Advancement of Science passed a brief resolution on the day Inman spoke:
''Whereas freedom and national security are best preserved by adherence
to the principles of openness that are a fundamental tenet of both
American society and the scientific process, be it resolved that the
A.A.A.S. opposes governmental restrictions on the dissemination,
exchange or availability of unclassified knowledge.''
A few
months before Inman's speech, Dr. Edward Teller, the physicist credited
with being a major proponent of and contributor to the construction of
the hydrogen bomb, wrote an essay attacking Government attempts to
restrict scientists, saying, ''Secrecy is not compatible with science,
but it is even less compatible with the democratic procedure.''
No laws define the limits of the N.S.A.'s power. No Congressional
committee subjects the agency's budget to a systematic, informed and
skeptical review. With unknown billions of Federal dollars, the agency
purchases the most sophisticated communications and computer equipment
in the world. But truly to comprehend the growing reach of this
formidable organization, it is necessary to recall once again how the
computers that power the N.S.A. are also gradually changing lives of
Americans - the way they bank, obtain benefits from the Government and
communicate with family and friends. Every day, in almost every area of
culture and commerce, systems and procedures are being adopted by
private companies and organizations as well as by the nation's security
leaders that make it easier for the N.S.A. to dominate American society
should it ever decide such action is necessary.
20131216
The Silent Power of the N.S.A.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment