— The Erimtan Angle —

Tara Long explains: ‘It’s no secret that the NSA has had a watchful eye on not only foreign nations but also American citizens. How did the NSA come to be the all-powerful, omniscient Big Brother we think of today? (16 July 2014)’.[1]

The Managing Editor of JURIST and Pittsburgher Sean Gallagher explains in some more detail that in “the early 20th century, the US military faced a new challenge with the increased use of radio technology for military operations. Cryptology, the study of codes and how to crack them, emerged as an important tool for military intelligence. It was for this reason that during World War I, the US Army created the Cipher Bureau within the Military Intelligence Division to assist with radio intelligence. The bureau was disbanded in 1929, and remained dormant until World War II. It was re-established as the core of the Signal Security Agency, and played a key role in intelligence gathering during the war. The US military and intelligence agencies transformed in the aftermath of World War II. In 1947, the National Security Act passed and created the Central Intelligence Agency and the National Security Council to combat new threats to American security. In 1949, the Armed Forces Security Agency was created within the Department of Defense for the purposes of organizing electronic communication throughout civilian agencies. After a few short years of operation, however, the effectiveness of AFSA came under scrutiny in the Brownell Report. In order to combat the ineffectiveness of the AFSA, President Harry Truman issued a memo in 1952 that transformed the AFSA into the National Security Agency. According to Truman’s memo, the NSA was ‘to provide an effective, unified organization and control of the communications intelligence activities of the United States conducted against foreign governments’. The Cold War era presented new threats and new opportunities for the NSA to increase intelligence gathering operations. The NSA and its predecessor managed to decipher Soviet codes for a brief period in the late 1940’s, until a mole notified the Soviets about the NSA activity. Soviet codes would not be successfully deciphered again until the 1979 Soviet invasion of Afghanistan. China became another target of NSA activity in 1964, when the Agency deciphered communications regarding the impending detonation of China’s first nuclear weapon. The NSA was also active in the Middle East. The USS Liberty was accidentally attacked by Israelis in a joint air and sea assault on June 8, 1967 while on a mission to gather intelligence. A similar incident occurred in January 1968, when North Korean forces captured the USS Pueblo during an intel gathering mission off the North Korean coast. Despite drawbacks, by 1970 the NSA had achieved success with deciphering foreign communications in numerous theatres. The Agency remained relatively unknown to the American public. But during the course of a 1975 US Senate investigation, many Americans learned that not only did the NSA exist, but that it monitored Americans. The Director of the NSA testified that the Agency had monitored the phone calls of anti-war Americans to discover connections to suspected foreign criminals. Because the NSA had some success, the Foreign Intelligence Surveillance Act was passed in 1978. The Act authorized the creation of secret FISA courts to issue warrants for wiretaps when requested. The mission of the NSA changed dramatically in the aftermath of the September 11, 2001 terrorist attacks. President George W. Bush ordered the use of warrantless wiretaps on American citizens in contact with foreign persons for information about potential terrorist attacks. President Barack Obama has allowed the NSA to continue gathering information about Americans under the Bush-era policies”.[2]

 

[1] https://twitter.com/TaraLongest

[2] Sean Gallagher, “A Short History of the NSA” JURIST (22 July 2013). http://jurist.org/feature/2013/07/nsa-overview-2.php.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: