11.4.1. The focus here is on U.S. agencies, for various reasons. Most Cypherpunks are currently Americans, the NSA has a dominant role in surveillance technology, and the U.S. is the focus of most current crypto debate. (Britain has the GCHQ, Canada has its own SIGINT group, the Dutch have...., France has DGSE and so forth, and...) 11.4.2. Technically, not all are equal. And some may quibble with my calling the FBI an "intelligence agency." All have surveillance and monitoring functions, albeit of different flavors. 11.4.3. "Is the NSA involved in domestic surveillance?" + Not completely confirmed, but much evidence that the answer is "yes": - previous domestic surveillance (Operation Shamrock, telegraphs, ITT, collusion with FBI, etc.) - reciprocal arrangements with GCHQ (U.K.) - arrangements on Indian reservations for microwave intercepts - the general technology allows it (SIGINT, phone lines) - the National Security Act of 1947, and later clarifications and Executive Orders, makes it likely - And the push for Digital Telephony. 11.4.4. "What will be the effects of widespread crypto use on intelligence collection?" - Read Bamford for some stuff on how the NSA intercepts overseas communications, how they sold deliberately- crippled crypto machines to Third World nations, and how much they fear the spread of strong, essentially unbreakable crypto. "The Puzzle Palace" was published in 1982...things have only gotten worse in this regard since. - Statements from senior intelligence officials reflect this concern. - Digital dead drops will change the whole espionage game. Information markets, data havens, untraceable e-mail...all of these things will have a profound effect on national security issues. - I expect folks like Tom Clancy to be writing novels about how U.S. national security interests are being threatened by "unbreakable crypto." (I like some Clancy novels, but there's no denying he is a right-winger who's openly critical of social trends, and that he believes druggies should be killed, the government is necessary to ward off evil, and ordinary citizens ought not to have tools the government can't overcome.) 11.4.5. "What will the effects of crypto on conventional espionage?" - Massive effects; watch out for this to be cited as a reason to ban or restrict crypto--however pointless that may be. + Effects: - information markets, a la BlackNet - digital dead drops -- why use Coke cans near oak trees when you can put messages into files and post them worldwide, with untraceably? (but, importantly, with a digital signature!) - transparency of borders - arms trade, arms deals - virus, weaponry 11.4.6. NSA budget - $27 billion over 6 years, give or take - may actually increase, despite end of Cold War - new threats, smaller states, spread of nukes, concerns about trade, money-laundering, etc. - first rule of bureaucracies: they always get bigger + NSA-Cray Computer supercomputer + press release, 1994-08-17, gives some clues about the capabilities sought by the surveillance state - "The Cray-3/SSS will be a hybrid system capable of vector parallel processing, scalable parallel processing and a combination of both. The system will consist of a dual processor 256 million word Cray-3 and a 512,000 processor 128 million byte single instruction multiple data (SIMD) array......SIMD arrays of one million processors are expected to be possible using the current version of the Processor-In-Memory (PIM) chips developed by the Supercomputing Research Center once the development project is completed. The PIM chip contains 64 single-bit processors and 128 kilobyte bits of memory. Cray Computer will package PIM chips utilizing its advanced multiple chip module packaging technology. The chips are manufactured by National Semiconductor Corporation." - This is probably the supercomputer described in the Gunter Ahrendt report 11.4.7. FINCEN, IRS, and Other Economic Surveillance - Financial Crimes Enforcement Network, a consortium or task force made up of DEA, DOJ, FBI, CIA, DIA, NSA, IRS, etc. - set up in Arlington as a group to monitor the flows of money and information - eventually these groups will see the need to hack into computer systems used by various groups that are under investigation - Cf. "Wired," either November or December, 1993 11.4.8. "Why are so many computer service, telecom, and credit agency companies located near U.S. intelligence agency sites?" + For example, the cluster of telecom and credit reporting agencies (TRW Credit, Transunion, etc.) in and around the McLean/Langley area of Northern Virginia (including Herndon, Vienna, Tyson's Corner, Chantilly, etc.) - same thing for, as I recall, various computer network providers, such as UUCP (or whatever), America Online, etc. - The least conspiratorial view: because all are located near Washington, D.C., for various regulatory, lobbying, etc. reasons + The most conspiratorial view: to ensure that the intelligence agencies have easy access to communications, direct landlines, etc. - credit reporting agencies need to clear identities that are fabricated for the intelligence agencies, WitSec, etc. (the three major credit agencies have to be complicit in these creations, as the "ghosts" show up immediately when past records are cross-correlated) - As Paul Ferguson, Cypherpunk and manager at US Sprint, puts it: "We're located in Herndon, Virginia, right across the street from Dulles Airport and a hop, skip & jump down the street from the new NRO office. ,-)" [P.F., 1994-08-18] 11.4.9. Task Force 157, ONI, Kissinger, Castle Bank, Nugan Hand Bank, CIA 11.4.10. NRO building controversy - and an agency I hadn't seen listed until August, 1994: "The Central Imagery Office" 11.4.11. SIGINT listening posts + possible monkeywrenching? - probably too hard, even for an EMP bomb (non-nuclear, that is) 11.4.12. "What steps is the NSA taking?" - besides death threats against Jim Bidzos, that is - Clipper a plan to drive competitors out (pricing, export laws, harassment) - cooperation with other intelligence agencies, other nations - New World Order - death threats were likely just a case of bullying...but could conceivably be part of a campaign of terror--to shut up critics or at least cause them to hesitate
Next Page: 11.5 Surveillance in Other Countries
Previous Page: 11.3 Surveillance and Privacy
By Tim May, see README
HTML by Jonathan Rochkind