101:, "the collection program 'just ran on' ever since its beginning in World War II 'without a great deal of attention from anyone'..." Three major cable companies provided copies of all international telegrams passing through New York, Washington, and San Francisco. In the 1950s, "New Shamrock" tapped the links of 60–70 foreign embassies.
97:, asking if a Lieutenant Earle F. Cook might be assigned to the company..." Cook photographed all international commercial cablegrams. "The clandestine arrangement—almost certainly illegal—set a precedent..." Official wartime censorship began in Dec. 1940, when all cables were "turned over to the government for inspection." According to
108:, the post-World War II continuation of Project SHAMROCK brought hesitation from the telegraph companies, who were concerned about the legality of their actions and that employees would reveal the companies' government cooperation to the public. Their fears were assuaged after a promise from Attorney General
123:
terminated it, on his own authority rather than that of other intelligence agencies. According to
Budiansky, a 1977 US Department of Justice review concluded wiretap laws were violated, but "If the intelligence agencies possessed too much discretionary authority with too little accountability, that
112:
that the U.S. government would not prosecute the companies for their participation in
Project SHAMROCK, and after Congress approved a bill section that made it illegal for "unauthorized" individuals to reveal information related to code-breaking, which was a part of SHAMROCK's operations.
142:(FISA) which limited the powers of the NSA and put in place a process of warrants and judicial review. Another internal safeguard, was United States Signals Intelligence Directive 18 (USSID 18), an internal NSA and intelligence community set of procedures, originally issued in 1980.
529:
62:. NSA did the operational interception, and, if there was information that would be of interest to other intelligence agencies, the material was passed to them. Intercepted messages were disseminated to the
523:
128:
988:
453:
316:"Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans: National Security Agency Surveillance Affecting Americans"
993:
545:
275:
315:
235:
998:
898:
216:
135:
to conclude that
Project SHAMROCK was "probably the largest government interception program affecting Americans ever undertaken."
75:
313:
89:, the precursor to the project occurred in 1940: "In January 1940 the Army's adjutant general sent a letter to the president of
1008:
881:
837:
157:
for warrantless surveillance. This assertion came under congressional investigation as an apparent violation of FISA's intent.
1013:
139:
289:
260:
Coyne, Christopher J., and
Abigail R. Hall. "Perfecting tyranny: foreign intervention as experimentation in state control".
153:
Administration. The post-Clinton era interpretations of FISA and USSID 18's principles assume that the executive branch has
832:
365:
587:
535:
79:
733:
345:
768:
693:
314:
Senate Select
Committee to Study Governmental Operations with Respect to Intelligence Activities (April 23, 1976).
127:
The testimony of both the representatives from the cable companies and of director Allen at the hearings prompted
119:
In May 1975 however, Congressional critics began to investigate and expose the program. As a result, NSA director
63:
236:"Intelligence Activities and the Rights of Americans: National Security Agency Surveillance Affecting Americans"
124:
would seem to be a 35-year failing of
Presidents and the Congress rather than the agencies or their personnel."
1003:
635:
460:
191:
116:
At the height of
Project SHAMROCK, 150,000 messages were printed and analyzed by NSA personnel in a month.
71:
39:
429:"Context of '1945-1975: NSA's Operation Shamrock Secretly Monitors US Citizens' Overseas Communications'"
67:
560:
555:
319:
239:
540:
428:
196:
43:
718:
688:
580:
1018:
500:
DEIBEL, CHARLES LOUIS (2016). "NSA DATA COLLECTION PROGRAM: THE CHALLENGE OF ASSESING [
967:
269:
550:
893:
876:
849:
612:
8:
955:
859:
607:
206:
146:
551:
Development of
Surveillance Technology & Risk of Abuse of Economic Information | PDF
411:
844:
811:
785:
763:
758:
728:
713:
573:
393:
960:
629:
454:"U.S. Signal Intelligence Directive 18: Legal Compliance and Minimization Procedures"
397:
385:
341:
154:
98:
86:
657:
377:
211:
30:
exercise started in August 1945. Project MINARET involved the accumulation of all
412:"A Review of Intelligence Oversight Failure: NSA Programs that Affected Americans"
945:
920:
854:
816:
753:
293:
149:(SIGINT) inadvertently collected on US citizens, without a warrant, prior to the
105:
59:
23:
524:
Recollections from the Church
Committee's Investigation of NSA: Unlucky SHAMROCK
623:
150:
381:
982:
903:
871:
773:
748:
667:
389:
94:
51:
35:
950:
738:
723:
662:
647:
640:
132:
109:
940:
806:
652:
935:
915:
908:
888:
795:
201:
166:
259:
930:
743:
672:
596:
186:
181:
120:
47:
31:
27:
778:
50:
copies of all incoming, outgoing, and transiting telegrams via the
864:
176:
138:
One result of these investigations was the 1978 creation of the
82:. No court authorized the operation and there were no warrants.
171:
485:
Donohue, Laura K. "Anglo-American privacy and surveillance".
565:
366:"Expanding U.S. Surveillance Powers: The Costs of Secrecy"
502:
90:
55:
451:
541:
The NSA's Global Spying
Network | by Patrick S. Poole
536:
ECHELON: America's Secret Global Surveillance Network
561:
House report on Project Minaret and Project Shamrock
340:. New York: Alfred A. Knopf. pp. 23, 286–291.
546:The National Security Agency: The Secret Unveiled
980:
307:
145:USSID 18 was the general guideline for handling
530:Unlucky SHAMROCK: The View From the Other Side
581:
452:National Security Agency (January 25, 2011).
274:: CS1 maint: multiple names: authors list (
989:Federal Bureau of Investigation operations
588:
574:
526:, CIA Center for the Study of Intelligence
994:Government databases in the United States
363:
335:
331:
329:
217:Warrantless searches in the United States
46:(NSA), were given direct access to daily
76:Bureau of Narcotics and Dangerous Drugs
981:
838:Chinese espionage in the United States
556:Schneier on Security: Project Shamrock
499:
445:
326:
569:
140:Foreign Intelligence Surveillance Act
833:Chinese intelligence activity abroad
359:
357:
999:National Security Agency operations
899:Interpersonal (HUMINT) intelligence
484:
13:
16:Cold-War era US espionage exercise
14:
1030:
734:Computer and network surveillance
517:
354:
769:Short-range agent communications
34:data that entered or exited the
493:
478:
421:
404:
364:Theoharis, Athan (July 2016).
290:"The Origins of NSA (NSA.gov)"
282:
253:
228:
42:(AFSA) and its successor, the
1:
1009:Privacy of telecommunications
595:
532:, James G. Hudec, August 2000
487:J. Crim. L. & Criminology
222:
129:Senate Intelligence Committee
1014:Privacy in the United States
40:Armed Forces Security Agency
7:
336:Budiansky, Stephen (2016).
160:
10:
1035:
238:. Icdc.com. Archived from
22:was the sister project to
825:
794:
704:
681:
603:
508:The University of Arizona
382:10.1017/S0898030616000208
370:Journal of Policy History
262:The Independent Review 19
44:National Security Agency
719:Covert listening device
689:Intelligence assessment
506:] EFFECTIVENESS".
1004:Surveillance scandals
968:Targeted surveillance
80:Department of Defense
894:Industrial espionage
694:competing hypotheses
466:on November 10, 2019
322:on January 13, 2013.
207:Trailblazer Project
147:signal intelligence
54:and its associates
845:Cold War espionage
812:Front organization
786:Surveillance tools
764:Phone surveillance
759:One-way voice link
714:Concealment device
433:historycommons.org
976:
975:
630:Agent provocateur
296:on March 18, 2004
155:unitary authority
131:chairman Senator
99:Louis W. Tordella
87:Stephen Budiansky
1026:
590:
583:
576:
567:
566:
512:
511:
497:
491:
490:
482:
476:
475:
473:
471:
465:
459:. Archived from
458:
449:
443:
442:
440:
439:
425:
419:
418:
416:
408:
402:
401:
361:
352:
351:
333:
324:
323:
318:. Archived from
311:
305:
304:
302:
301:
292:. Archived from
286:
280:
279:
273:
265:
257:
251:
250:
248:
247:
232:
78:(BNDD), and the
20:Project SHAMROCK
1034:
1033:
1029:
1028:
1027:
1025:
1024:
1023:
979:
978:
977:
972:
946:Sting operation
855:Black operation
821:
817:Limited hangout
799:
790:
754:Numbers station
706:
700:
677:
617:
599:
594:
520:
515:
498:
494:
483:
479:
469:
467:
463:
456:
450:
446:
437:
435:
427:
426:
422:
414:
410:
409:
405:
362:
355:
348:
334:
327:
312:
308:
299:
297:
288:
287:
283:
267:
266:
258:
254:
245:
243:
234:
233:
229:
225:
163:
106:Athan Theoharis
24:Project MINARET
17:
12:
11:
5:
1032:
1022:
1021:
1016:
1011:
1006:
1001:
996:
991:
974:
973:
971:
970:
965:
964:
963:
958:
948:
943:
938:
933:
928:
923:
918:
913:
912:
911:
906:
896:
891:
886:
885:
884:
879:
869:
868:
867:
862:
852:
847:
842:
841:
840:
829:
827:
823:
822:
820:
819:
814:
809:
803:
801:
792:
791:
789:
788:
783:
782:
781:
771:
766:
761:
756:
751:
746:
741:
736:
731:
726:
721:
716:
710:
708:
707:communications
702:
701:
699:
698:
697:
696:
685:
683:
679:
678:
676:
675:
670:
665:
660:
655:
650:
645:
644:
643:
633:
626:
624:Agent handling
620:
618:
616:
615:
610:
604:
601:
600:
593:
592:
585:
578:
570:
564:
563:
558:
553:
548:
543:
538:
533:
527:
519:
518:External links
516:
514:
513:
492:
477:
444:
420:
403:
376:(3): 515–534.
353:
346:
325:
306:
281:
252:
226:
224:
221:
220:
219:
214:
209:
204:
199:
194:
189:
184:
179:
174:
169:
162:
159:
151:George W. Bush
72:Secret Service
15:
9:
6:
4:
3:
2:
1031:
1020:
1019:Western Union
1017:
1015:
1012:
1010:
1007:
1005:
1002:
1000:
997:
995:
992:
990:
987:
986:
984:
969:
966:
962:
959:
957:
954:
953:
952:
949:
947:
944:
942:
939:
937:
934:
932:
929:
927:
924:
922:
919:
917:
914:
910:
907:
905:
904:interrogation
902:
901:
900:
897:
895:
892:
890:
887:
883:
880:
878:
875:
874:
873:
872:Eavesdropping
870:
866:
863:
861:
858:
857:
856:
853:
851:
848:
846:
843:
839:
836:
835:
834:
831:
830:
828:
824:
818:
815:
813:
810:
808:
805:
804:
802:
797:
793:
787:
784:
780:
777:
776:
775:
774:Steganography
772:
770:
767:
765:
762:
760:
757:
755:
752:
750:
749:Invisible ink
747:
745:
742:
740:
737:
735:
732:
730:
727:
725:
722:
720:
717:
715:
712:
711:
709:
703:
695:
692:
691:
690:
687:
686:
684:
680:
674:
671:
669:
668:Sleeper agent
666:
664:
661:
659:
656:
654:
651:
649:
646:
642:
639:
638:
637:
634:
632:
631:
627:
625:
622:
621:
619:
614:
611:
609:
606:
605:
602:
598:
591:
586:
584:
579:
577:
572:
571:
568:
562:
559:
557:
554:
552:
549:
547:
544:
542:
539:
537:
534:
531:
528:
525:
522:
521:
509:
505:
504:
496:
488:
481:
462:
455:
448:
434:
430:
424:
413:
407:
399:
395:
391:
387:
383:
379:
375:
371:
367:
360:
358:
349:
347:9780385352666
343:
339:
338:Code Warriors
332:
330:
321:
317:
310:
295:
291:
285:
277:
271:
263:
256:
242:on 2013-01-13
241:
237:
231:
227:
218:
215:
213:
210:
208:
205:
203:
200:
198:
195:
193:
190:
188:
185:
183:
180:
178:
175:
173:
170:
168:
165:
164:
158:
156:
152:
148:
143:
141:
136:
134:
130:
125:
122:
117:
114:
111:
107:
104:According to
102:
100:
96:
95:David Sarnoff
92:
88:
85:According to
83:
81:
77:
73:
69:
65:
61:
57:
53:
52:Western Union
49:
45:
41:
37:
36:United States
33:
29:
25:
21:
951:Surveillance
925:
739:Cyber spying
724:Cryptography
663:Resident spy
648:Double agent
628:
507:
501:
495:
486:
480:
468:. Retrieved
461:the original
447:
436:. Retrieved
432:
423:
406:
373:
369:
337:
320:the original
309:
298:. Retrieved
294:the original
284:
270:cite journal
261:
255:
244:. Retrieved
240:the original
230:
197:Stellar Wind
144:
137:
133:Frank Church
126:
118:
115:
103:
84:
19:
18:
941:Stay-behind
850:Recruitment
807:Canary trap
705:Devices and
653:Field agent
470:January 13,
32:telegraphic
983:Categories
936:Sexpionage
916:COINTELPRO
909:safe house
889:False flag
826:Operations
800:techniques
796:Tradecraft
438:2020-10-23
300:2014-12-30
246:2012-12-30
223:References
212:Turbulence
202:ThinThread
167:COINTELPRO
860:black bag
744:Dead drop
673:Spymaster
597:Espionage
398:156789908
390:0898-0306
187:Main Core
182:FBI Index
121:Lew Allen
110:Tom Clark
48:microfilm
28:espionage
926:SHAMROCK
779:microdot
682:Analysis
161:See also
921:MINARET
865:wetwork
177:ECHELON
956:Global
882:MASINT
877:SIGINT
729:Cutout
613:Assets
608:Agents
396:
388:
344:
172:DCSNet
38:. The
641:Agent
636:Cover
464:(PDF)
457:(PDF)
415:(PDF)
394:S2CID
192:PRISM
26:, an
961:Mass
931:FVEY
658:Mole
472:2016
386:ISSN
342:ISBN
276:link
58:and
798:and
503:sic
378:doi
91:RCA
68:CIA
64:FBI
60:ITT
56:RCA
985::
431:.
392:.
384:.
374:28
372:.
368:.
356:^
328:^
272:}}
268:{{
93:,
74:,
70:,
66:,
589:e
582:t
575:v
510:.
489:.
474:.
441:.
417:.
400:.
380::
350:.
303:.
278:)
264:.
249:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.