Knowledge

Project SHAMROCK

Source đź“ť

101:, "the collection program 'just ran on' ever since its beginning in World War II 'without a great deal of attention from anyone'..." Three major cable companies provided copies of all international telegrams passing through New York, Washington, and San Francisco. In the 1950s, "New Shamrock" tapped the links of 60–70 foreign embassies. 97:, asking if a Lieutenant Earle F. Cook might be assigned to the company..." Cook photographed all international commercial cablegrams. "The clandestine arrangement—almost certainly illegal—set a precedent..." Official wartime censorship began in Dec. 1940, when all cables were "turned over to the government for inspection." According to 108:, the post-World War II continuation of Project SHAMROCK brought hesitation from the telegraph companies, who were concerned about the legality of their actions and that employees would reveal the companies' government cooperation to the public. Their fears were assuaged after a promise from Attorney General 123:
terminated it, on his own authority rather than that of other intelligence agencies. According to Budiansky, a 1977 US Department of Justice review concluded wiretap laws were violated, but "If the intelligence agencies possessed too much discretionary authority with too little accountability, that
112:
that the U.S. government would not prosecute the companies for their participation in Project SHAMROCK, and after Congress approved a bill section that made it illegal for "unauthorized" individuals to reveal information related to code-breaking, which was a part of SHAMROCK's operations.
142:(FISA) which limited the powers of the NSA and put in place a process of warrants and judicial review. Another internal safeguard, was United States Signals Intelligence Directive 18 (USSID 18), an internal NSA and intelligence community set of procedures, originally issued in 1980. 529: 62:. NSA did the operational interception, and, if there was information that would be of interest to other intelligence agencies, the material was passed to them. Intercepted messages were disseminated to the 523: 128: 988: 453: 316:"Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans: National Security Agency Surveillance Affecting Americans" 993: 545: 275: 315: 235: 998: 898: 216: 135:
to conclude that Project SHAMROCK was "probably the largest government interception program affecting Americans ever undertaken."
75: 313: 89:, the precursor to the project occurred in 1940: "In January 1940 the Army's adjutant general sent a letter to the president of 1008: 881: 837: 157:
for warrantless surveillance. This assertion came under congressional investigation as an apparent violation of FISA's intent.
1013: 139: 289: 260:
Coyne, Christopher J., and Abigail R. Hall. "Perfecting tyranny: foreign intervention as experimentation in state control".
153:
Administration. The post-Clinton era interpretations of FISA and USSID 18's principles assume that the executive branch has
832: 365: 587: 535: 79: 733: 345: 768: 693: 314:
Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities (April 23, 1976).
127:
The testimony of both the representatives from the cable companies and of director Allen at the hearings prompted
119:
In May 1975 however, Congressional critics began to investigate and expose the program. As a result, NSA director
63: 236:"Intelligence Activities and the Rights of Americans: National Security Agency Surveillance Affecting Americans" 124:
would seem to be a 35-year failing of Presidents and the Congress rather than the agencies or their personnel."
1003: 635: 460: 191: 116:
At the height of Project SHAMROCK, 150,000 messages were printed and analyzed by NSA personnel in a month.
71: 39: 429:"Context of '1945-1975: NSA's Operation Shamrock Secretly Monitors US Citizens' Overseas Communications'" 67: 560: 555: 319: 239: 540: 428: 196: 43: 718: 688: 580: 1018: 500:
DEIBEL, CHARLES LOUIS (2016). "NSA DATA COLLECTION PROGRAM: THE CHALLENGE OF ASSESING [
967: 269: 550: 893: 876: 849: 612: 8: 955: 859: 607: 206: 146: 551:
Development of Surveillance Technology & Risk of Abuse of Economic Information | PDF
411: 844: 811: 785: 763: 758: 728: 713: 573: 393: 960: 629: 454:"U.S. Signal Intelligence Directive 18: Legal Compliance and Minimization Procedures" 397: 385: 341: 154: 98: 86: 657: 377: 211: 30:
exercise started in August 1945. Project MINARET involved the accumulation of all
412:"A Review of Intelligence Oversight Failure: NSA Programs that Affected Americans" 945: 920: 854: 816: 753: 293: 149:(SIGINT) inadvertently collected on US citizens, without a warrant, prior to the 105: 59: 23: 524:
Recollections from the Church Committee's Investigation of NSA: Unlucky SHAMROCK
623: 150: 381: 982: 903: 871: 773: 748: 667: 389: 94: 51: 35: 950: 738: 723: 662: 647: 640: 132: 109: 940: 806: 652: 935: 915: 908: 888: 795: 201: 166: 259: 930: 743: 672: 596: 186: 181: 120: 47: 31: 27: 778: 50:
copies of all incoming, outgoing, and transiting telegrams via the
864: 176: 138:
One result of these investigations was the 1978 creation of the
82:. No court authorized the operation and there were no warrants. 171: 485:
Donohue, Laura K. "Anglo-American privacy and surveillance".
565: 366:"Expanding U.S. Surveillance Powers: The Costs of Secrecy" 502: 90: 55: 451: 541:
The NSA's Global Spying Network | by Patrick S. Poole
536:
ECHELON: America's Secret Global Surveillance Network
561:
House report on Project Minaret and Project Shamrock
340:. New York: Alfred A. Knopf. pp. 23, 286–291. 546:The National Security Agency: The Secret Unveiled 980: 307: 145:USSID 18 was the general guideline for handling 530:Unlucky SHAMROCK: The View From the Other Side 581: 452:National Security Agency (January 25, 2011). 274:: CS1 maint: multiple names: authors list ( 989:Federal Bureau of Investigation operations 588: 574: 526:, CIA Center for the Study of Intelligence 994:Government databases in the United States 363: 335: 331: 329: 217:Warrantless searches in the United States 46:(NSA), were given direct access to daily 76:Bureau of Narcotics and Dangerous Drugs 981: 838:Chinese espionage in the United States 556:Schneier on Security: Project Shamrock 499: 445: 326: 569: 140:Foreign Intelligence Surveillance Act 833:Chinese intelligence activity abroad 359: 357: 999:National Security Agency operations 899:Interpersonal (HUMINT) intelligence 484: 13: 16:Cold-War era US espionage exercise 14: 1030: 734:Computer and network surveillance 517: 354: 769:Short-range agent communications 34:data that entered or exited the 493: 478: 421: 404: 364:Theoharis, Athan (July 2016). 290:"The Origins of NSA (NSA.gov)" 282: 253: 228: 42:(AFSA) and its successor, the 1: 1009:Privacy of telecommunications 595: 532:, James G. Hudec, August 2000 487:J. Crim. L. & Criminology 222: 129:Senate Intelligence Committee 1014:Privacy in the United States 40:Armed Forces Security Agency 7: 336:Budiansky, Stephen (2016). 160: 10: 1035: 238:. Icdc.com. Archived from 22:was the sister project to 825: 794: 704: 681: 603: 508:The University of Arizona 382:10.1017/S0898030616000208 370:Journal of Policy History 262:The Independent Review 19 44:National Security Agency 719:Covert listening device 689:Intelligence assessment 506:] EFFECTIVENESS". 1004:Surveillance scandals 968:Targeted surveillance 80:Department of Defense 894:Industrial espionage 694:competing hypotheses 466:on November 10, 2019 322:on January 13, 2013. 207:Trailblazer Project 147:signal intelligence 54:and its associates 845:Cold War espionage 812:Front organization 786:Surveillance tools 764:Phone surveillance 759:One-way voice link 714:Concealment device 433:historycommons.org 976: 975: 630:Agent provocateur 296:on March 18, 2004 155:unitary authority 131:chairman Senator 99:Louis W. Tordella 87:Stephen Budiansky 1026: 590: 583: 576: 567: 566: 512: 511: 497: 491: 490: 482: 476: 475: 473: 471: 465: 459:. Archived from 458: 449: 443: 442: 440: 439: 425: 419: 418: 416: 408: 402: 401: 361: 352: 351: 333: 324: 323: 318:. Archived from 311: 305: 304: 302: 301: 292:. Archived from 286: 280: 279: 273: 265: 257: 251: 250: 248: 247: 232: 78:(BNDD), and the 20:Project SHAMROCK 1034: 1033: 1029: 1028: 1027: 1025: 1024: 1023: 979: 978: 977: 972: 946:Sting operation 855:Black operation 821: 817:Limited hangout 799: 790: 754:Numbers station 706: 700: 677: 617: 599: 594: 520: 515: 498: 494: 483: 479: 469: 467: 463: 456: 450: 446: 437: 435: 427: 426: 422: 414: 410: 409: 405: 362: 355: 348: 334: 327: 312: 308: 299: 297: 288: 287: 283: 267: 266: 258: 254: 245: 243: 234: 233: 229: 225: 163: 106:Athan Theoharis 24:Project MINARET 17: 12: 11: 5: 1032: 1022: 1021: 1016: 1011: 1006: 1001: 996: 991: 974: 973: 971: 970: 965: 964: 963: 958: 948: 943: 938: 933: 928: 923: 918: 913: 912: 911: 906: 896: 891: 886: 885: 884: 879: 869: 868: 867: 862: 852: 847: 842: 841: 840: 829: 827: 823: 822: 820: 819: 814: 809: 803: 801: 792: 791: 789: 788: 783: 782: 781: 771: 766: 761: 756: 751: 746: 741: 736: 731: 726: 721: 716: 710: 708: 707:communications 702: 701: 699: 698: 697: 696: 685: 683: 679: 678: 676: 675: 670: 665: 660: 655: 650: 645: 644: 643: 633: 626: 624:Agent handling 620: 618: 616: 615: 610: 604: 601: 600: 593: 592: 585: 578: 570: 564: 563: 558: 553: 548: 543: 538: 533: 527: 519: 518:External links 516: 514: 513: 492: 477: 444: 420: 403: 376:(3): 515–534. 353: 346: 325: 306: 281: 252: 226: 224: 221: 220: 219: 214: 209: 204: 199: 194: 189: 184: 179: 174: 169: 162: 159: 151:George W. Bush 72:Secret Service 15: 9: 6: 4: 3: 2: 1031: 1020: 1019:Western Union 1017: 1015: 1012: 1010: 1007: 1005: 1002: 1000: 997: 995: 992: 990: 987: 986: 984: 969: 966: 962: 959: 957: 954: 953: 952: 949: 947: 944: 942: 939: 937: 934: 932: 929: 927: 924: 922: 919: 917: 914: 910: 907: 905: 904:interrogation 902: 901: 900: 897: 895: 892: 890: 887: 883: 880: 878: 875: 874: 873: 872:Eavesdropping 870: 866: 863: 861: 858: 857: 856: 853: 851: 848: 846: 843: 839: 836: 835: 834: 831: 830: 828: 824: 818: 815: 813: 810: 808: 805: 804: 802: 797: 793: 787: 784: 780: 777: 776: 775: 774:Steganography 772: 770: 767: 765: 762: 760: 757: 755: 752: 750: 749:Invisible ink 747: 745: 742: 740: 737: 735: 732: 730: 727: 725: 722: 720: 717: 715: 712: 711: 709: 703: 695: 692: 691: 690: 687: 686: 684: 680: 674: 671: 669: 668:Sleeper agent 666: 664: 661: 659: 656: 654: 651: 649: 646: 642: 639: 638: 637: 634: 632: 631: 627: 625: 622: 621: 619: 614: 611: 609: 606: 605: 602: 598: 591: 586: 584: 579: 577: 572: 571: 568: 562: 559: 557: 554: 552: 549: 547: 544: 542: 539: 537: 534: 531: 528: 525: 522: 521: 509: 505: 504: 496: 488: 481: 462: 455: 448: 434: 430: 424: 413: 407: 399: 395: 391: 387: 383: 379: 375: 371: 367: 360: 358: 349: 347:9780385352666 343: 339: 338:Code Warriors 332: 330: 321: 317: 310: 295: 291: 285: 277: 271: 263: 256: 242:on 2013-01-13 241: 237: 231: 227: 218: 215: 213: 210: 208: 205: 203: 200: 198: 195: 193: 190: 188: 185: 183: 180: 178: 175: 173: 170: 168: 165: 164: 158: 156: 152: 148: 143: 141: 136: 134: 130: 125: 122: 117: 114: 111: 107: 104:According to 102: 100: 96: 95:David Sarnoff 92: 88: 85:According to 83: 81: 77: 73: 69: 65: 61: 57: 53: 52:Western Union 49: 45: 41: 37: 36:United States 33: 29: 25: 21: 951:Surveillance 925: 739:Cyber spying 724:Cryptography 663:Resident spy 648:Double agent 628: 507: 501: 495: 486: 480: 468:. Retrieved 461:the original 447: 436:. Retrieved 432: 423: 406: 373: 369: 337: 320:the original 309: 298:. Retrieved 294:the original 284: 270:cite journal 261: 255: 244:. Retrieved 240:the original 230: 197:Stellar Wind 144: 137: 133:Frank Church 126: 118: 115: 103: 84: 19: 18: 941:Stay-behind 850:Recruitment 807:Canary trap 705:Devices and 653:Field agent 470:January 13, 32:telegraphic 983:Categories 936:Sexpionage 916:COINTELPRO 909:safe house 889:False flag 826:Operations 800:techniques 796:Tradecraft 438:2020-10-23 300:2014-12-30 246:2012-12-30 223:References 212:Turbulence 202:ThinThread 167:COINTELPRO 860:black bag 744:Dead drop 673:Spymaster 597:Espionage 398:156789908 390:0898-0306 187:Main Core 182:FBI Index 121:Lew Allen 110:Tom Clark 48:microfilm 28:espionage 926:SHAMROCK 779:microdot 682:Analysis 161:See also 921:MINARET 865:wetwork 177:ECHELON 956:Global 882:MASINT 877:SIGINT 729:Cutout 613:Assets 608:Agents 396:  388:  344:  172:DCSNet 38:. The 641:Agent 636:Cover 464:(PDF) 457:(PDF) 415:(PDF) 394:S2CID 192:PRISM 26:, an 961:Mass 931:FVEY 658:Mole 472:2016 386:ISSN 342:ISBN 276:link 58:and 798:and 503:sic 378:doi 91:RCA 68:CIA 64:FBI 60:ITT 56:RCA 985:: 431:. 392:. 384:. 374:28 372:. 368:. 356:^ 328:^ 272:}} 268:{{ 93:, 74:, 70:, 66:, 589:e 582:t 575:v 510:. 489:. 474:. 441:. 417:. 400:. 380:: 350:. 303:. 278:) 264:. 249:.

Index

Project MINARET
espionage
telegraphic
United States
Armed Forces Security Agency
National Security Agency
microfilm
Western Union
RCA
ITT
FBI
CIA
Secret Service
Bureau of Narcotics and Dangerous Drugs
Department of Defense
Stephen Budiansky
RCA
David Sarnoff
Louis W. Tordella
Athan Theoharis
Tom Clark
Lew Allen
Senate Intelligence Committee
Frank Church
Foreign Intelligence Surveillance Act
signal intelligence
George W. Bush
unitary authority
COINTELPRO
DCSNet

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑