Since the CIA involved in the scandal, Congress debriefed them and their services became public. (Streissguth 28). Lawmakers put an end to some of the CIA’s operations (Streissguth 28). I was amazed at how many agencies were formed and botched before the final product-the CIA- was developed. However, agencies were not the only thing that impacted the creation of the Central Intelligence Agency. Another influence on the development of the CIA were the amendments and creation of laws surrounding espionage. One of the first bills to pass that distinctly influenced the CIA’s development was the National Security Act of 1947 (“History”). It gave the CIA the duties of planning and carrying out the intelligence operations of the U.S., and evaluating …show more content…
Their main mission is to intercept communications (“Streissguth 46”). The NSA’s history is not as long as the CIA’S. It did not start as different agency and morph into another, but instead changed throughout time based on both technology and laws. The NSA originated in 1952 when President Truman created it (Streissguth 46). However, as George Howe stated in the file “The Early History of the NSA”, “the protection of the security of U.S communications by codes, ciphers, and other measures can be traced back as far as the war for American Independence, cryptologic activities resembling those of the NSA could not originate until the advent of radio communications” (11). That is true; tracking radio communications drastically changed how intelligence was gathered and sent. I cannot imagine how difficult it would have been to have to track letters and paper documents; it must have been a fragile task, decoding physical letters and redistributing them without the interception being noticed. Communication intelligence sent by machines includes the famous example of Enigma. During World War II, the British Intelligence broke Enigma and shared the information with the U.S Communication Security, which was a predecessor of the NSA (Streissguth 46). Today, the National Security Agency completes similar tasks. After learning about the CIA’s long and complex history, I was surprised and somewhat bored with the NSA’s. Their agency is young and relatively simple in terms of what drove its evolution. One of the key factors were the statutes passed that directly related to its tasks. The NSC Intelligence Directive No. 9 was revised on October 24, 1952 (Howe 11). The Secretary of Defense had issued this change and thus created the NSA. It was formally named so on November 4, 1952 (Howe 11). Throughout the rest of the year, changes in the communications intelligence took place (Howe 11).
The FBI changed the game when it came to be in the early twentieth century. The Bureau of Investigation was founded in 1908 by Attorney General Charles Bonaparte. It started with only thirty four men that were former secret service agents that were brought together by Bonaparte. They changed the view in the government and on local police forces.
Most of the time Tallmadge would have a courier bring the messages that last part of the way, which would end with Washington getting the message. Even though, this process of getting the messages to Washington was very long, it was also very effective. The Culper Ring used codes and invisible ink to hide the messages and used numbers instead of names. “Even Washington was ignorant of the spies' identities” (Mount Vernon Staff). In those five years of the culper ring not even one of its spies were unmasked because of all the precautions they took.
Culper Ring At the peak of the American Revolutionary War, in 1778, a spy organization known as the Culper Ring was formed to gain information on British intelligence by sending in reliable informants who would report back to the Americans. The organization was founded by Benjamin Tallmadge under the orders of the first president, George Washington, himself. Tallmadge began to recruit others who he believed were trustworthy, such as Abraham Woodhull, Caleb Brewster, and a few others.
They also targeted other black power movement groups, feminist organizations, white supremacist groups, anti-Vietnam War organizers, and anti-colonial movements, anyone they considered to be “subversive”. The FBI Director of the time, J. Edgar Hoover, ordered his agents to "expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate" the leaders and activities of these groups and gave them almost unlimited power and resources to do so. The program was successfully kept secret from the public until 1971 when documents related to the project were stolen from FBI offices. Within a year, the project was officially
In 1956, the FBI created their counterintelligence program (COINTELPRO) to deal with the threat of communism in the United States. Placed within the framework of a fight against subversive activities by agents and organizations, the FBI used the program against anyone they deemed a threat to the American way. The mandate of the program was to destroy the communist infiltration, not by external harassment, but by exacerbating the internal fight currently raging within the party. (Something Happening Here, pg. 27) In the following years, COINTELPRO were used against various other groups and organizations, including what the FBI referred to as “Black Liberation / Black Hate” groups. COINTELPRO against “Black Extremists” officially started
The FBI is celebrating its 109th year as a formidable institution. It was established in 1908. Through many years of diligent work, J. Edgar Hoover worked to establish the credibility of the Federal Bureau of Investigation (FBI). This now prestigious institution has worked foreign and domestically to catch criminals with the help of the FBI’s Most Wanted List. The FBI’s Most Wanted List was implemented to bring awareness to the public about dangerous criminals.
It is impossible to discuss civil liberties and security without talking about 9/11 and the Patriot Act. The Patriot Act was passed almost immediately after 9/11, hugely expanding intelligence agencies ability to investigate potential terrorism. However, critics of the law say that it infringed on the civil liberties of the innocent and did not guarantee proper oversight of law enforcement agencies in their execution and use of these newfound powers. I agree that as war and violence evolve, so must our methods of preventing them. In this digital age preventing such violence means monitoring information channels and being able to respond to leads rapidly and subtly.
“The spy ring established a sophisticated method of conveying information to Washington” (“Culper Spy Ring”). Washington had many mistakes in the past that he had to make the culper spy ring extremely secret. “George Washington
The Department of Justice drafted the USA PATRIOT Act to increase the federal agencies’ power to use surveillance cameras, conduct search and detect communication both nationwide and from foreign countries to seek out terroristic attacks. In addition, the president that signed this into law was President George W. Bush. In addition, most people would not want the government to secretly spy on them.
When the three branches of government were created a system of “check and balances” was built into the Constitution in order to keep one branch of government from becoming too large and too powerful. Actions that are taken by one branch of government affect the other branches, thereby introducing “oversight”. The intelligence community has both internal and external oversight. The internal oversight comes from the CIA Inspector General that is embedded within the intelligence community. The external oversight comes from both the executive and legislative branches of the government.
On September 11th, 2001, tragedy struck America. A terrorist attack was carried out resulting in 2,753 Americans killed. America became locked in a war, and it needed more security on its own soil. So, congress passed a law known as the Patriot Act. This allowed the N.S.A (national security agency) to gain information of individual citizens or groups of individuals by using library records, phone calls and other surveillance.
Edgar Hoover intensified his personal anti-Communist, anti-subversive stance and increased the FBI’s surveillance activities. Frustrated over limitations placed on the Justice Department’s investigative capabilities, Hoover created the Counter Intelligence Program or COINTELPRO. The group conducted a series of covert, and oftentimes illegal investigations designed to discredit or disrupt radical political organizations. Initially, Hoover ordered background checks on government employees to prevent foreign agents from infiltrating the government. Later, COINTELPRO went after any organization Hoover considered subversive, including the Black Panthers, the Socialist Workers Party, and the Ku Klux
For example here is some evidence of their work, “The information obtained by the FBI proved essential in high-profile legal cases, including the 1949 conviction of 12 prominent leaders of the American Communist Party on charges that they had advocated the overthrow of the government” (www.history.com). Countless Americans felt the pressure of communism on a personal level. Thousands of so-called
(Bilton, 2013) Surveillance of search engines permits information to be monitored so that if any hazardous search word like how to make bomb is looked it up several times by someone then it can be identified (Anon, 2014). Also, watching over the public assists police to capture crime suspects so that government organizations can protect national security (mass surveillance 위키피디아) To be specific, after terrible incident occurred in September 11, 2001, government of United States enacted the Patriot Act which stands for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001. The act was signed by President George W. Bush on October 26, 2001 in the name of declaring war with terrorism. (위키피디아) The law grants the right to Federal Bureau of Investigation to profile people who fit certain stereotypes so that potential crime and potential terror can be prevented.
Some of the benefits of CIA are mentioned as follows: • Comprehensive security monitoring features • Integrated security management of critical assets on the network • Flexible in terms of providing the necessary security features to varied networks In this chapter you will learn about