-Caveat Lector-   <A HREF="http://www.ctrl.org/">
</A> -Cui Bono?-

from:
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB23/index.html
Click Here: <A HREF="http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB23/index.html">
index</A>
-----
The National Security Agency Declassified


A National Security Archive
Electronic Briefing Book
by Jeffrey T. Richelson
assisted by Michael L. Evans

Introduction and Overview
    The National Security Agency (NSA) is one of the most secret (and
secretive) members of the U.S. intelligence community. The predecessor of
NSA, the Armed Forces Security Agency (AFSA), was established within the
Department of Defense, under the command of the Joint Chiefs of Staff, on May
20, 1949. In theory, the AFSA was to direct the communications intelligence
and electronic intelligence activities of the military service signals
intelligence units (at the time consisting of the Army Security Agency, Naval
Security Group, and Air Force Security Service). In practice, the AFSA had
little power, its functions being defined in terms of activities not
performed by the service units.1
    The creation of NSA resulted from a December 10, 1951, memo sent by
Walter Bedell Smith to James B. Lay, Executive Secretary of the National
Security Council. The memo observed that "control over, and coordination of,
the collection and processing of Communications Intelligence had proved
ineffective" and recommended a survey of communications intelligence
activities. The proposal was approved on December 13, 1951, and the study
authorized on December 28, 1951. The report was completed by June 13, 1952.
Generally known as the "Brownell Committee Report," after committee chairman
Herbert Brownell, it surveyed the history of U.S. communications intelligence
activities and suggested the need for a much greater degree of coordination
and direction at the national level. As the change in the security agency's
name indicated, the role of the NSA was to extend beyond the armed forces.2
    In the last several decades some of the secrecy surrounding NSA has been
stripped away by Congressional hearings and investigative research. Most
recently NSA has been the subject of criticism for failing to adjust to the
post-Cold War technological environment as well as for operating a "global
surveillance network" alleged to intrude on the privacy of individuals across
the world. The following documents provide insight into the creation,
evolution, management and operations of NSA, including the controversial
ECHELON program.
    Several of these documents also appear in either of two National Security
Archive collections on U.S. intelligence. The U.S. Intelligence Community:
Organization, Operations and Management: 1947-1989 (1990) and U.S. Espionage
and Intelligence: Organization, Operations, and Management, 1947-1996 (1997)
publish together for the first time recently declassified documents
pertaining to the organizational structure, operations and management of the
U.S. Intelligence Community over the last fifty years, cross-indexed for
maximum accessibility. Together, these two sets reproduce on microfiche over
2,000 organizational histories, memoranda, manuals, regulations, directives,
reports, and studies, totalling more than 50,000 pages of documents from the
Office of the Director of Central Intelligence, the Central Intelligence
Agency, National Reconnaissance Office, National Security Agency, Defense
Intelligence Agency, military service intelligence organizations, National
Security Council, and other official government agencies and organizations.


Go to the Documents
Return to Index of Electronic Briefing Books
Return to National Security Archive Main Menu
Notes
1. Report to the Secretary of State and the Secretary of Defense by a Special
Committee Appointed Pursuant to Letter of 28 December 1951 to Survey
Communications Intelligence Activities of the Government, June 13, 1952, pp.
47-48, 119; RG 457, SR-123, Military Reference Branch, NARA; The National
Cryptologic School, On Watch: Profiles from the National Security Agency's
Past 40 Years (Ft. Meade, Md.: NCS, 1986), p. 17.
2. Walter Bedell Smith, "Proposed Survey of Communications Intelligence
Activities," December 10, 1951; Report to the Secretary of State and the
Secretary of Defense by a Special Committee, p. 118; U.S. Congress, Senate
Select Committee to Study Governmental Operations with Respect to
Intelligence Activities, Final Report, Book III: Foreign and Military
Intelligence (Washington, D.C.: U.S. Government Printing Office, 1976), p.
736; National Security Agency/Central Security Service, NSA/CSS Manual 22-1
(Ft. Meade,
-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
All My Relations.
Omnia Bona Bonis,
Adieu, Adios, Aloha.
Amen.
Roads End

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are not allowed. Substance�not soap-boxing!  These are sordid matters
and 'conspiracy theory'�with its many half-truths, misdirections and outright
frauds�is used politically by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to