Showing posts with label national security archive. Show all posts
Showing posts with label national security archive. Show all posts

Friday, September 5, 2014

Iran-Contra Revisited

Iran-Contra Revisited: New Book Places Reagan at Center of 1980s Scandal

Lack of Legal or Legislative Closure to Affair Opened Path to Future Presidential Abuses

Narrative Spotlights Iranian, Israeli, Nicaraguan Perspectives

National Security Archive Electronic Briefing Book No. 483 - Posted September 5, 2014

For more information contact: +1 202/994-7000 or nsarchiv@gwu.edu

Washington, D.C., September 5, 2014 -- A new book on the Iran-Contra affair shows that President Ronald Reagan stood at the epicenter of the scandal both in terms of his willingness to break the law in order to free American hostages in Lebanon and his failure to take account of the costs and consequences of his decisions, including the illicit conduct of numerous aides.

Advance praise for "Iran-Contra: Reagan's Scandal and the Unchecked Abuse of Presidential Power" by Malcolm Byrne (University Press of Kansas, September 15, 2014), includes this from Seymour Hersh: "At last, the Reagan administration's Iran-Contra affair finally has a comprehensive history worthy of the scandal ... Malcolm Byrne has told the complex story in brilliant fashion."

"Iran-Contra" details the historical, political, and institutional background against which the affair played out. Utilizing tens of thousands of pages of previously classified materials, the narrative describes in detail all the administration's decisions and actions, and discusses the rationales invoked at the time as well as after the fact (explanations that sometimes differed widely).

Looking beyond the U.S. side, the volume explores -- through documents and interviews -- the views and actions of Iranians, Israelis, Nicaraguans, and others who played parts in the affair. Many of these insights are published here for the first time.

"Iran-Contra" is the first full-length account of the affair to study and assess the various official investigations that were convened -- the Tower Commission, the joint congressional hearings, and the independent counsel's inquiry. The limitations of each helped lead to an inconclusive end to the affair, which has had implications for the unchecked conduct of future presidents and their administrations.

While the scandal had many contributors -- including Congress, which failed to avert either element of the affair or to pass meaningful legislation in its wake -- the role of the president and his top aides stands out.

Today's posting includes a revealing series of recently declassified high-level records that explore the president's thinking and actions during the affair.


Check out today's posting at the National Security Archive's Website -http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB483/

Find us on Facebook - http://www.facebook.com/NSArchive

Unredacted, the Archive blog - http://nsarchive.wordpress.com/

________________________________________________________
THE NATIONAL SECURITY ARCHIVE is an independent non-governmental research institute and library located at The George Washington University in Washington, D.C. The Archive collects and publishes declassified documents acquired through the Freedom of Information Act (FOIA). A tax-exempt public charity, the Archive receives no U.S. government funding; its budget is supported by publication royalties and donations from foundations and individuals.
_________________________________________________________

 

 

Friday, April 26, 2013

The Future of Warfare Is Warfare in Cyberspace

National Security Agency Tasked with Targeting Adversaries' Computers for Attack Since Early 1997, According to Declassified Document

"The Future of Warfare Is Warfare in Cyberspace," NSA Declared

"Cyberspace and U.S. National Security" - New Archive Posting Explores Wide Range of U.S. Cyber Concerns, Experiences and Counter-Activities

National Security Archive Electronic Briefing Book No. 424

Posted - April 26, 2013

Edited by Jeffrey T. Richelson

For more information contact:
Jeffrey T. Richelson 202/994-7000 or nsarchiv@gwu.edu

http://www.nsarchive.org

Washington, D.C., April 26, 2013 - Since at least 1997, the National Security Agency (NSA) has been responsible for developing ways to attack hostile computer networks as part of the growing field of Information Warfare (IW), according to a recently declassified internal NSA publication posted today by the non-governmental National Security Archive ("the Archive") at The George Washington University. Declaring that "the future of warfare is warfare in cyberspace," a former NSA official describes the new activity as "sure to be a catalyst for major change" at the super-secret agency.

The document is one of 98 items the Archive is posting today that provide wide-ranging background on the nature and scope of U.S. cyber activities.

Activities in cyberspace - both defensive and offensive - have become a subject of increasing media and government attention over the last decade, although usually the focus has been on foreign attacks against the United States, most notably the Chinese government's reported exploitation of U.S. government, commercial and media computer networks. At the same time, the apparent U.S.-Israeli created Stuxnet worm, designed to damage Iranian centrifuges, has put the spotlight on the United States' own clandestine cyber efforts.

The NSA's new assignment as of 1997, known as Computer Network Attack (CNA), comprises "operations to disrupt, deny, degrade or destroy" information in target computers or networks, "or the computers and networks themselves," according to the NSA document.

Today's posting by the Archive highlights various aspects of U.S. cyberspace activities and concerns going back to the late 1970s. The documents - obtained from government and private websites as well as Freedom of Information Act requests - originate from a wide variety of organizations. These include the White House and National Security Council, the National Security Agency, the Departments of Defense, Energy, and Homeland Security, the military services, the General Accounting/ Government Accountability Office, and the Congressional Research Service - as well as three private organizations (Project 2049, Mandiant Corporation, and Symantec).

Among the highlights of the documents are:

* The NSA's earlier concerns about the vulnerability of sensitive computer systems to either viruses or compromise through foreign intelligence service recruitment of computer personnel

* The Secretary of Defense's March 1997 authorization of the National Security Agency to conduct computer network attack operations

* Detailed discussions of Chinese computer network exploitation activities

* Analyses of the Stuxnet worm

* Extensive treatments of intelligence collection concerning U.S. technologies through computer network exploitation

Check out today's posting at the National Security Archive website - http://www.nsarchive.org

Find us on Facebook - http://www.facebook.com/NSArchive

Unredacted, the Archive blog - http://nsarchive.wordpress.com/

http://twitter.com/NSArchive

________________________________________________________
THE NATIONAL SECURITY ARCHIVE is an independent non-governmental research institute and library located at The George Washington University in Washington, D.C. The Archive collects and publishes declassified documents acquired through the Freedom of Information Act (FOIA). A tax-exempt public charity, the Archive receives no U.S. government funding; its budget is supported by publication royalties and donations from foundations and individuals.