Coded Messages: How the CIA and NSA Hoodwink Congress and the People
Come to think of it, we all know the CIA is the organization responsible for hands-on international subterfuge, assassinations, and regime change. But if covert activities are their brief, who is in charge of data collection? What is the real intelligence agency of the United States?
Brilliant inventions and breakthroughs in the science and the art of intelligence gathering and data encryption/decryption are presented and explained, with illustrations from the US Civil War to World War II and beyond, including the early achievements of Ms. Aggie Meyer Driscoll and other talented professionals.
The author shows when, and why, the NSA was formed, in full realization that it was in breach of the US Constitution; and then he shows why this obsession with secrecy is no longer valid but endangers personal liberties in the Internet age. Phil Zimmermann's PGP-1 and its source code were distributed freely on the Internet in 1991. This led to the development of session keys and other modern encryption devices that enable eCommerce and other essentials of 21st-century life; and the old systems of encryption were rendered obsolete. McAvoy shows that all the codebooks, clever teams of linguists and mathematicians, and computer banks in the world will never be able to crack today's encrypted messages. (Let's hope he's right.)
Now the NSA's most valuable role, says McAvoy, has shifted from communications intelligence to HUMINT. They are well equipped for their new emphasis in human intelligence by having been out of the limelight since their inception.
This analysis is entwined with memoirs of an eccentric and engaging West Virginia boy who knows how to tell a good story. A near flunk-out who went from amateur radio operator to co-inventor of new communications technologies, he quickly became a valued contributor to US defense efforts as life whisked him from Monterey to MIT to Berlin.
To our knowledge, no NSA employee or former employee has written a book or so much as given an interview exploring the role of the National Security Agency, whose budget, twice that of the CIA and FBI combined, is hidden somewhere in the Department of Defense numbers and whose activities are not discussed, despite Constitutional provisions. The author also emphasizes the lack of awareness of the limitations provided by the Fourth Amendment on the part of those responsible for abiding by its provisions, and lists some of the CIA's most aggressive international interventions that belie Americans' cherished view of their peace-loving, law-abiding nation.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
‚€œI ‚€œThe ‚€œWell ‚€œYou additive book Afghanistan algorithm American Arlington Hall Station Army ARPA attack Battle of Midway Beckwith Berlin Boris Hagelin Brownell Buehler can‚€™t carriers Chocolate Store Chocolate Store‚€™s CIA Director CIA‚€™s cipher civilian code book code breaking Colonel Comstock Colonel Stager COMINT Commander communications Congress Congressional oversight credit card number cryptanalysis Crypto AG cryptography decipher decrypt democratically elected didn‚€™t digits don‚€™t Eddie Layton encrypted message encryption graduate Grant‚€™s headquarters Hellman intelligence agency intercepted Internet Iranian Japanese katakana Kido Butai knew Korean let‚€™s machines military Moon Cha National Security Agency Naval Navy Neil Ganzert never NSA employee officers operations Phil Zimmermann planes President radio random number repo-depot secret Secretary sent Sergeant session keys story telegraph tell That‚€™s thing traffic analysis Washington Whitfield Diffie whole number World World War II wouldn‚€™t you‚€™re