Synopses & Reviews
"
The NSA Report tackles some of the most important civil liberties issues of our era. Whether or not you agree with all of its recommendations, it is simply an outstanding introduction to the subject."
--Jack M. Balkin, Yale Law School"The Snowden revelations have prompted many people to wonder about what is going on, and what could be done to stop the surveillance infrastructure without crippling the nation's ability to interdict acts of terror. This report, written by world-class experts, provides a valuable explanation and assessment of the situation--and how best to address it. It could turn into the seminal report on the issue--an issue central to liberal democracy."--Viktor Mayer-Schönberger, University of Oxford
"This is an extraordinarily important report, reflecting a synthesis of viewpoints from luminaries in the fields of law, privacy, and national security. The report's recommendations are serious and extensive and will continue to influence the U.S. and other governments as they grapple with the problems and opportunities raised by all-pervasive surveillance."--Frank Pasquale, University of Maryland
Review
"A remarkably thorough and well-reasoned report calling on the government to end its bulk phone-data collection program and to increase both the transparency and accountability of surveillance programs."--New York Times
Review
"[The] recommendations take aim at some of the most controversial practices of the intelligence community."--Washington Post
Review
"Within the 300-page report are 46 recommendations that would dramatically curtail the National Security Agency's surveillance powers. While the proposals are specific and varied, they all echo one theme: The government's reach can no longer be limited by technological capacity alone. It must be reined in with laws and institutional reform."--Atlantic
Review
"The Review Board's recommendations on protecting the civil liberties of non-US persons--a relatively new aspect of the policy discussion--are incredibly welcome."--Jennifer Granick, Stanford Center for Internet and Society blog
Review
"Fascinating insight . . . into how the nation's data-mining apparatus works--and how it's supposed to work."--Kirkus Reviews
Review
"The report is a brilliantly readable guide to the world [Edward] Snowden revealed; its clarity of analysis, proceeding from fundamental principles, impeccable. . . . Governments around the world would do well to reflect on the principles that underpin The NSA Report and relate them to their own intelligence-gathering activities."--Kieron O'Hara and Nigel Shadbolt, Science
Review
and#8220;D. Robert Worleyand#8217;s scholarly and objective work opens the arcane subject of national security policy and strategy to the general public, provides a valuable resource for students and practitioners, and demonstrates the challenges in adapting a system created for distinct eras of peace and war to modern complexities.and#8221;and#8212;John T. Hanley Jr., former director for strategy, Office of the Director of National Intelligenceand#160;
and#160;
Review
and#8220;The problem of integrating all elements of national power to achieve specified goalsand#8212;the problem of strategyand#8212;is rarely treated in comprehensive fashion. Robert Worleyand#8217;s new volume is one of the very few that grapple with this challenge. The bookand#8217;s impressive breadth of treatment and its coherent framework will be of great use to students of U.S. national security strategy. The reader will come away with a wide-ranging and rigorous education in the tools, concepts, theories, and problems at the heart of U.S. strategy.and#8221;and#8212;Michael J. Mazarr, professor of national security strategy at the U.S. National War College
Synopsis
The official report that has shaped the international debate about NSA surveillance
"We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."--The NSA Report
This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties--without compromising national security.
Synopsis
"We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."--
The NSA ReportThis is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties--without compromising national security.
Synopsis
National security, a topic routinely discussed behind closed doors by Washingtonand#8217;s political scientists and policy makers, is believed to be an insiderand#8217;s game. All too often this highly specialized knowledge is assumed to place issues beyond the graspand#8212;and interestand#8212;of the American public. Author D. Robert Worley disagrees. The U.S. national security system, designed after World War II and institutionalized through a decades-long power conflict with the Soviet Union, is inadequate for the needs of the twenty-first century, and while a general consensus has emerged that the system must be transformed, a clear and direct route for a new national security strategy proves elusive.
Furnishing the tools to assist in future national security reforms, Orchestrating the Instruments of Power articulates and synthesizes the concepts of Americaand#8217;s economic, political, and military instruments of power.
About the Author
Richard A. Clarke served as a national security official under presidents Bill Clinton and George W. Bush. Michael J. Morell is a former deputy director of the Central Intelligence Agency. Geoffrey R. Stone is the Edward H. Levi Distinguished Service Professor of Law at the University of Chicago Law School. Cass R. Sunstein is the Robert Walmsley University Professor at Harvard University. Peter Swire is the Nancy J. and Lawrence P. Huang Professor in the Scheller College of Business at the Georgia Institute of Technology.
Table of Contents
Preface xi
Executive Summary xv
Recommendations xxv
Chapter 1 | Principles 1
Chapter 2 | Lessons of History 10
Chapter 3 | Reforming Foreign Intelligence Surveillance Directed at United States Persons 34
Chapter 4 | Reforming Foreign Intelligence Surveillance Directed at Non- United States Persons 81
Chapter 5 | Determining What Intelligence Should Be Collected and How 112
Chapter 6 | Organizational Reform in Light of Changing Communications Technology 125
Chapter 7 | Global Communications Technology: Promoting Prosperity, Security, and Openness in a Networked World 154
Chapter 8 | Protecting What We Do Collect 176
Conclusion 199
Appendix A | The Legal Standards for Government Access to Communications 201
Appendix B | Overview of NSA Privacy Protections Under FAA 702; Overview of NSA Privacy Protections Under EO 12333 205
Appendix C | US Intelligence: Multiple Layers of Rules and Oversight 207
Appendix D | Avenues for Whistle-blowers in the Intelligence Community 208
Appendix E | US Government Role in Current Encryption Standards 209
Appendix F | Review Group Briefings and Meetings 213
Appendix G | Glossary 216
Index 227