FBI file shows just how easy it was for governments to listen in each other’s phone calls in the ‘50s
A heavily redacted section of the Federal Bureau of Investigation’s file on Technical Security Surveys shows just how easy it was for embassies to tap government phones in the mid-’50s. After discovering that the French were listening in on the White House, the FBI to uncovered dozens of phone lines belonging to the governments of American allies that were vulnerable to Communist governments. While securing these lines, a phone tap on the Soviet United Nations delegation had to be pulled - leaving the Bureau with no choice but to go through the Italian embassy.
The interagency CACTUS program served as the conduit between CIA’s Operation CHAOS and FBI’s COINTELPRO
A little known but extremely important part of the history of domestic surveillance by intelligence agencies is the CACTUS program. CACTUS was a highly classified channel used by agencies like the Central Intelligence Agency and the Federal Bureau of Investigation to transmit information about “the New Left, Black Militants and related matters.” This channel was never disclosed in the Church Committee reports, even when the reports discuss information that was transmitted through CACTUS.
Earlier this year, the Central Intelligence Agency hosted a panel at South by Southwest about the agency’s use of board games as a training exercise. Intrigued, MuckRock’s Mitchell Kotler filed a FOIA for materials used to play Collection Deck, a collectible card game shown in the presentation. Those materials just came in, and while there’s nothing to stop you from printing them out and playing, there just one tiny snag: several of the cards are redacted as a matter of national security.
As part of an ongoing series on MuckRock staff’s infatuation with figures from the Federal Bureau of Investigation file project, Caitlin Russell lists five reasons why Bureau surveillance records shows there’s room for just one Marx in her life. Well, two.
With a New York Judge upgrading the warrant requirement for a cell site simulator from probable cause to eavesdropping, it is important to take a look back at our census and the data researchers have compiled about these invasive surveillance tools.