trying my best to fix the regex and editing python code

This commit is contained in:
HadleighJae 2023-04-27 00:54:09 -04:00
parent 8a031d6eb7
commit bb492e0ea4
367 changed files with 23920 additions and 23992 deletions

View file

@ -27,7 +27,7 @@ scientists, researchers, the news media, and the public at large are a
part of an alarming trend that has seen the military take an ever-increasing role in controlling the flow of information and
communications through <ent type='NORP'>American</ent> society, a role traditionally -- and
almost exclusively -- left to civilians. Under the approving gaze of
the <ent type='PERSON'>Reagan</ent> administration, Department of <ent type='ORG'>Defense</ent> (DoD) officials have
the Reagan administration, Department of <ent type='ORG'>Defense</ent> (DoD) officials have
quietly implemented a number of policies, decisions, and orders that
give the military unprecedented control over both the content and
public use of data and communications. . . .
@ -42,12 +42,12 @@ unclassified government-supplied technical data from its system and
completely dropped <ent type='ORG'>the National Technical Information System</ent> from its
database rather than risk a confrontation.
Representative <ent type='PERSON'>Jack Brooks</ent>, a <ent type='GPE'>Texas</ent> <ent type='NORP'>Democrat</ent> who chairs the <ent type='ORG'>House</ent>
Government Operations Committee, is an outspoken critic of the <ent type='ORG'>NSA</ent>'s
Government Operations Committee, is an outspoken critic of the NSA's
role in restricting civilian information. He notes that in 1985 the
<ent type='ORG'>NSA</ent> -- under the authority granted by <ent type='ORG'>NSDD</ent> 145 -- investigated a
computer program that was widely used in both local and federal
elections in 1984. The computer system was used to count more than one
third of all votes cast in <ent type='GPE'>the United States</ent>. While probing the
third of all votes cast in <ent type='GPE'>the United</ent> States. While probing the
system's vulnerability to outside manipulation, the <ent type='ORG'>NSA</ent> obtained a
detailed knowledge of that computer program. "In my view," <ent type='ORG'>Brooks</ent>
says, "this is an unprecedented and ill-advised expansion of the
@ -107,14 +107,14 @@ That attitude has outraged those concerned with the military's
increasing efforts to keep information not only from the public but
from industry experts, scientists, and even other government officials
as well. "That's like classifying a road map for fear of invasion,"
says <ent type='PERSON'>Paul Wolff</ent>, assistant administrator for the National Oceanic and
says <ent type='PERSON'>Paul Wolff</ent>, assistant administrator for <ent type='ORG'>the National</ent> Oceanic and
Atmospheric Administration, of the attempted restrictions.
These attempts to keep unclassified data out of the hands of
scientists, researchers, the news media, and the public at large are a
part of an alarming trend that has seen the military take an ever-increasing role in controlling the flow of information and
communications through <ent type='NORP'>American</ent> society, a role traditionally -- and
almost exclusively -- left to civilians. Under the approving gaze of
the <ent type='PERSON'>Reagan</ent> administration, Department of <ent type='ORG'>Defense</ent> (DoD) officials have
the Reagan administration, Department of <ent type='ORG'>Defense</ent> (DoD) officials have
quietly implemented a number of policies, decisions, and orders that
give the military unprecedented control over both the content and
public use of data and communications. For example:
@ -142,7 +142,7 @@ war, or when national security is specifically
threatened. Now the military has attempted to redefine
emergency.
The point man in the <ent type='ORG'>Pentagon</ent>'s onslaught on communications is
The point man in the Pentagon's onslaught on communications is
Assistant <ent type='ORG'>Defense</ent> Secretary <ent type='PERSON'>Donald</ent> C. <ent type='PERSON'>Latham</ent>, a former <ent type='ORG'>NSA</ent> deputy
chief. <ent type='PERSON'>Latham</ent> now heads up an interagency committee in charge of
writing and implementing many of the policies that have put the
@ -164,7 +164,7 @@ National Cancer Institute to information on every veteran who has ever
applied for medical aid from <ent type='ORG'>the Veterans Administration</ent> -- and all
the information on corporate and personal taxpayers in the Internal
Revenue Service's computers. Even agricultural statistics, he argues,
can be used by a foreign power against <ent type='GPE'>the United States</ent>.
can be used by a foreign power against <ent type='GPE'>the United</ent> States.
In his oversize yet Spartan <ent type='ORG'>Pentagon</ent> office, <ent type='PERSON'>Latham</ent> cuts anything
but an intimidating figure. <ent type='ORG'>Articulate</ent> and friendly, he could pass for
a network anchorman or a television game show host. When asked how the
@ -192,19 +192,19 @@ unclassified government-supplied technical data from its system and
completely dropped <ent type='ORG'>the National Technical Information System</ent> from its
database rather than risk a confrontation.
Representative <ent type='PERSON'>Jack Brooks</ent>, a <ent type='GPE'>Texas</ent> <ent type='NORP'>Democrat</ent> who chairs the <ent type='ORG'>House</ent>
Government Operations Committee, is an outspoken critic of the <ent type='ORG'>NSA</ent>'s
Government Operations Committee, is an outspoken critic of the NSA's
role in restricting civilian information. He notes that in 1985 the
<ent type='ORG'>NSA</ent> -- under the authority granted by <ent type='ORG'>NSDD</ent> 145 -- investigated a
computer program that was widely used in both local and federal
elections in 1984. The computer system was used to count more than one
third of all votes cast in <ent type='GPE'>the United States</ent>. While probing the
third of all votes cast in <ent type='GPE'>the United</ent> States. While probing the
system's vulnerability to outside manipulation, the <ent type='ORG'>NSA</ent> obtained a
detailed knowledge of that computer program. "In my view," <ent type='ORG'>Brooks</ent>
says, "this is an unprecedented and ill-advised expansion of the
military's influence in our society."
There are other <ent type='ORG'>NSA</ent> critics. "The computer systems used by counties
to collect and process votes have nothing to do with national
security, and I'm really concerned about the <ent type='ORG'>NSA</ent>'s involvement," says
security, and I'm really concerned about the NSA's involvement," says
<ent type='NORP'>Democrat</ent>ic congressman <ent type='PERSON'>Dan Glickman</ent> of <ent type='GPE'>Kansas</ent>, chairman of the <ent type='ORG'>House</ent>
science and technology subcommittee concerned with computer security.
Also, under <ent type='ORG'>NSDD</ent> 145 the <ent type='ORG'>Pentagon</ent> has issued an order, virtually
@ -255,10 +255,10 @@ information printed in many newspapers. Banks send important financial
data, businesses their spreadsheets, and stockbrokers their investment
portfolios, all over the same channels, from satellite signals to
computer hookups carried on long distance telephone lines. To make
sure that the <ent type='ORG'>federal government</ent> helped to promote and protect the
sure that the federal government helped to promote and protect the
efficient use of this advancing technology, <ent type='ORG'>Congress</ent> passed the
massive Communications Act of of 1934. It outlined the role and laws
of the communications structure in <ent type='GPE'>the United States</ent>.
of the communications structure in <ent type='GPE'>the United</ent> States.
The powers of the president are set out in Section 606 of that law;
basically it states that he has the authority to take control of any
communications facilities that he believes "essential to the national
@ -267,7 +267,7 @@ emergency.
There have been a number of attempts in recent years by <ent type='ORG'>Defense</ent>
Department officials to redefine what qualifies as a 606 emergency and
make it easier for the military to take over national communications.
In 1981 the <ent type='ORG'>Senate</ent> considered amendments to the 1934 act that would
In 1981 the Senate considered amendments to the 1934 act that would
allow the president, on <ent type='ORG'>Defense Department</ent> recommendation, to require
any communications company to provide services, facilities, or
equipment "to promote the national defense and security or the
@ -277,16 +277,16 @@ declared state of emergency. The general language had been drafted by
unrelated reasons.)
"I think it is quite clear that they have snuck in there some
powers that are dangerous for us as a company and for the public at
large," said <ent type='ORG'>MCI</ent> vice president <ent type='PERSON'>Kenneth Cox</ent> before the <ent type='ORG'>Senate</ent> vote.
Since President <ent type='PERSON'>Reagan</ent> took office, the <ent type='ORG'>Pentagon</ent> has stepped up its
large," said <ent type='ORG'>MCI</ent> vice president <ent type='PERSON'>Kenneth Cox</ent> before the Senate vote.
Since President Reagan took office, the <ent type='ORG'>Pentagon</ent> has stepped up its
efforts to rewrite the definition of national emergency and give the
military expanded powers in <ent type='GPE'>the United States</ent>. "The declaration of
military expanded powers in <ent type='GPE'>the United</ent> States. "The declaration of
'emergency' has always been vague," says one former administration
official who left the government in 1982 after ten years in top policy
posts. "Different presidents have invoked it differently. This
administration would declare a convenient 'emergency.'" In other
words, what is a nuisance to one administration might qualify as a
burgeoning crisis to another. For example, the <ent type='PERSON'>Reagan</ent> administration
burgeoning crisis to another. For example, the Reagan administration
might decide that a series of protests on or near military bases
constituted a national emergency.
Should the <ent type='ORG'>Pentagon</ent> ever be given the green light, its base for
@ -296,22 +296,22 @@ buildings, and apartment complexes that make up the <ent type='GPE'>Washington</
of <ent type='GPE'>Arlington</ent>, Virginia. Headquartered in a dusty and aging structure
surrounded by a barbed-wire fence is an obscure branch of the military
known as the <ent type='ORG'>Defense</ent> Communications Agency (<ent type='ORG'>DCA</ent>). It does not have the
spit and polish of <ent type='ORG'>the National Security Agency</ent> or the dozens of other
spit and polish of <ent type='ORG'>the National</ent> Security Agency or the dozens of other
government facilities that make up the nation's capital. But its lack
of shine belies its critical mission: to make sure all of <ent type='GPE'>America</ent>'s
of shine belies its critical mission: to make sure all of America's
far-flung military units can communicate with one another. It is in
certain ways the nerve center of our nation's defense system.
On the second floor of the <ent type='ORG'>DCA</ent>'s four-story headquarters is a new
addition called <ent type='ORG'>the National Coordinating Center</ent> (<ent type='ORG'>NCC</ent>). Operated by
On the second floor of the DCA's four-story headquarters is a new
addition called <ent type='ORG'>the National</ent> Coordinating Center (<ent type='ORG'>NCC</ent>). Operated by
the <ent type='ORG'>Pentagon</ent>, it is virtually unknown outside of a handful of industry
and government officials. The <ent type='ORG'>NCC</ent> is staffed around the clock by
representatives of a dozen of the nation's largest commercial
communications companies -- the so-called "common carriers" --
including AT&amp;T, <ent type='ORG'>MCI</ent>, <ent type='ORG'>GTE</ent>, <ent type='ORG'>Comsat</ent>, and <ent type='ORG'>ITT</ent>. Also on hand are officials
from the <ent type='ORG'>State Department</ent>, the <ent type='ORG'>CIA</ent>, the Federal Aviation
from the State Department, the <ent type='ORG'>CIA</ent>, the Federal Aviation
Administration, and a number of other federal agencies. During a 606
emergency the <ent type='ORG'>Pentagon</ent> can order the companies that make up the
<ent type='ORG'>National Coordinating Center</ent> to turn over their satellite, fiberoptic,
National Coordinating Center to turn over their satellite, fiberoptic,
and land-line facilities to the government.
On a long corridor in the front of the building is a series of
offices, each outfitted with a private phone, a telex machine, and a
@ -320,7 +320,7 @@ occupied by an employee from one of the companies that staff the <ent type='ORG'
and because their corporate logos hand on the wall outside. Each
employee is on permanent standby, ready to activate his company's
system should the <ent type='ORG'>Pentagon</ent> require it.
<ent type='ORG'>The National Coordinating Center</ent>'s mission is as grand as its title
<ent type='ORG'>The National</ent> Coordinating Center's mission is as grand as its title
is obscure: to make available to the <ent type='ORG'>Defense Department</ent> all the
facilities of the civilian communications network in this country --
the phone lines, the long-distance satellite hookups, the data
@ -331,7 +331,7 @@ possible. <ent type='ORG'>Company</ent> employees assigned to the center are on
hours a day; they wear beepers outside the office, and when on
vacation they must be replaced by qualified colleagues.
The center formally opened on <ent type='EVENT'>New Year</ent>'s Day, 1984, the same day Ma
Bell's monopoly over the telephone network of the entire <ent type='GPE'>United States</ent>
Bell's monopoly over the telephone network of the entire United States
was finally broken. The timing was no coincidence. <ent type='ORG'>Pentagon</ent> officials
had argued for years along with AT&amp;T against the divestiture of Ma
Bell, on grounds of national security. <ent type='ORG'>Defense</ent> Secretary <ent type='PERSON'>Weinberger</ent>
@ -341,9 +341,9 @@ reason was that rather than construct its own communications network,
the <ent type='ORG'>Pentagon</ent> had come to rely extensively on the phone company. After
the breakup the dependence continued. The <ent type='ORG'>Pentagon</ent> still used
commercial companies to carry more than 90 percent of its
communications within the continental <ent type='GPE'>United States</ent>.
communications within the continental United States.
The 1984 divestiture put an end to AT&amp;T's monopoly over the
nation's telephone service and increased the <ent type='ORG'>Pentagon</ent>'s obsession with
nation's telephone service and increased the Pentagon's obsession with
having its own nerve center. Now the brass had to contend with several
competing companies to acquire phone lines, and communications was
more than a matter of running a line from one telephone to another.
@ -356,13 +356,13 @@ These facts were not lost on the <ent type='ORG'>Defense Department</ent> or the
14, 1982, a number of secret meetings were held between high-level
administration officials and executives of the commercial
communications companies whose employees would later staff the
<ent type='ORG'>National Coordinating Center</ent>. The meetings, which continued over the
next three years, were held at the White <ent type='ORG'>House</ent>, the <ent type='ORG'>State Department</ent>,
National Coordinating Center. The meetings, which continued over the
next three years, were held at the White <ent type='ORG'>House</ent>, the State Department,
<ent type='ORG'>the Strategic Air</ent> Command (<ent type='ORG'>SAC</ent>) headquarters at Offutt Air Force Base
in <ent type='GPE'>Nebraska</ent>, and at the <ent type='PERSON'>North</ent> <ent type='NORP'>American</ent> Aerospace <ent type='ORG'>Defense</ent> Command
(<ent type='ORG'>NORAD</ent>) in <ent type='GPE'>Colorado Springs</ent>.
The industry officials attending constituted the National Security
Telecommunications Advisory Committee -- called <ent type='PERSON'>NSTAC</ent> (pronounced N-stack) -- set up by President <ent type='PERSON'>Reagan</ent> to address those same problems
The industry officials attending constituted <ent type='ORG'>the National</ent> Security
Telecommunications Advisory Committee -- called <ent type='ORG'>NSTAC</ent> (pronounced N-stack) -- set up by President Reagan to address those same problems
that worried the <ent type='ORG'>Pentagon</ent>. It was at these secret meetings, according
to the minutes, that the idea of a communications watch center for
national emergencies -- the <ent type='ORG'>NCC</ent> -- was born. Along with it came a
@ -371,7 +371,7 @@ commercial communications "assets" -- everything from ground stations
and satellite dishes to fiberoptic cables -- across the country.
At a 1983 <ent type='ORG'>Federal Communications Commission</ent> meeting, a ranking
<ent type='ORG'>Defense Department</ent> official offered the following explanation for the
founding of <ent type='ORG'>the National Coordinating Center</ent>: "We are looking at
founding of <ent type='ORG'>the National</ent> Coordinating Center: "We are looking at
trying to make communications endurable for a protracted conflict."
The phrase protracted conflict is a military euphemism for nuclear
war.
@ -382,7 +382,7 @@ strike, for that matter). And the <ent type='ORG'>Kremlin</ent> undoubtedly know
location and importance, and presumably has included it on its
priority target list. In sum, according to one <ent type='ORG'>Pentagon</ent> official, "The
<ent type='ORG'>NCC</ent> itself is not viewed as a survivable facility."
Furthermore, the <ent type='ORG'>NCC</ent>'s "Implementation Plan," obtained by "<ent type='ORG'>Omni</ent>,"
Furthermore, the NCC's "Implementation Plan," obtained by "<ent type='ORG'>Omni</ent>,"
lists four phases of emergencies and how the center should respond to
each. The first, Phase 0, is Peacetime, for which there would be
little to do outside of a handful of routine tasks and exercises.
@ -390,21 +390,21 @@ Phase 1 is Pre Attack, in which alternate <ent type='ORG'>NCC</ent> sites are al
2 is Post Attack, in which other <ent type='ORG'>NCC</ent> locations are instructed to take
over the center's functions. Phase 3 is known as Last Ditch, and in
this phase whatever facility survives becomes the de facto <ent type='ORG'>NCC</ent>.
So far there is no alternate <ent type='ORG'>National Coordinating Center</ent> to which
So far there is no alternate National Coordinating Center to which
<ent type='ORG'>NCC</ent> officials could retreat to survive an attack. According to <ent type='ORG'>NCC</ent>
deputy director <ent type='PERSON'>William Belford</ent>, no physical sites have yet been
chosen for a substitute <ent type='ORG'>NCC</ent>, and even whether the <ent type='ORG'>NCC</ent> itself will
survive a nuclear attack is still under study.
Of what use is a communications center that is not expected to
outlast even the first shots of a war and has no backup?
The answer appears to be that because of the <ent type='ORG'>Pentagon</ent>'s concerns
The answer appears to be that because of the Pentagon's concerns
about the AT&amp;T divestiture and the disruptive effects it might have on
national security, the <ent type='ORG'>NCC</ent> was to serve as the military's peacetime
communications center.
The center is a powerful and unprecedented tool to assume control
over the nation's vast communications and information network. For
years the <ent type='ORG'>Pentagon</ent> has been studying how to take over the common
carriers' facilities. That research was prepared by <ent type='PERSON'>NSTAC</ent> at the DoD's
carriers' facilities. That research was prepared by <ent type='ORG'>NSTAC</ent> at the DoD's
request and is contained in a series of internal <ent type='ORG'>Pentagon</ent> documents
obtained by "<ent type='ORG'>Omni</ent>." Collectively this series is known as the Satellite
Survivability Report. Completed in 1984, it is the only detailed
@ -418,7 +418,7 @@ While the report notes that current technical differences such as
varying frequencies make it difficult for the <ent type='ORG'>Pentagon</ent> to use
commercial satellites, it recommends ways to resolve those problems.
Much of the report is a veritable blueprint for the government on how
to take over satellites in orbit above <ent type='GPE'>the United States</ent>. This
to take over satellites in orbit above <ent type='GPE'>the United</ent> States. This
information, plus <ent type='ORG'>NSDD</ent> 145's demand that satellite operators tell the
<ent type='ORG'>NSA</ent> how their satellites are controlled, guarantees the military ample
knowledge about operating commercial satellites.
@ -426,15 +426,15 @@ The <ent type='ORG'>Pentagon</ent> now has an unprecedented access to the civili
communications network: commercial databases, computer networks,
electronic links, telephone lines. All it needs is the legal authority
to use them. Then it could totally dominate the flow of all
information in <ent type='GPE'>the United States</ent>. As one high-ranking White <ent type='ORG'>House</ent>
information in <ent type='GPE'>the United</ent> States. As one high-ranking White <ent type='ORG'>House</ent>
communications official put it: "Whoever controls communications,
controls the country." His remark was made after our <ent type='ORG'>State Department</ent>
controls the country." His remark was made after our State Department
could not communicate directly with our embassy in <ent type='GPE'>Manila</ent> during the
anti-<ent type='PERSON'>Marcos</ent> revolution last year. To get through, the State
Department had to relay all its messages through the <ent type='NORP'>Philippine</ent>
government.
Government officials have offered all kinds of scenarios to justify
<ent type='ORG'>the National Coordinating Center</ent>, <ent type='ORG'>the Satellite Survivability Report</ent>,
<ent type='ORG'>the National</ent> Coordinating Center, <ent type='ORG'>the Satellite Survivability Report</ent>,
new domains of authority for the <ent type='ORG'>Pentagon</ent> and the <ent type='ORG'>NSA</ent>, and the
creation of top-level government steering groups to think of even more
policies for the military. Most can be reduced to the rationale that
@ -443,7 +443,7 @@ be prevented from getting too much information from unclassified
sources. And the only way to do that is to step in and take control of
those sources.
Remarkably, the communications industry as a whole has not been
concerned about the overall scope of the <ent type='ORG'>Pentagon</ent>'s threat to its
concerned about the overall scope of the Pentagon's threat to its
freedom of operation. Most protests have been to individual government
actions. For example, a media coalition that includes the Radio-Television Society of Newspaper Editors, and the Turner Broadcasting
System has been lobbying that before the government can restrict the
@ -451,8 +451,8 @@ use of satellites, it must demonstrate why such restrictions protect
against a "threat to distinct and compelling national security and
foreign policy interests." But the whole policy of restrictiveness has
not been examined. That may change sometime this year, when <ent type='ORG'>the Office</ent>
of Technology Assessment issues a report on how the <ent type='ORG'>Pentagon</ent>'s policy
will affect communications in <ent type='GPE'>the United States</ent>. In the meantime the
of Technology Assessment issues a report on how the Pentagon's policy
will affect communications in <ent type='GPE'>the United</ent> States. In the meantime the
military keeps trying to encroach on national communications.
While it may seem unlikely that the <ent type='ORG'>Pentagon</ent> will ever get total
control of our information and communications systems, the truth is