<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>surveillance - The Black Vault</title>
	<atom:link href="https://www.theblackvault.com/documentarchive/tag/surveillance/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.theblackvault.com/documentarchive</link>
	<description>Discover the Truth</description>
	<lastBuildDate>Mon, 14 Oct 2024 17:17:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.theblackvault.com/documentarchive/wp-content/uploads/2020/06/cropped-siteicon-2-150x150.jpg</url>
	<title>surveillance - The Black Vault</title>
	<link>https://www.theblackvault.com/documentarchive</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">87123917</site>	<item>
		<title>CARNIVORE (DCS1000): FBI Files on Their Email and Electronic Communication Monitoring Software</title>
		<link>https://www.theblackvault.com/documentarchive/carnivore-dcs1000-fbi-files-on-their-email-and-electronic-communication-monitoring-software/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=carnivore-dcs1000-fbi-files-on-their-email-and-electronic-communication-monitoring-software</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Thu, 27 Jun 2024 05:50:16 +0000</pubDate>
				<category><![CDATA[Controversies]]></category>
		<category><![CDATA[Federal Bureau of Investigation (FBI) Collection]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Carnivore]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[surveillance]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=6478</guid>

					<description><![CDATA[<p>The below documents began being published here on The Black Vault in 2018, as the FBI released them. The final response for this FOIA case came in August of 2024, with multiple updates through that timeframe. In October of 2024, The Black Vault added the August release for download, and since this is final release [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/carnivore-dcs1000-fbi-files-on-their-email-and-electronic-communication-monitoring-software/">CARNIVORE (DCS1000): FBI Files on Their Email and Electronic Communication Monitoring Software</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p><em>The below documents began being published here on The Black Vault in 2018, as the FBI released them. The final response for this FOIA case came in August of 2024, with multiple updates through that timeframe. In October of 2024, The Black Vault added the August release for download, and since this is final release for the case, this page will likely not be updated again. All documents are available below this article.</em></p>
<hr />
<p>In the late 1990s and early 2000s, the FBI&#8217;s Carnivore system drew considerable attention and debate. Unveiled during this period, Carnivore was a sophisticated email wiretapping system designed to intercept and analyze digital communications. The system&#8217;s capabilities and the implications for privacy and civil liberties were subjects of intense scrutiny and concern among privacy advocates, Internet service providers (ISPs), and the public at large.</p>
<p>Carnivore, officially known as DCS1000, was a network diagnostic tool utilized by the FBI to monitor and intercept email and other online communications. The system was installed at an ISP’s premises and was capable of scanning vast amounts of digital data passing through the ISP’s network. Carnivore specifically targeted communications of suspects under investigation, allowing the FBI to capture emails, chat sessions, and other forms of online interactions.</p>
<p>The Carnivore system operated by tapping into the ISP&#8217;s network and filtering the data packets that flowed through it. According to an internal FBI document, the system was designed to &#8220;ensure that only the exact communications authorized by the court to be intercepted are what is intercepted&#8221;​​. This meant that Carnivore could be configured to capture only the communications of a specific target while excluding all other traffic.</p>
<p><a href="https://www.theblackvault.com/documentarchive/wp-content/uploads/2018/09/2024-06-27_04-58-20.png"><img fetchpriority="high" decoding="async" class="alignright size-medium wp-image-19720" src="https://www.theblackvault.com/documentarchive/wp-content/uploads/2018/09/2024-06-27_04-58-20-300x199.png" alt="" width="300" height="199" srcset="https://www.theblackvault.com/documentarchive/wp-content/uploads/2018/09/2024-06-27_04-58-20-300x199.png 300w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2018/09/2024-06-27_04-58-20-150x100.png 150w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2018/09/2024-06-27_04-58-20-450x299.png 450w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2018/09/2024-06-27_04-58-20-600x399.png 600w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2018/09/2024-06-27_04-58-20.png 724w" sizes="(max-width: 300px) 100vw, 300px" /></a>The deployment of Carnivore was subject to strict legal guidelines and required a court order based on probable cause. The FBI had to demonstrate that the interception of communications was necessary for an ongoing investigation and that it would yield evidence of criminal activity. The court order specified the scope of the surveillance, including the types of communications to be intercepted and the duration of the surveillance.</p>
<p>Despite these legal safeguards, privacy advocates raised significant concerns about the potential for abuse and the broader implications for digital privacy. A key issue was the transparency and accountability of the Carnivore system. ISPs and privacy groups worried that the system could be used for more extensive monitoring than intended, potentially capturing the communications of individuals not under investigation.</p>
<p>In a letter to Congress, John E. Collingwood, Assistant Director of the FBI’s Office of Public and Congressional Affairs, emphasized that Carnivore was used &#8220;only when Internet Service Providers are unable on their own to restrict interceptions within the narrow confines of the controlling court order&#8221;​​. However, ISPs expressed doubts about their ability to verify that the FBI adhered strictly to these limitations once Carnivore was installed on their networks.</p>
<p>The reaction from the Internet industry was mixed. Some ISPs resisted the installation of Carnivore on their networks, citing concerns about the system&#8217;s impact on network performance and the privacy of their customers. In one notable case, EarthLink, a major ISP, refused to install Carnivore, arguing that it could cause disruptions to their service and compromise customer privacy​​.</p>
<p>EarthLink&#8217;s concerns were not isolated. The American Civil Liberties Union (ACLU) and other privacy organizations filed Freedom of Information Act (FOIA) requests to uncover more details about Carnivore’s technical capabilities and its use in investigations. The ACLU&#8217;s efforts aimed to obtain the source code of Carnivore, which would reveal the inner workings of the system and potentially confirm whether it could be used for broader surveillance than officially stated​​.</p>
<p>The controversy surrounding Carnivore led to calls for greater oversight and transparency in the deployment of digital surveillance tools. Critics argued that without independent verification of the system’s operations, there was no way to ensure that the FBI&#8217;s use of Carnivore was consistent with legal requirements and respected individual privacy rights.</p>
<p>In response to these concerns, the FBI conducted briefings with industry specialists and members of Congress to explain how Carnivore worked and the measures in place to prevent abuse. However, skepticism remained, and the debate over digital surveillance and privacy continued to evolve.</p>
<p>By circa 2005, it was reported that Carnivore had been replaced by more commercially available software​​. This shift indicated an evolution in the FBI&#8217;s approach to digital surveillance, moving away from proprietary systems like Carnivore to leveraging advancements in commercial technology.</p>
<p>Carnivore represented a significant development in law enforcement&#8217;s ability to monitor digital communications. While it provided a powerful tool for investigating and preventing criminal activity, it also raised critical questions about the balance between security and privacy in the digital age. As technology continues to advance and digital communication becomes even more integral to daily life, the need for clear legal frameworks and robust oversight mechanisms remains essential to protect civil liberties while enabling effective law enforcement.</p>
<p>In June of 2018, The Black Vault requested all FBI documents about the system. In July of 2018, the first release of records was received. In June of 2024, a second batch of records were released.</p>
<h3>Document Archive</h3>
<h4><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents2.theblackvault.com/documents/fbifiles/carnivore-fbi1.pdf">FBI Release #1 on CARNIVORE</a> <strong>&#8211; [608 Pages, 377MB] &#8211; Released July 2018</strong></h4>
<h4><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents3.theblackvault.com/documents/fbifiles/carnivore-fbi2.pdf">FBI Release #2 on CARNIVORE</a> <strong>&#8211; [468 Pages, 220MB] &#8211; </strong><strong>Released June 2024</strong></h4>
<h4><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents3.theblackvault.com/documents/fbifiles/carnivore-fbi3.pdf">FBI Release #3 on CARNIVORE</a> <strong>&#8211; [443 Pages, 265MB] &#8211; </strong><strong>Released August 2024</strong></h4>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p><p>The post <a href="https://www.theblackvault.com/documentarchive/carnivore-dcs1000-fbi-files-on-their-email-and-electronic-communication-monitoring-software/">CARNIVORE (DCS1000): FBI Files on Their Email and Electronic Communication Monitoring Software</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6478</post-id>	</item>
		<item>
		<title>NSA Surveillance Program: PRISM</title>
		<link>https://www.theblackvault.com/documentarchive/nsa-surveillance-program-prism/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=nsa-surveillance-program-prism</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Sun, 22 Nov 2020 02:31:08 +0000</pubDate>
				<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[prism]]></category>
		<category><![CDATA[surveillance]]></category>
		<guid isPermaLink="false">https://www.theblackvault.com/documentarchive/?p=12489</guid>

					<description><![CDATA[<p>Background PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD US-984XN. PRISM collects stored internet communications based on demands made to internet companies such as Google LLC under Section 702 of [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/nsa-surveillance-program-prism/">NSA Surveillance Program: PRISM</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD US-984XN. PRISM collects stored internet communications based on demands made to internet companies such as Google LLC under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. Among other things, the NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle.</p>
<p>PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration. The program is operated under the supervision of the U.S. Foreign Intelligence Surveillance Court (FISA Court, or FISC) pursuant to the Foreign Intelligence Surveillance Act (FISA). Its existence was leaked six years later by NSA contractor Edward Snowden, who warned that the extent of mass data collection was far greater than the public knew and included what he characterized as &#8220;dangerous&#8221; and &#8220;criminal&#8221; activities. The disclosures were published by The Guardian and The Washington Post on June 6, 2013. Subsequent documents have demonstrated a financial arrangement between the NSA&#8217;s Special Source Operations (SSO) division and PRISM partners in the millions of dollars.</p>
<p>Documents indicate that PRISM is &#8220;the number one source of raw intelligence used for NSA analytic reports&#8221;, and it accounts for 91% of the NSA&#8217;s internet traffic acquired under FISA section 702 authority.&#8221; The leaked information came after the revelation that the FISA Court had been ordering a subsidiary of telecommunications company Verizon Communications to turn over to the NSA logs tracking all of its customers&#8217; telephone calls.</p>
<p>U.S. government officials have disputed criticisms of PRISM in the Guardian and Washington Post articles and have defended the program, asserting that it cannot be used on domestic targets without a warrant, that it has helped to prevent acts of terrorism, and that it receives independent oversight from the federal government&#8217;s executive, judicial and legislative branches. On June 19, 2013, U.S. President Barack Obama, during a visit to Germany, stated that the NSA&#8217;s data gathering practices constitute &#8220;a circumscribed, narrow system directed at us being able to protect our people.&#8221;</p>
<h3>Document Archive</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents2.theblackvault.com/documents/nsa/MDR-107072.pdf">NSA Email: FOIAs for PRISM Information</a> [21 Pages, 5.5MB] &#8211; This was an attempt to get previously released records further redacted. In May of 2019, an MDR request was filed to get these e-mails reviewed. Sadly, this time, nothing new was uncovered.</p>
<div class="ead-preview"><div class="ead-document" style="position: relative;padding-top: 90%;"><div class="ead-iframe-wrapper"><iframe src="//docs.google.com/viewer?url=https%3A%2F%2Fdocuments2.theblackvault.com%2Fdocuments%2Fnsa%2FMDR-107072.pdf&amp;embedded=true&amp;hl=en" title="Embedded Document" class="ead-iframe" style="width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;"></iframe></div>			<div class="ead-document-loading" style="width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;">
				<div class="ead-loading-wrap">
					<div class="ead-loading-main">
						<div class="ead-loading">
							<img decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/loading.svg" width="55" height="55" alt="Loader">
							<span>Loading...</span>
						</div>
					</div>
					<div class="ead-loading-foot">
						<div class="ead-loading-foot-title">
							<img decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/EAD-logo.svg" alt="EAD Logo" width="36" height="23"/>
							<span>Taking too long?</span>
						</div>
						<p>
							<div class="ead-document-btn ead-reload-btn" role="button">
								<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/reload.svg" alt="Reload" width="12" height="12"/> Reload document							</div>
							<span>|</span>
							<a href="https://documents2.theblackvault.com/documents/nsa/MDR-107072.pdf" class="ead-document-btn" target="_blank">
								<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/open.svg" alt="Open" width="12" height="12"/> Open in new tab							</a>
					</div>
				</div>
			</div>
		</div><p class="embed_download"><a href="https://documents2.theblackvault.com/documents/nsa/MDR-107072.pdf" download>Download [5.58 MB] </a></p></div><p>&nbsp;</p><p>The post <a href="https://www.theblackvault.com/documentarchive/nsa-surveillance-program-prism/">NSA Surveillance Program: PRISM</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12489</post-id>	</item>
		<item>
		<title>NSA Surveillance Program: PROMIS</title>
		<link>https://www.theblackvault.com/documentarchive/nsa-surveillance-program-promis/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=nsa-surveillance-program-promis</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Mon, 29 Oct 2018 14:00:00 +0000</pubDate>
				<category><![CDATA[Controversies]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[National Security Agency (NSA) Collection]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[prism]]></category>
		<category><![CDATA[surveillance]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=826</guid>

					<description><![CDATA[<p>Background PROMIS is believed by some to be the forefunner to the now infamous &#8220;Prism&#8221; program by the National Security Agency (NSA).  The &#8220;Prism&#8221; program was brought to light by leaker Edward Snowden, yet it is now coming to light, that a program has existed long before this new revelation.  It was known as PROMIS. [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/nsa-surveillance-program-promis/">NSA Surveillance Program: PROMIS</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>PROMIS is believed by some to be the forefunner to the now infamous &#8220;Prism&#8221; program by the National Security Agency (NSA).  The &#8220;Prism&#8221; program was brought to light by leaker Edward Snowden, yet it is now coming to light, that a program has existed long before this new revelation.  It was known as PROMIS.</p>
<p>PROMIS is also the name for a Department of Justice computer software program.  In the mid-1970s, Inslaw, Inc., a small Washington D.C. software development company, created for the a highly efficient, people-tracking, computer program known as Prosecutor&#8217;s Management Information System (Promis). Inslaw&#8217;s principal owners, William Anthony Hamilton and his wife, Nancy Burke Hamilton, later sued the United States Government (acting as principal to the Department of Justice) for not complying with the terms of the Promis contract and for refusing to pay for an enhanced version of Promis once delivered. This allegation of software piracy led to three trials in separate federal courts and two congressional hearings.</p>
<p>The following article excerpt is used to best explain the program as connected to the NSA &#8211; while the FOIA documents follow below.</p>
<table border="1">
<tbody>
<tr>
<td>
<h3 class="entry-title" style="text-align: center;">PRISM’s Controversial Forerunner</h3>
<p>By Richard L. Fricker</p>
<p>Long before Edward Snowden’s claims or revelations that the National Security Agency and the Central Intelligence Agency were monitoring and tracking the Internet, cell phones, e-mails and any other electronic communication they could get their hands on using a program known as PRISM, there existed PROMIS [Prosecutors Management Information Systems].</p>
<p>PROMIS was designed in the late 1970s and ‘80s to bring Department of Justice criminal case management from the dark ages into the light of the computer age. In the spring of 1981, the Reagan Administration hailed PROMIS as one of law enforcements greatest assets. By 1983, PROMIS had morphed into the behemoth of intelligence gathering. It was not state of the art – it was the art.</p>
<p>Over the ensuing decades PROMIS is reported to have been used by the DOJ, CIA, NSA, and several foreign intelligence agencies including Israel’s Mossad. The ownership of PROMIS has been the subject of federal court hearings and a congressional investigation.</p>
<p>The capabilities of PROMIS as a data collection and tracking program have never been a secret. But the only discussion of PROMIS has been about theft and black-market sales. Neither the courts nor Congress have ever inquired as to privacy issues or the ethics of the program. There has been no rending of political robes as seen with the Snowden case. In fact, the function of PROMIS has been discussed in open court and various public arenas.</p>
<p>PROMIS is a tracking program with enhancements by Washington, DC-based Inslaw Inc., owned by Bill and Nancy Hamilton. PROMIS was developed under a Law Enforcement Assistance Administration [LEAA] grant. Bill Hamilton was employed by NSA for six years. He left the agency in 1966.</p>
<p>PROMIS was designed to track the vast amount of criminal cases piling up in DOJ offices across the country. Bill Hamilton, in an interview for this story, recounted, “It was always a tracking program. It was designed to keep track of cases in local U.S. Attorneys’ offices, which means street crimes, keep track of the scheduled events in court, what actually takes place, who’s there, witnesses, police officers, conclusions, convictions, acquittals, whatever.”</p>
<h5><em><a href="http://consortiumnews.com/2013/07/11/prisms-controversial-forerunner/" target="_blank" rel="noopener">Continue reading this article&#8230;</a></em></h5>
</td>
</tr>
</tbody>
</table>
<h3></h3>
<h3>The FOIA Documents</h3>
<h4>Department of Justice (DOJ)</h4>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/DOJ-OIP-INSLAW_1993.pdf">Report of Special Counsel Nicholas J. Bua to the Attorney General of the United States Regarding the Allegations of INSLAW, Inc., March 1993, and the 1994 DOJ Report on INSLAW/PROMIS matter, released by the Department of Justice (DOJ) Office of Information Policy (OIP)</a> [465 Pages, 11MB] &#8211; Special thanks to <a href="http://www.governmentattic.org/" target="_blank" rel="noopener">GovernmentAttic.org</a> for this record.</p>
<h4>National Security Agency (NSA)</h4>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents2.theblackvault.com/documents/nsa/75611B.pdf">NSA Documents Regarding PROMIS</a>, Released 4 October 2018 [17 Pages, 2.7MB] &#8211; In March of 2016, see below, the NSA required a $440 payment in order to continue to process my request on PROMIS. Although I did not respond, I was surprised to receive this in October of 2018. It appears that this is only part of what the NSA has on PROMIS, and additional records are still being processed. I will add them when they are released to me.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents2.theblackvault.com/documents/nsa/promis-75611c.pdf">NSA Documents Regarding PROMIS</a>, Released 22 October 2018 [85 Pages, 8MB] &#8211; This release includes the user&#8217;s manual of the PROMIS system, various memorandums and more. One document was withheld entirely and this, according to the NSA, is now the final release of information.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <strong>ARCHIVED (Read Above)</strong> <a href="https://documents.theblackvault.com/documents/nsa/nsa-promis.pdf">Letter regarding the NSA use of the PROMIS System</a> [4 Pages, 1.1MB] &#8211; The NSA did find a considerable amount of documents, however, they are requiring a payment of $440 for the release of the material.</p><p>The post <a href="https://www.theblackvault.com/documentarchive/nsa-surveillance-program-promis/">NSA Surveillance Program: PROMIS</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">826</post-id>	</item>
		<item>
		<title>FBI File on Tracing Telephone Calls &#8212; File #80-HQ-789</title>
		<link>https://www.theblackvault.com/documentarchive/fbi-file-on-tracing-telephone-calls-file-80-hq-789/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fbi-file-on-tracing-telephone-calls-file-80-hq-789</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Wed, 02 May 2018 03:55:48 +0000</pubDate>
				<category><![CDATA[Federal Bureau of Investigation (FBI) Collection]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[eavesdropping]]></category>
		<category><![CDATA[FBI Files]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[phone trace]]></category>
		<category><![CDATA[surveillance]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=5961</guid>

					<description><![CDATA[<p>Background The following FBI was requested in May of 2014. In December of 2016, it was released. It is believed this is the entire releasable portions of File #80-HQ-789 on &#8220;Tracing Telephone Calls.&#8221; The approximate dates of the files within range from the 1950s through the 1970s. Document Archive  FBI File on Tracing Telephone Calls &#8212; [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/fbi-file-on-tracing-telephone-calls-file-80-hq-789/">FBI File on Tracing Telephone Calls — File #80-HQ-789</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>The following FBI was requested in May of 2014. In December of 2016, it was released.</p>
<p>It is believed this is the entire releasable portions of File #80-HQ-789 on &#8220;Tracing Telephone Calls.&#8221;</p>
<p>The approximate dates of the files within range from the 1950s through the 1970s.</p>
<h3>Document Archive</h3>
<h4><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/fbifiles/80-HQ-789-TracingTelephoneCalls.pdf">FBI File on Tracing Telephone Calls &#8212; File #80-HQ-789</a> [496 Pages, 302MB]</h4><p>The post <a href="https://www.theblackvault.com/documentarchive/fbi-file-on-tracing-telephone-calls-file-80-hq-789/">FBI File on Tracing Telephone Calls — File #80-HQ-789</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5961</post-id>	</item>
	</channel>
</rss>
