[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Al Haig and Secure Communictions
-----BEGIN PGP SIGNED MESSAGE-----
About two weeks ago while making a point about the
absurdity of taking government on its word, I mentioned an
incident involving then Secretary of State Al Haig.
Specifically the point was in reply to Mr. Sternlight's
assertion that because a public relations official for the
NSA had made statements regarding the Data Encryption
Escrow plan's harmless nature and the equally harmless and
benign character of the NSA's paternal hand, they were
unquestionably authentic and complete.
Among other points, I indicated that there was significant
reason to doubt bald assertions made by government
officials, especially in a public relations capacity. One
of the examples I used relied on the events following the
attempted assassination of President Reagan, (who's name I
then spelled incorrectly).
Specifically I noted that Secretary of State Haig appeared
before the press and announced (in some form or another)
that he was in charge. The implication in my statement was
that Secretary Haig was not in charge at all, and that
relying on government to operate by its own rules, even
with the scrutiny of the press is silly.
An irate Haig supporter, who also defended the President's
name (by correcting my spelling error anyhow) insisted that
this event was a big fabrication by the press and that
indeed Secretary Haig was in authority in some way or
another. He insisted the press had blown the issue out of
proportion.
I was forced out of town for some time, and was unable to
reply immediately. I bring up the point now to clarify my
information, and to tie in some interesting concerns
regarding secure communications and operations in a
Emergency.
Secretary of State Al Haig was not next in line for either
succession stream, and his asserting so in the national
media was a gross error.
The relevant authorities are the Department of Defense
Directive 5100.30 (1971) and the Constitution of the United
States.
The first sixteen successors in the Presidential line of
succession are:
1. The Vice President
2. Speaker of the House of Representatives
3. President pro tempore of the Senate
4. Secretary of State
5. Secretary of the Treasury
6. Secretary of Defense
7. The Attorney General
8. Secretary of the Interior
9. Secretary of Agriculture
10. Secretary of Commerce
11. Secretary of Labor
12. Secretary of Health and Human Services
13. Secretary of Housing and Urban Development
14. Secretary of Transportation
15. Secretary of Energy
16. Secretary of Education.
The national command authority line kicks in when the
President and his/her successors are dead or cannot be
located and immediate U.S. military decisions must be made:
1. Secretary of Defense
2. Deputy Secretary of Defense
3. Secretary of the Army
4. Secretary of the Navy
5. Secretary of the Air Force
6. Under Secretary of Defense for Policy
7. Under Secretary of Defense for Research and Engineering
A plethora of the Assistant Secretaries of Defense and
General Council to the Defense Department in order of their
lengths of service.
etc.
When President Reagan was injured, and the Vice President
(George Bush at the time) was out of town, the successor to
the Presidency was the Speaker of the House, Tip O'Neill.
The Secretary of State was two more rungs down the ladder.
The Secretary of State appears nowhere in the command
authority side of succession. Casper Weinberger was the
then Secretary of Defense and next in line there. Al
Haig's source of sovereignty? Control of the national
media? Perhaps that's a touch conspiracy oriented, but how
does the proper authority convince the citizenry that he or
she should be followed when another authority figure is
effectively seizing the reigns? Herein lies the stuff of
constitutional crisis.
It is the responsibility of the Federal Emergency
Management Agency to keep track of the Presidency and the
line of succession. The question becomes, if a figure
claims authority how is this verified, and enforced?
Former FEMA director Giuffrida:
"One of the things we discovered is there was no
authentication system.... if [someone] got on the horn and
said, 'I'm the successor,' and somebody said 'prove it,'
[no one could]."
Of course this was some time ago, but how much things have
changed is a real question.
It seems to me that the Unites States has never recognized
the potential problems that national crises may cause. I
cite a particularly interesting tale that might be amusing
if it were not so alarming.
On the presidential emergency evacuation procedures from
National Security Advisor Brzenzinski's Memoirs:
I called in the person responsible for evacuating the
President in the event of a crisis. I obtained a detailed
account on how long it actually would take to evacuate the
President by helicopter.... I ordered him to run a
simulated evacuation right now, turning on my stopwatch.
The poor fellow's eyes...practically popped: He looked so
surprised. He said, "Right now?" And I said "Yes, right
now." He reached for the phone and could hardly speak
coherently when he demanded that the helicopter immediately
come for a drill. I took one of the secretaries along to
simulate the First Lady and we proceeded to the South Lawn
to wait for the helicopter to arrive. It took roughly two
and a half times longer to arrive as it was supposed to.
We then flew to a special site from where another
evacuation procedure would be followed. To make a long
story short, the whole thing took roughly twice as long as
it should have. Moreover, on returning we found that the
drill somehow did not take into account the protective
services and we were almost shot down.
There have been significant changes in technology no doubt
since the Carter Administration. For one thing fiber
optics seem to present some resistance to EMP effects that
before threatened normal lines of communication, but how
have authentication methods changed? It seems to me that
there are great potentials for advance in authority
authentication with new technologies not limited to and
newer than public key cryptography. On the other hand it
seems the United States culture of vulnerability, justified
by theories of Mutually Assured Destruction or budgeting
concerns, is so strong that such advances would never take
hold in a meaningful way. Can you see a reporter in the
famed President Haig press conference asking:
"Excuse me Secretary Haig, may we examine your FEMA signed
authority key?"
- -uni- (Dark)
-----BEGIN PGP SIGNATURE-----
Version: 2.3
iQCVAgUBLaI9HxibHbaiMfO5AQEBZgP/fZaGM/WG4sgJuqmmn/uBgLIoUzn9bBe1
CDaOUYzCvyssFWp23qIqXZMgKVorxQXIObbKORFSfG2Nj+n3gcyKF2oRUtrbqmsT
oam6h+wABTpawNt2Kc3P0MwwX9QyHK/afPNpuztwCntdvCOmXd3YHybQ5dLHAk5d
ku9cQlHjMBo=
=Qz+l
-----END PGP SIGNATURE-----