>From - Sat Mar 02 00:57:21 2024
Received: by 10.35.9.2 with SMTP id m2mr2993014pyi;
Mon, 04 Sep 2006 13:52:56 -0700 (PDT)
Return-Path: <kon..._at_phreaker.net>
Received: from smtp-out.hotpop.com (smtp-out.hotpop.com [38.113.3.61])
by mx.googlegroups.com with ESMTP id c21si811352pyc.2006.09.04.13.52.56;
Mon, 04 Sep 2006 13:52:56 -0700 (PDT)
Received-SPF: neutral (googlegroups.com: 38.113.3.61 is neither permitted nor denied by best guess record for domain of kon..._at_phreaker.net)
Received: from phreaker.net (kubrick.hotpop.com [38.113.3.105])
by smtp-out.hotpop.com (Postfix) with SMTP id 6B74F4BACD04
for <TSCM-..._at_googlegroups.com>; Mon, 4 Sep 2006 20:48:52 +0000 (UTC)
Received: from router_4.phreaker.net (niagara-cuda1-24-52-121-144.kntnny.adelphia.net [24.52.121.144])
by smtp-1.hotpop.com (Postfix) with ESMTP id E83B61482B4
for <TSCM-..._at_googlegroups.com>; Mon, 4 Sep 2006 20:48:46 +0000 (UTC)
Message-Id: <7.0.1.0.2.20060904164556.03b2e9a0_at_phreaker.net>
X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0
Date: Mon, 04 Sep 2006 16:48:52 -0400
To: TSCM-L2006_at_googlegroups.com
From: kondrak <kon..._at_phreaker.net>
Subject: Fwd: [TSCM-L] NSA Retention and Collection of Crypto Data
Mime-Version: 1.0
Content-Type: multipart/alternative;
boundary="=====================_152634296==.ALT"
X-HotPOP: -----------------------------------------------
Sent By HotPOP.com FREE Email
Get your FREE POP email at www.HotPOP.com
-----------------------------------------------
--=====================_152634296==.ALT
Content-Type: text/plain
You notice how each following paragraph negates the previous one, or
expands till they can do whatever they want for as long and to whom
for whatever reason?
A dose of bureaucratic bullshit with NO actual meaning or protections
if I ever saw one. Pitu!
>Cryptome received via FOIA from NSA this weekend a procedures
>document for COMINT affecting US persons, dated March 2004, which
>mentions retention and collection of crypto-related data:
>
>
>http://cryptome.org/nsa-css-1-23.htm
>
>[Excerpt 1]
>
>2. Retention
>
>(S/SI) Foreign communications of, or concerning, United States persons that
>are
>intercepted by the United States Signals Intelligence System may be retained
>in their original form or as transcribed only:
>
> (a) if processed so as to eliminate any reference to United States persons;
>
> (b) if necessary to the maintenance of technical data bases. Retention for
> this purpose is permitted for a period sufficient to allow a thorough
> exploitation and to permit access to data that are, or are reasonably
>believed
> likely to become, relevant to a current or future intelligent requirement.
> Sufficient duration may vary with the nature of the exploitation. In the
> context of a cryptanalytic effort, sufficient duration may consist of a
>period
> of time during which encrypted material is subject to, or of use in,
> cryptanalysis. In the case of international commercial communications that
> may contain the identity of United States persons and that are not
>enciphered
> or otherwise thought to contain secret meaning, sufficient duration is one
> year unless the Deputy Director for Operations, National Security Agency,
> determines in writing that retention for a longer period is required to
>respond
> to authorized foreign intelligence or counterintelligence requirements; or
>
>[End excerpt 1]
>
>[Excerpt 2]
>
>D. (C) Signals Intelligence: Search and Development.
>
>The United States Signals Intelligence System may conduct search and
>development activities with respect to signals throughout the radio spectrum
>under the following limitations:
>
>1. Collection. Signals may be collected only for the purpose of identifying
>those
>signals that:
>
> (a) may contain information related to the production of foreign
>intelligence
> or counterintelligence;
>
> (b) are enciphered or appear to contain secret meaning;
>
> (c) are necessary to ensure efficient signals intelligence collection or
> to avoid the collection of unwanted signals; or
>
> (d) reveal vulnerability of United States communications security.
>
>[End excerpt 2]
>
>
>
>
>
--=====================_152634296==.ALT
Content-Type: text/html
<html>
<body>
<font size=3>You notice how each following paragraph negates the previous
one, or expands till they can do whatever they want for as long and to
whom for whatever reason?<br>
A dose of bureaucratic bullshit with NO actual meaning or protections if
I ever saw one. Pitu!<br><br>
<br><br>
<br>
<blockquote type=cite class=cite cite="">Cryptome received via FOIA from
NSA this weekend a procedures <br>
document for COMINT affecting US persons, dated March 2004, which <br>
mentions retention and collection of crypto-related data:<br><br>
<br>
<a href="
http://cryptome.org/nsa-css-1-23.htm" eudora="autourl">
http://cryptome.org/nsa-css-1-23.htm</a><br><br>
[Excerpt 1]<br><br>
2. Retention<br><br>
(S/SI) Foreign communications of, or concerning, United States persons
that<br>
are <br>
intercepted by the United States Signals Intelligence System may be
retained <br>
in their original form or as transcribed only:<br><br>
(a) if processed so as to eliminate any reference to United States
persons;<br><br>
(b) if necessary to the maintenance of technical data bases.
Retention for<br>
this purpose is permitted for a period sufficient to allow a
thorough<br>
exploitation and to permit access to data that are, or are
reasonably<br>
believed<br>
likely to become, relevant to a current or future intelligent
requirement.<br>
Sufficient duration may vary with the nature of the exploitation.
In the<br>
context of a cryptanalytic effort, sufficient duration may consist
of a<br>
period<br>
of time during which encrypted material is subject to, or of use
in,<br>
cryptanalysis. In the case of international commercial
communications that<br>
may contain the identity of United States persons and that are
not<br>
enciphered<br>
or otherwise thought to contain secret meaning, sufficient
duration is one<br>
year unless the Deputy Director for Operations, National Security
Agency,<br>
determines in writing that retention for a longer period is
required to<br>
respond<br>
to authorized foreign intelligence or counterintelligence
requirements; or<br><br>
[End excerpt 1]<br><br>
[Excerpt 2]<br><br>
D. (C) Signals Intelligence: Search and Development.<br><br>
The United States Signals Intelligence System may conduct search and
<br>
development activities with respect to signals throughout the radio
spectrum <br>
under the following limitations:<br><br>
1. Collection. Signals may be collected only for the purpose of
identifying<br>
those <br>
signals that:<br><br>
(a) may contain information related to the production of
foreign<br>
intelligence<br>
or counterintelligence;<br><br>
(b) are enciphered or appear to contain secret meaning;<br><br>
(c) are necessary to ensure efficient signals intelligence
collection or<br>
to avoid the collection of unwanted signals; or<br><br>
(d) reveal vulnerability of United States communications
security.<br><br>
[End excerpt 2]<br><br>
<br><br>
<br>
</body>
</html>
--=====================_152634296==.ALT--
Received on Sat Mar 02 2024 - 00:57:21 CST