Filed Friday afternoon
UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW MEXICO William H. Payne ) Arthur R. Morales ) ) Plaintiffs, ) ) v ) CIV NO 97 0266 ) SC/DJS ) Lieutenant General Kenneth A. Minihan, USAF ) Director, National Security Agency ) National Security Agency ) ) Defendant ) PLAINTIFFS' MOTION FOR SUMMARY JUDGMENT ON BASED ON EVIDENCE FROM ADMISSIONS 1 COMES NOW plaintiffs Payne [Payne] and Morales [Morales] [Plaintiffs], pro se litigants to exercise their rights guaranteed under the Constitution and Federal Rules of Civil Procedure. As the court may know, Rule 26 (b)(1) Parties may obtain discovery regarding any mater, not privileged, which is relevant to the subject matter involved in the pending action, whether it relates to the claim or defense of the party seeking discovery or to the claim or defense of any other party, including the existence, description, nature, custody, condition, and LOCATION of any books documents, or other tangible thing and the identity and location of persons have knowledge of any discoverable matter. Rule 36 states, Request for admission (a) A party may serve upon any other party a written request for the admission, for the purposes of the pending action only, of the truth of any matters within the scope of Rule 26(b) set forth the request that relate to statements or opinions of fact or of the application of law to fact including the genuineness of any documents described in the request. Copies of documents shall be served with the request unless they have been or otherwise furnished or made available for inspection and copying. The request may WITHOUT LEAVE OF THE COURT, be served upon the plaintiff after commencement of the action and upon any other party with or after service of the summons and complaint upon that party. ... Plaintiffs capitalize WITHOUT LEAVE OF THE COURT. 2 Rule 36 states, {T]he matter IS ADMITTED unless, within 30 days after service of the request, or with such shorter or longer time as the court may allow, the party to whom the request is directed serves upon the party requesting the admission a written answer or objection address to the matter signed by the party or by the party's attorney, ... Plaintiffs capitalize IS ADMITTED. 3 PLAINTIFFS' FIRST SET OF REQUEST FOR ADMISSION TO NSA DIRECTOR KENNETH MINIHAN were served I HEREBY CERTIFY that a copy of the foregoing request for admissions was mailed to Jan Elizabeth Mitchell, Assistant US Attorney, 525 Silver SW, ABQ, NM 87102 this Monday November 3, 1997. More than 30 days elapsed and Plaintiff's have received no response from Minihan or Mitchell. Therefore, Minihan ADMITS 1 NSA is involved in 'spiking' [modifying the advertised intended functions] electronic equipment. 2 NSA 'spiked' Iranian and Libyan cryptographic units so that the cryptographic key was transmitted with the cipher text. 3 Iranian messages were given to Iraq during the Iran/Iraq war. 4 NSA was involved in the conviction, by giving contents of secret messages, of Ali Vakili-Rad and Masour Hendi to the Court in Paris in the trial for the stabbing death of Shapour Baktiar. 5 Minihan knows where copies of intercepted messages are kept at NSA. 4 Requests for First set of Admission were mailed October 13, 1997. More than 30 days has elapsed. No response from lawyer Mitchell or respondents were received by Plaintiffs. Therefore, NSA employee Brian Snow ADMITS 1 He designed the cryptographic algorithm for the Missile Secure Cryptographic Unit (MSCU). 2 NSA funded the MSCU at Sandia labs. 3 In about 1983 he gave a presentation at NSA FANX building to some Sandians involved with the Missile Secure Cryptographic Unit. 4 In the presentation he showed electronic schematics of the units to the Sandians. 5 He told the Sandians about the electronic and operational problems NSA had with the cryptographic units he bought with him. 6 He told the Sandians that one of the cryptographic units failed in the Moscow embassy and transmitted clear text. 7 He concluded his talk telling the Sandians that NSA had no operational failures once NSA went to dual redundant cryptographic units. 8 He told the Sandians not to ask for a theoretical reason why dual redundant cryptographics never failed, in the sense of releasing classified data, but that this was based on practical experience. 9 William H. Payne was one of the Sandians in the audience of his talk. 10 He sat across the table from William H. Payne at lunch in the cafeteria in the basement of the FANX building directly after his talk. 11 He was involved in algorithms associated with the Clipper project. 12 He where the documents specifying the MSCU algorithm are located at NSA. 13 He knows where the documents specifying algorithms associated with the Clipper project are located at NSA. NSA employee Thomas White ADMITS 15 He served as the liaison between NSA and Sandia for the Deployable Seismic Verification System. 16 He forwarded documents such as NSA's Orange book and the public key Firefly chip to Sandia. 17 He told Bill Payne that NSA regarded former president Ronald Reagan as one of the US's greatest traitors. 18 He told Bill Payne that the reasons NSA regarded Ronald Reagan as one of the US's greatest traitors is that Reagan, on TV announced to the world that the US was reading Libyan communications. 19 He Bill Payne that the following day [after Reagan's TV announcement] NSA could no longer read Libyan communications. 20 He knows where the documents specifying Benincasa's correction to the original USO seismic data authentication algorithm are located at NSA. NSA employee Mark Unkenholtz ADMITS 21 He visited Sandia in about 1986-87 with R division employee Ed Georgio to discuss which data authentication algorithm should be used for the US/USSR deployable seismic verification system (DSVS). 22 He and Bill Payne discussed using public key for the DSVS system. 23 He concluded that there were too many problems with public key so it was best to continue using the old Benincasa USO (unmanned seismic observatory) algorithm. 24 In 1989 he and others asked Bill Payne to write a memorandum to NSA deputy director James J. Hearn requesting help from NSA to develop new data authentication algorithms. 25 He did this is because R division needed a letter of support for more funding. 26 The DRAFT letter he asked Payne to write is seen on Internet at jya.com, click cryptome, catch the thread at August 29, 1997, SANDIA REPORT, SAND91-2201 UC 706, Data Authentication for the Deployable Seismic Verification System, Appendix T, Benincasa's Algorithm Deficiencies. 27 He asked Payne to fax the DRAFT letter to his fiancee, Amy Johnston, since NSA did not have fax for unclassified work readily available to use. 28 The "To Mark and Ed, R" on page 183 of SAND91-2201 UC 706 addressed him and his boss boss at the time, Ed Donohue. 29 He told Payne that NSA takes about a year to evaluate an encryption/authentication algorithm before it can be distributed for use. 30 He told Payne, in a response to a question from Payne, that NSA runs crypto algorithms through statistical tests. 31 After Payne wrote the Appendix T memorandum, NSA sent a delegation to Sandia. 32 He and NSA employee Scott Judy designed a replacement algorithm for Beninicasa's USO algorithm. 33 The replacement algorithm was code named GRANITE. 34 The GRANITE design addressed some of the deficiencies in Benincasa's algorithm enumerated in Payne's Appendix T June 21, 1989 DRAFT letter to Hearn. 35 The GRANITE design addressed some of the deficiencies in Benincasa's algorithm enumerated in Payne's Appendix T June 21, 1989 DRAFT letter to Hearn. 36 He knows where the documents specifying Benincasa's to the original USO seismic data authentication algorithm are located at NSA. 37 He knows where the documents specifying his and Judy's GRANITE algorithm are located at NSA. NSA employee Scott Judy ADMITS 38 He met Payne at Sandia sometime after he wrote the DRAFT letter on Internet at jya.com, click cryptome, catch the thread at August 29, 1997, SANDIA REPORT, SAND91-2201 UC 706, Data Authentication for the Deployable Seismic Verification System, Appendix T, Benincasa's Algorithm Deficiencies. 39 He later met Payne again at NSA in a meeting. 40 He told Payne that NSA bases its cryptographer algorithm on principles other than mathematics. 41 He and NSA employee Mark Unkenholtz designed a replacement algorithm for Beninicasa's USO algorithm. 42 His replacement algorithm was code named GRANITE. 43 GRANITE design addressed some of the deficiencies in Benincasa's algorithm enumerated in Payne's Appendix T June 21, 1989 DRAFT letter to Hearn. 44 The number stepping on the internal registers of GRANITE was decreased in response to deficiency 2 enumerated in the June 21, 1989 letter to Hern. 45 He knows where the documents specifying Benincasa's correction to the original USO seismic data authentication algorithm are located at NSA. 46 He knows where the documents specifying his and Unkenholtz's GRANITE algorithm are located at NSA. NSA employee Edward Donohue ADMITS 47 He met Payne at Sandia sometime after he wrote the DRAFT letter on Internet at jya.com, click cryptome, catch the thread at August 29, 1997, SANDIA REPORT, SAND91-2201 UC 706, Data Authentication for the Deployable Seismic Verification System, Appendix T, Benincasa's Algorithm Deficiencies. 48 He was head of NSA's R division cryptographic algorithms division in 1989. 49 He knows where 1 Benincasa's original NSS/USO algorithm, 2 Benincasa's revision of 1, 3 The Unkenholtz - Judy GRANITE algorithm, 4 Brian Snow's MSCU algorithm, 5 the clipper algorithms, 6 the STU III algorithms. written specifications are located at NSA. NSA employee Paul Bridge ADMITS 50 He assumed liaison control from NSA employee Tom White for the US/USSR seismic data authenticator. 51 He placed a copy of WORKING AGREEMENT BETWEEN SANDIA NATIONAL LABORATORIES AND THE NATIONAL SECURITY AGENCY CONCERNING RESEARCH IN CRYPTOGRAPHY AT SANDIA NATIONAL LABORATORY Sandia National Laboratories (SNL) and the National Security Agency (NSA) have established a working relationship which has gown substantially over the last decade. Currently, there exist several joint project areas of mutual interest. Different policies and administrative procedure exist at SNL and NSA which govern the handling of sensitive and classified material, and the documentation and dissemination of such work. It is the purpose of the Agreement to specify the general guidelines under which work will be administered in the area of cryptography research at SNL. First, SNL, in its role as systems integrator, requires and indigenous cryptographic capability to support its Department of Energy mission in the design and development of safe and secure nuclear weapons and in treaty verification. SNL and NSA agree to a cooperative effort to support SNL's needs in a manner consistent with the role of such work to national security. Second, NSA, in its role as the U.S. Government approval authority for cryptographic systems developed for and used in national security applications, recognizes its responsibility to provide support and guidance to SNL's activities in applying cryptography. Third, SNL will regard cryptographic research work as classified when it is initiated or created, i.e., will protect such work as "created classified", and will consult with NSA prior to handling such work as unclassified. Periodic technical and managerial discussions between SNL and NSA will be held to increase the awareness of the security concerns of both organizations and to develop and maintain an SNL cryptographic classification guide which will protect the national security interests of both organizations. This working agreement shall be effective on the date of the last signature and will be reviewed annually by SNL and NSA. It will be valid until terminated by mutual agreement. AGREED: ALBERT NARATH RADM JAMES S. MCFARLAND (USN) President Plans and Policy TITLE TITLE SANDIA NATIONAL NATIONAL SECURITY AGENCY LABORATORIES June 10, 1991 22 July 1991 DATE DATE which is now seen on Internet at jya.com, click cryptome, catch the thread at August 29, 1997. 52 His purpose of giving Payne a copy of the Narath/MacFarland agreement an attempt to threaten Payne. 53 He told Payne that Sandia must regard the US/USSR Deployable Seismic Verification System (DSVS) authenticator as classified and get permission from NSA to place the unit in the field. 54 He told Payne that Sandia must have the DSVS authenticator TEMPEST tested . 55 He agrees Payne responded to him that the previous unit had already passed TEMPEST testing and that Payne's Sandia project leader, H. B. [Jim] Durham, did not want to spend the money to repeat the testing. 56 He told Payne that NSA should be getting the capability to build cryptographic devices. NSA employee Rick Proto ADMITS 57 He and group of other NSA employees met Sandians H. B. Durham, Ron Moya, and William Payne at NSA at Fort George G. Meade in about 1986 to discuss, in part, implementation of the Deployable Seismic Verification System data authenticator. 58 He and other NSA employees directed that the NSA Unmanned Seismic Observatory data authenticator algorithm designed by NSA employee Ronald Benincasa be implemented entirely in hardware. 59 He and the other NSA employees at the meeting, directed that the data authenticator be enclosed in a TEMPEST enclosure. Sandians expressed objection to the TEMPEST enclosure in that the authenticator was housed in a steel tube buried about 100 meters beneath ground surface. 60 He agrees that he and NSA employee Robert Morris met with Sandia cryptographer G. J. Simmons when Simmons asked them both the two questions: 1 NSA is sorry it delegated cryptographic implementation responsibility to Sandia for nuclear weapons; 2 NSA is trying to take back this responsibility? 61 He and/or Morris refuse to respond to Simmons' above question. Retired Sandia Employee Gustavus J Simmons ADMITS 62 He with Sandia Paul Stokes designed a data authentication algorithm for seismic treaty verifications in the early 1970s. 63 He and Stokes either patented, tried to patent, or contemplated patenting their authentication algorithm. 64 NSA, when we presented their seismic data authentication algorithm to the Agency, rejected its use. 65 He know that NSA gave Sandia the data authentication algorithm designed by NSA employee Ronald Benincasa to use in seismic verification rather than use your and Stokes algorithm. 66 He feels that the algorithm that he and Stokes proposed is as good or better than Benincasa's algorithm. 67 He feels that NSA demanding Sandia use Benincasa's algorithm could be a case of Not-invented-here as opposed to technical advantages over his and Stokes algorithm. 68 In about 1986 he gave a presentation in Sandia spook-shop building 868 to promote the use of public key cryptography for use in the Deployable Seismic Verification System. 69 No one, until he received a copy of Payne's technical report in 1992, SANDIA REPORT, SAND91-2201 UC 706, Data Authentication for the Deployable Seismic Verification System told him what algorithm and authentication technology was used. 70 He asked NSA employees Rick Proto and Robert Morris to the effect, 1 NSA is sorry it delegated cryptographic implementation responsibility to Sandia for nuclear weapons; 2 NSA is trying to take back this responsibility. 71 Proto or Morris did not answer his questions. 72 He retired before he planned from Sandia Labs. 73 He felt that NSA exerted some pressure on Sandia to have him retire. 74 He told William Payne on the phone that he was forced into early retirement as a result of NSA pressures. 75 He felt that some NSA algorithms do not are properly classifiable. 76 He felt that NSA abuses classification with regard to cryptography. 77 He feels that cryptography, by its 'slippery math' basis, is difficult, if not impossible, to regulate. Sandia employee D. Jerry Allen ADMITS 78 He was a supervisor Sandia's weapons components department. 79 NSA has responsibility for furnished Sandia the cryptographic algorithms and approving the implementation technology which went into the electronic locks in the US nuclear arsenal. 80 He told William Payne in about 1991-92 that it cost $300,000 per nuclear bomb to recall bombs to Pantex to remove and repair Sandia's failing semiconductor chips. Sandia employee Ronald Kulju ADMITS 81 He worked in Sandia weapons components department in about 1986/7. 82 He was working on a project which involved use of the Cylink corporation CY 1024 public key cryptography semiconductor chip. 82 He made an agreement in about 1986/7 with Payne. He would design the hardware oscillator for the CY 1024 if Payne would try to get CY 1024 to communicate with an 80c51 microcontroller using synchronous Mode 0 communications. 83 He told Payne that Sandia's public key cryptography chips did not get the same answers as the CY 1024. 84 He told Payne that NSA and Sandia was in the process of removing the public key cryptography from weapons systems. 4 Admissions reveal that NSA employees KNOW where the lawfully requested documents reside. And that NSA has EMBARRASSING problems with its cryptographic algorithms. 5 Rule 56 states. Summary Judgment states, The judgment sought shall be rendered forthwith if the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is NO GENUINE ISSUE AS TO ANY MATERIAL FACT and that the moving party is entitled to judgment as a matter of law. Plaintiffs capitalize NO GENUINE ISSUE AS TO ANY MATERIAL FACT. Admissions attest to the contention that there are NO GENUINE ISSUE AS TO ANY MATERIAL FACT. WHEREFORE, 6 Replace judges Svet and Campos because these judges have demonstrated, IN WRITING, they do not follow the Federal Rules of Civil Procedure. 7 Award Plaintiffs motion for summary judgment as a matter of law based on admissions. 8 Have replacement judges ORDER Defendant to produce immediately produce documents in machine-readable format for publication on Internet. In preparation for settlement of this unfortunate bungled spy sting. And analysis of 'deficient' NSA cryptographic algorithm work designed to get the US government out of the cryptography business. 9 grant such other relief as the Court may deem just and proper. Respectfully submitted, _________________________ William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 _________________________ Arthur R. Morales 1024 Los Arboles NW Albuquerque, NM 87107 Pro se litigants CERTIFICATE OF SERVICE I HEREBY CERTIFY that a copy of the foregoing memorandum was mailed to Lieutenant General Kenneth A. Minihan, USAF, Director, National Security Agency, National Security Agency, 9800 Savage Road, Fort George G. Meade, MD 20755-6000 and hand delivered to Jan E Mitchell, Assistant US Attorney, 525 Silver SW, ABQ, NM 87102 this Monday December 22, 1997. 13
participants (1)
-
bill payne