NSA Global SIGINT Power to Generate Profits and Pay
John Young
jya@pipeline.com
Sat Nov 23 09:08:43 PST 2013
The NSA SIGINT Strategy 2012-2016 pretty well covers all the
comsec and crypto initiatives to covertly exploit people, cryptographers,
anonymizers, informants, planted spies, security firms, networks,
governments, nations, friends, lovers and citizens.
Not sure leaks, lawsuits and protests will deter this bounty of
profits for the comsec industry, unless the public is aroused to
demand the 3 branches grasp the nettle, and all those making
money from this deception operation decide to give up their
profits, perks and prestige.
I mean those on the comsec and crypto lists, those participating
in standards committees, those enjoying contracts and grants in
think tanks and universities, those in law firms and public interest
orgs, those in the media and academia, those in non-spy gov agencies,
pretending to be in opposition as they scramble to rejigger their
products and sales pitches, to exploit what is being fabricated
to diminish Snowden's revelations with new forms of secrecy,
technology, law, regulations, bribery, lobbying, grants, contracts,
list lurking, online and offline spying, break-ins, the usual kaboodle,
to assure the NSA goals are fulfilled.
http://cryptome.org/2013/11/nsa-sigint-strategy-2012-2016.pdf
[Excerpt]
SIGINT Goals for 2012-2016
1. (U//FOUO) Revolutionize analysis fundamentally shift our analytic
approach from a production to a discovery bias, enriched by
innovative customer/partner engagement, radically increasing
operational impact across all mission domains.
1.1. (U//FOUO) Through advanced tradecraft and automation,
dramatically increase mastery of the global network
1.2. (U//FOUO) Conduct original analysis in a collaborative
information space that mirrors how people interact in the information age
1.3. (U//FOUO) Disseminate data at its first point of relevance,
share bulk data, and enable customers to address niche requirements
1.4. (U//FOUO) Drive an agile technology base mapped to the cognitive
processes that underpin large scale analysis, discovery, compliance
and collaboration
2. (U//FOUO) Fully leverage internal and external NSA partnerships to
collaboratively discover targets, find their vulnerabilities, and
overcome their network/communication defenses.
2.1. (U//FOUO) Bolster our arsenal of capabilities against the most
critical cryptanalytic challenges 2.1.1. (S//SI//REL) Employ
multidisciplinary approaches to cryptanalytic problems, leveraging
and integrating mid-point and end-point capabilities to enable cryptanalysis
2.1.2. (S//REL) Counter the challenge of ubiquitous, strong,
commercial network encryption
2.1.3. (TS//SI//REL) Counter indigenous cryptographic programs by
targeting their industrial bases with all available SIGINT and HUMINT
capabilities
2.1.4. (TS//SI//REL) Influence the global commercial encryption
market through commercial relationships, HUMINT, and second and third
party partners
2.1.5. (S//SI//REL) Continue to invest in the industrial base and
drive the state of the art for High Performance Computing to maintain
pre-eminent cryptanalytic capability for the nation
2.2. (TS//SI//REL) Defeat adversary cybersecurity practices in order
to acquire the SIGINT data we need from anyone, anytime, anywhere
2.3. (S//SI) Enable discovery capabilities and advanced tradecraft in
the collection architecture to enable the discovery of
mission-critical persona, networks, accesses, signals and technologies
2.4. (S//SI) Integrate capabilities into the mission architecture,
deepen workforce skill base in advanced network and signals analysis,
and optimize processes and policies for the benefit of discovery
3. (S//SI//REL) Dynamically integrate endpoint, midpoint,
industrial-enabled, and cryptanalytic capabilities to reach
previously inaccessible targets in support of exploitation, cyber
defense, and cyber operations
3.1. (C//REL) Drive the SIGINT mission architecture to underpin
synchronized, integrated, multi-capability operations, extending it
to mission partners
3.2. (TS//SI//REL) Integrate the SIGINT system into a national
network of sensors which interactively sense, respond, and alert one
another at machine speed
3.3. (U//FOUO) Continuously rebalance our portfolio of accesses and
access capabilities based on current and projected contributions to
key SIGINT missions
3.4. (S//SI//REL) Identify new access, collection, and exploitation
methods by leveraging global business trends in data and
communications services
[End excerpt]
More information about the cypherpunks
mailing list