FOIPA adventures

Rayzer Rayzer at riseup.net
Sat Jan 9 07:33:18 PST 2016


> 9585320EEAF81044F20D55030A035B11BECE81C785E6C933E4A8A131F6578107,
> 2c55e5e45edf713dc43475effe8813a60326a64d9ba3d2e39cb639b0f3b0ad10, or
> c97445f45cdef9f0d3e05e1e585fc297235b82b5be8ff3efca67c59852018192
but not

> 9585320EEAF81044F20D55030A035B11BECE81C785E6C933E4A8A131F6578109,
> 2c55e5e45edf713dc43475effe8813a60326a64d9ba3d2e39cb639b0f3b0ac10, or
> c97445f45cdef9f0d3e05e1e585fc297235b82b5be8ff3efca67c59852017192
...

.......

Giving away state secrets in FOIA requests... They HAVE a 'jacket' with
yo' name on it...

-- 
RR

"You might want to ask an expert about that - I just fiddled around
with mine until it worked..."



coderman wrote:
> first FOIA of the New Year!
> '''
> To Whom It May Concern:
>
> This is a request under the Freedom of Information Act. I hereby
> request the following records:
>
> Records associated with the suppression, coordination, or appraisal
> via third parties of vulnerabilities in Dual_EC and ANSI X9.31 in
> ScreenOS or Juniper OS, developed by Juniper Corporation in
> California, and reported to the Bureau as part of the Vulnerabilities
> Equities Process, or as part of National Security investigations
> facilitated by the Data Intercept Technology Unit within the Bureau
> (DITU). Passive decrypt enabling of Juniper ScreenOS may also be
> referred to as "VPN Decryption (CVE-2015-7756) in ScreenOS 6.2.0r15
> through 6.2.0r18 and 6.3.0r12 through 6.3.0r20". Time frame of
> responsive records search is during or after 2005, and before 2016.
> Specific identifying terms for search include changed values for X
> coordinates for Dual EC curve point Q of:
> 9585320EEAF81044F20D55030A035B11BECE81C785E6C933E4A8A131F6578107,
> 2c55e5e45edf713dc43475effe8813a60326a64d9ba3d2e39cb639b0f3b0ad10, or
> c97445f45cdef9f0d3e05e1e585fc297235b82b5be8ff3efca67c59852018192. Note
> that proper matching of these cryptographic curve point values may
> require marshaling to a packed binary representation. A search of
> primary record repositories as well as cross-references to these data
> stores is explicitly requested. Cross reference search is demanded for
> proper scope of responsive materials. Please include timeline for
> initial discovery with source of discovery, first operational use, and
> finally, date for vendor notification, if applicable. Please provide
> emails, memorandums of understanding, agreements, or legal orders
> directed to Juniper Corporation relevant to this request, if
> applicable. Please also review records associated with activities
> authorized by Executive Order 12,333, or Section 215 of the Patriot
> Act, or Section 702 of the Foreign Intelligence Surveillance Act
> Amendments Act (FAA), or any other applicable authority while
> processing this request. Records related to coordination with partner
> agencies, including NSA, and especially programs including MARINA,
> TRAFFICTHIEF, PINWHALE, BULLRUN, AMBULANT, APERIODIC, AUNTIE, ABEYANT,
> DICHOTOMY, DILEMMA, FIRSTDOWN, FORBIDDEN, FORBORNE, PAWLEYS, TAREX,
> PENDLETON, PAINTEDEAGLE, PAWNSHOP, PERKYAUTUMN, PICAROON, PICARESQUE,
> PIEDMONT, PITCHFORD, PLACEBO, POMPANO, or PRESSURETWIN for explicit
> search of responsive materials. Note that some of these ECI Coverterms
> may be germane to NSA or CIA elements only; explicit resolution into
> current terms, if necessary, is requested. See
> https://robert.sesek.com/2014/9/unraveling_nsa_s_turbulence_programs.html
> for additional context regarding bulk decryption activities relevant
> to records sought in this request. Thank you!
> '''
>  - https://www.muckrock.com/foi/united-states-of-america-10/prunedkipperos-23339/
>
> :P
>
>
> best regards,
>


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: OpenPGP digital signature
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20160109/007f27ac/attachment-0002.sig>


More information about the cypherpunks mailing list