A Typewriter on Steroids | Flickr - Photo Sharing!
Confirmed: NSA "obtains cryptographic details of commercial cryptographic information security systems through industry relationships."

The National Security Agency has been the subject of an astonishing number of leaked documents, many of which have proven to be game changing in their import. But sometimes the huge revelations are almost too large to take in. 

One of the latest leaks, published by the Guardian, is much smaller, but it provides a sort of lens by which the bigger picture can be seen more clearly.

The devil, after all, is in the details. 

Documents released recently have shown in detail how the NSA began partnering with technology companies in the early 2000s to gain backdoor access to encrypted information. But alongside that, the Guardian released a simple document, the NSA’s 2005 “Classification Guide for Cryptanalysts.” 

Only three pages long, the document outlines what elements of the agency’s relationship with outside parties have which level of classification. The document gives a peek into one small part of the day-to-day life of an NSA analyst and gives us a sense of what those analysts were able to talk about in what contexts.

Security classifications increasingly need to be machine-readable according to a standardized classification marking system and so have to be understood and applied in a standard fashion. Presumably this document also helps NSA analysts to mark documents according to the Classification and Control Markings Register created by the Department of Defense and representatives of the U.S. intelligence community. 

Here are examples of NSA security levels for some of the knowledge that could now be classified “common knowledge.”


The fact that NSA/CSS exploits cryptographic information security devices and systems. 

These are devices or systems which provides authentication, confidentiality, data integrity or authorization services. Security systems, in other words.


The fact that NSA/CSS works with Second Party partners on exploiting cryptographic information security devices and systems. . 


The fact that NSA/CSS works with Third Party partners on exploiting cryptographic information security devices and systems.

TOP SECRET (at a minimum)

The fact that NSA/CSS obtains cryptographic details of commercial cryptographic information security systems through industry relationships.

TOP SECRET//COMINT (at a minimum)

The fact that NSA/CSS makes modifications to commercial or indigenous information security devices or systems in order to make them exploitable. 

“Indigenous” indicates a non-commercial cryptographic system developed by an NSA target, such as a foreign country. “COMINT” stands for “communications intelligence,” a type of signals intelligence that focuses on information intercepted from foreign communications.

H/T Guardian | Photo by Alan Levine/Flickr 

Promoted Stories Powered by Sharethrough
Layer 8
A female Lebanese news anchor was told to shut up—here's what she did instead
Rima Karaki is a Lebanese TV host who isn't afraid of a fight. Things got heated Monday when Karaki was interviewing Hani Al-Seba'i about the phenomenon of Christians joining Islamic groups like ISIS. Al-Seba’i is a Sunni scholar who fled to London after he was sentenced in an Egyptian court to 15 years in prison for being a part of the Egyptian Islamic Jihad. The United Nations considers the group to be an affiliate of al Qaeda.
internet freedom
Snowden's latest leak: NSA better at defeating encryption than anyone imagined
The U.S. National Security Agency has broken much of the encryption used to protect emails, bank transactions, medical records and most other forms of sensitive information on the Internet, the New York Times, ProPublica and the Guardian jointly reported.
The Latest From Daily Dot Video

Pure, uncut internet. Straight to your inbox.

Thanks for subscribing to our newsletter!