Leaked document outlines the NSA's backdoor security industry relationships
The National Security Agency has been the subject of an astonishing number of leaked documents, many of which have proven to be game changing in their import. But sometimes the huge revelations are almost too large to take in.
One of the latest leaks, published by the Guardian, is much smaller, but it provides a sort of lens by which the bigger picture can be seen more clearly.
The devil, after all, is in the details.
Documents released recently have shown in detail how the NSA began partnering with technology companies in the early 2000s to gain backdoor access to encrypted information. But alongside that, the Guardian released a simple document, the NSA’s 2005 “Classification Guide for Cryptanalysts.”
Only three pages long, the document outlines what elements of the agency’s relationship with outside parties have which level of classification. The document gives a peek into one small part of the day-to-day life of an NSA analyst and gives us a sense of what those analysts were able to talk about in what contexts.
Security classifications increasingly need to be machine-readable according to a standardized classification marking system and so have to be understood and applied in a standard fashion. Presumably this document also helps NSA analysts to mark documents according to the Classification and Control Markings Register created by the Department of Defense and representatives of the U.S. intelligence community.
Here are examples of NSA security levels for some of the knowledge that could now be classified “common knowledge.”
The fact that NSA/CSS exploits cryptographic information security devices and systems.
These are devices or systems which provides authentication, confidentiality, data integrity or authorization services. Security systems, in other words.
The fact that NSA/CSS works with Second Party partners on exploiting cryptographic information security devices and systems. .
The fact that NSA/CSS works with Third Party partners on exploiting cryptographic information security devices and systems.
TOP SECRET (at a minimum)
The fact that NSA/CSS obtains cryptographic details of commercial cryptographic information security systems through industry relationships.
TOP SECRET//COMINT (at a minimum)
The fact that NSA/CSS makes modifications to commercial or indigenous information security devices or systems in order to make them exploitable.
“Indigenous” indicates a non-commercial cryptographic system developed by an NSA target, such as a foreign country. “COMINT” stands for “communications intelligence,” a type of signals intelligence that focuses on information intercepted from foreign communications.
Japan accepts U.S. giant-robot battle challenge
What a time to be alive.14k
The Philae comet lander may have discovered alien life
Don't get too excited just yet. The findings haven't been verified.5.8k
South Carolina State Senate votes to take down Confederate flag
The vote sets up another vote and then an almost-certain signature by the governor.4.4k
Valve reminds teams: Players banned for match-fixing can’t be coaches at majors
It's a reiteration of language that was clear in the game company's original ruling.1
Hacking Team's software used by repressive Moroccan government
Leaked documents reveal Morocco paid over $3 million for eavesdropping capabilities.