W O

3y ago
15 Views
2 Downloads
6.00 MB
32 Pages
Last View : 17d ago
Last Download : 3m ago
Upload by : Julius Prosser
Transcription

C:E:NTRAL. SECURITY SERVICESerial: J-107-884 April 1988MEMORANDUM FOR THE SECR TARY OrSUBJECT:D FE HSEANijEX TO DEPARTYENT OF DEFENSEPROCEDURES UNDER EXECUTIVE ORDER 12333 - ACTIONCL SS!FlEDHEMO .NDUMis1. Attach d·a proposed replacement for the Cl ssifiedAnnex to Department of Defense Regulation 524 0.1, "Acti viti es ofDoD Intelligence Components that Affect u.s. Persons". TheRegulation implements Executive Order 12333, united StatesIntelligence Activities", which requires that certain collectiontechniques including electronic surveill nce be conducted inaccoroance with procedures es t q,blished by the head .of the agencyconcerned and approved by the Attorney General. he attachedrep l acement Classified Annex has been negotiated with anaapproved by the Department of Justice's Office of lntelligencePolicy and Revie , and it reflects numerous improvements in formand subst nce which ensure both efficiency of operations andproper regard for constitutional and other legal rights.2. I recommend that you sign the .attached Annex. I willthen forward it to the Attorney Gener!l for his approval asrequired by E ecutive Order 12333.w o General, USADirectof, NSA/Chief. CSSLieuten ntEncl:a/s. .,. . . - ·-. --·-PREPARED SY:Declassify Upon Removal of Enclosuresand Physical Removal of caveat notation.Iyl '393 ,( I ('.' I

1st RET. .CLASSIFIED ANNEX TODEPARTMENT OF DEFENSEPROCEDURES UNDER EXECUTIVE ORDER 12333S c.1:Apolicability and Scope (U)(S CCO)These . procedures implement sections 2.3,2. .and2.6{c) of Executive Order 12333 and supplement Procedure S ofDoD Regulation 5240.1-R, previously approved by the Secretary ofThey govern the conduct byDefense and the Attorney General.the United States Signals Intelligence System of signalsintelligence activities that involve the collection, retentionand dissemination of communications originated or intended forreceipt in the United tates, and signals intelligenceactivities that are directed intentionally against thecommunications of a United States person who is outside theUnited States.These procedures alsogo ernthe collection,retention and dissemination of information concerning UnitedStates persons that is collected by the United States SignalsIntelligence System including such activities undertaken by theThese procedures do not apply to:signals intelligence acti viti es th t . ; · - - t re· -i red underExecutive Order 12333 to be conducted pursuant to proceduresapproved by the Attorney General.Furthet:, these procedures donot apply to signals intelligence activities directed againstHANDLE VIA COMINT CHANNELS ONLYSECRETl394t eCR 1077

CR 1078for the purposeradio communicationsof collecting foreign intelligence regarding internationalnarcotics trafficking or in support of federal lawefforts to interdict such trafficking.intelligence activities ares bjectenforce entSuch signalsto a separate classifiedannex approved earlier by the Attorney General (See Annex J toUnited StatesSign lsmatters expresslyIntelligence Directive 18).authori eaExcept fo:herein, the limitations containedin Department of Defense Regulation 5240.1-R also apply to theUnitea States Signals lntellig ence Syste:;;.Re:erence sh:: u l d be.·made to those procedures with respect to matters ofapplicability and scope,definitions policy and operationalprocedures not covered herein.Sec. 2:(U}Definitions (U)The following additional definitions or supplements todefinitions in DoD RegulationClassified52 0.1-Rapply solely to this nnex:(S CCO)Agent of aFore gnPower.signals intelligence activities which are-For purposes ofriot- 'r · uiatedby theForeign Intelligence Surveillance Act (FISA), the term "agent ofa foreign power . means:.HANDLE VIA COMI NT CHANNELS ONirYSECRET2395

CR 1079SECRET(a)a person ho,for or on behalf of a foreignpo er,is engaged in clandestine intelligence activities, sabotage,or international terrorist activities, or tivities i prepa:etion for international terrorist activities, or who conspire swith, or knowingly aids and abets such a person engaging insuch activities;(b)a person who is an officer oremploy eof aforeign power;(c)a person unlawfully acting for, or pursuant tothe direction of, a foreign power .The mere fact that aperson's activities may benefit or further the aims of a foreignpower is not enough to bring that person under this subsection,absent evidence that the person is ta k ing direction from, oracting in knowing concert with, the foreign power;(d)a person in contact with or acting in collaqora-tion with an intelligen e or security service of a foreignpower for the purpose of providing access to information ormaterial classified by the United States to which such person. - . - - ·- . . . --:has or has had access; or(e)a corporation or other entity that is owned orcontrolled directly or indirectly by a foreign power.HANDLE VIA COMINTCHANNELS ONLYSECRET3396

CR 1080 tlf{Ll{0)Communicant.or intended recipient of a(U)Consent.The term "communicant'" means a sei;d a:ccm unication.For purposes of signals intelligenceactivities, an agreement by an organization with the NationalSecurity Agency to permit collection of information shall bgdeemed valid consent if given on behalf of such organization byan officiar or governing body determined by the General Counsel,Nati nalto akeSecurity Agency, to have actual or apparent authoritysuch an agreement.(5 CCO).·Foreign Com.,11unication.The term "foreigncommunication" means a communication that involves a sender oran intended recipient who is outside the United States or thatis entirely among foreign powers or between a foreign power andofficials of aHANDLE VIACO H NTCHANNELS ONLYSECRET4397

CR 1081htU\tT(U)F'oreian Intelligence.The term " foreignintelligenceN includes both posi tive foreign intelligence andcounterintelligence . Illicit Conununi cation.co unication"means aco unicationThe te r m "illicittransmitted i n viola t ion o:the Communications Act of 1934 and regulations thereunder or ofi nt ernational agreements wh i ch because of its exp l ici tccn e n t,message characteristics, or method of transmiss i on is reasonab l ybelieved to be a communication to or from an agent or agen t s offoreign powers, whether or not United States persons.(U)Interception.Th term " interception means t heacquisition by the United States Signals Intelligence Systemthrough electronic means of a nonpublicco u nica t ionto whichit is not an intended party, and the processing of the contentsof that communication into an intelligence form but notinclud i ng the display of signals on vfio ·l: dlspfay devicesintended to permit . the examination of the technical characte ristics of the signal without reference to the . informationcontent carried by the signal.HAN6LE VIA COMINT CHANNELS ONLYSECRET5398

CR 1082'tC.)Selection.The term " selection," as applied tomanual end mechanical processing activities, means tbeintentional insertion of acomputerHANDLE VIA COMINT CHANNELS ONLYSECRE'f6399

. . . .·. . . . . ·sECRET .sc nCR 1083dictionary or manual scan guide for the purpose ofidentifying messages of interest and isolating them for fur the :processing .\'S).Selection Term.The term "selection term" meansthe composite of individual terms used to effect or defeatselection of particular communicat ions for the purpose ofi nterc eption .soused It comprises t he entire ter m or series ofbut not any segregable term contained therein.te r sItapplies to both mechanical and manual proces sing.(U)Technical Da ta Base.The term techni ca lda t abase'' means information retained for cryp tanal ytic o r trafficanalytic purposes.(U)Transiting Communi catio ns.corrmun i cations" includes allThe term "transitingco unicationsthat neither orig-inate nor terminate in the United States, but which tr ansitthe United States during transmi ss ion .For pur poses of. - ·: . : · ': : . . .- intentionally collecting the communications of a particu l ar United States Person.person, the term "United States person," in addition to themeaning in the Appendix to DoD Regu lation5240 1-R,HANDLE VIA ClliHNT CHANNELS ONLYSECRE 7400 includes:

CR 1084 f;\;;KLiany Jlien known to be presently in the United States; anyunincorporated association of such aliens or · American citizens;the United States operations, office, branch, orrepresentat veof a corporation incorporated abroad; any corporation orcorporate subsidiary incorporated in the United States; and anyu.s.flag non-governmental · aircraft or vessel:po-.:ersSection lOl(o)(l)-(3) ofSec . 3:(U)inFIS .Policy {U)The Director, National Security Agency, is assignedrespon ibilityfor signals intelligencecollect onandprocessing activities and communications security activities.In order to assure that these activities are conducted inaccordance with thepro isionsof Executive Order 12333, theDirectoz, or his designee, will issue appropriate directives andinstructions implementing these procedures and governing theconduct of the United States Signals rn·re·:tii:gence(:System and theactivities ofco unicationssecurity entities.HANDLE VIA COMINT CHANNELS ONLYSECRETB401

CR 1085SECREr It is the policy of the United States SignalsIntelligence System to collect, retain, and disseminateo lyforeign cormnunications and military tactical COI"I'L"TTUnicatior:s. .-. .is recognized, however, that the United States SignalsIntelligence System may incidentally intercept non-foreigncommunications, including those of or concerning United Statespersons, in the course of authorized collection of foreignco "TTunications.The United States Signals IntelligenceSyste makes every reasonable effort, through surveys ana technicalmeans, to reduce to the maximum extent possible. t enumber ofsuch incidental intercepts acquired in the conduct of itsoperations.intercept dInformation derived from these incidentallynon-foreign communications may be disseminated tothe Federal Bureau of Investigation when theinfo rnationisforeign intelligence or counterintelligence or indicates athreat to the physical safety of any person.Dissemination ofsuch information is also governed by these procedures andapplicable minimization procedures approved in accordance withFISA.Specificco municationssent from or intended for receiptby United States persons are not in t ercepted deliberately by theUnited States Signals Intelligence System unless specific. . . . . .--. --- .·- . . .authorization for such interception has been obtained in-accordance with these procedures .HANDLE VIA COMINT CHANNELS ONLYSECRET.9402

SECRET(5 GCO)The President hasCR 1086authori ed,and the AttorneyGeneral hereby specifically approves, interception by theStates Signals Intelligence Systemur. te:of "IllicitoUnited States and Allied Military exercise co uni-0Signals collected ommunications;cations; uringthe search of the signalsenvironment for foreign corrmunications that may be developedinto sources of signals intelligence;Signals collected during the monitoring of foreignelectronic surveillance activities directed at Unitea ·statesco unicationsconsistent with the Foreign IntelligenceSurveillance Act of 1978; andQSignals collected during the testing and trai n ingof personnel in the use of signals intelligence collectionequipment in the United States consistent with the ForeignIntelligence Surveillance Act of1 78.-. . ':. ·- .HANDLE VIA COMINT CHANNELS ONLY- SECRET10403

SECRETSec. 4:A.CR 1087Procedures {U) Sianals !ntelliaence:Co unicationsconcernina, United States persons.of, orThe United States Signa lsIntelligence System may collect, process, retain anddisse i natefore i gn comnmnications that are also communications of, orconcern i·n g, UnitecLStates persons.Comrnunications of, orconcerning,· United States persons will be treated i n thefollowing manner.1.Collection(a){5 CCO }Communications of or concerning a UnitedStates person may be intercepted intentionally or selecteddeliberately through use of a selection term or otherwise only:{1)person.with the conse nt of such United StatesWhere a United St ates person has consented, byco ple -tion of the appropriate Consent Agreement appended hereto, tothe use of a selection term intended to intercept communicationsoriginated Yor referencing that person, the National SecurityAgency may use such a selection te.r:m tb-·.-5-efe\:t. .f. reign communications; orHANDLE VIA COMINT CHANNELS ONLYSECRE'fll404

CR 1088SECRET(2)with specific prior court orderpurs a :to the Foreign Intelligence Surveillance Act of 1978 whereapplicaple.All United States Signals IntelligenceSyste requests for such court orders or approvals shall be forwardedby the Director, National Security Agency for certificatibn bythe Secretary of Defense or the Deputy Secretary of Defense (incase of the unava11ability of both of these officials and inemergency situations, certification may be granted by anotherofficial authorized by executive order to certify suchrequests), and thence to the Attorney General; or(3)with the specific prior approval ofthe Director, National Security Agency, in any case in hichtheUnited States person is reasonably believed to be held captiveby a foreign power or by a group engaged in internationalterrorist activities.The Attorney General will be notifieawhen the Director ·authorizes selection of COJ'i'L;tlunicationsconcerning a United States person pursuant to this provision;or{4)with specific pr1or approval by the. . .---.·- . . - .Attorney General based on a finding by the Attorney General thatthere is probable cause to believe the United States person isan agent of a foreign power and that the purpose of theinterception or selection is to collect significant foreignHANDLE VIA CmHNr CHANNELS ONLYSECRET12405

CR 1089SECRETintelliqence.Such approvals shall be limited to a perioc of. .time not to exceed ninety d3ys for individuals and one year; .entities.(S CCO)Communications of, orany corporation, corporate subsidiary, or other businessentity in the United States tha t is openly acknowledgedforeign government, or governments, to bedirecte byaandcontrolled by such foreign government, or governments, may beintercepted intentionally, or selected deliberately (through theuse of a selection term or otherwise), upon cert:fication i nwriting bythe Director, NSA, to the AttorneyGene al.Suchcertification s h all take tne fnrm o f the Cer t ification NDticeappendedhereto.An information copy shall be forwarded to theDeputy secretary of Defense.ntrector, NSA's certification.Collection mayco enceupon theIn addition, the Director, NSAshall advise the Attorney General ana the Deputy Secretary ofDefense on an annual basis of all such collection. . ": (c) : .-.·· --:-For purposes of the application of Parts l ,2 and 3 of Procedure 5 (and subsection 4.A.l{a) of this annex)to the activities of the United States Signals IntelligenceSystem, any deliberate interception, selection or use of aHANDLE VIA COMHn CHANNELS ONLYSECRET406

SECRErselection ermCR 1090shall be deemed to constitute electronicsurveillance; and, "significant foreign intelligence" shalltha mean not only those items of informationare in thereselvessignificant, but also items that are reasonably believed, base:on the experience of the United States Signals IntelligenceSystem, when a alyzed together with other items, to make acontribution to the· discovery of "significant foreign intelligence . "(d)(5 CEO)(1)Emergencjes: nThe emergency provisionof Part 2, Procedure 5, of DoD S240.1-R, may beSection De ployedtoauthorize deli berate selection of corrtrilu.ni cat ions of, orconcerning, a United States person as defined in the Appendix toDoD Regulation 5240.1-R, when that person is outside the UnitedStates.(2f ·If the United States Signals Intelli-gence System is intentionally collecting the communications ofor concerning a non-resident alien abroad who enters the ·united . . . . .# -.·-·--.--. . .-States in circumstances that suggest that the alien is an .agentof a foreign power, collection of the communications of thatalien may continuefo a period not to exceed seventy-two hoursafter it is learned that the alien is in the United StatesHANDLE VIA COMINT CHANNELS ONLYSECRETJ4407

CR 1091while the United States Signals Intelligence System seeksauthority to continue the surveillance from the . Attorney Generalpursuant to these procedu r es.In the case ofwill be made to determineseventy-two hours,collection of the . nternational communications ofbeterminat duntilmustappropriateleaves · theUnited States.Co unicationsacquired after the target isknown to be in the United States, and 'that are no·t solely of, orconcernlng, U.S. citizens or permanent resideni aliens, may bedisseminated for foreign intelligence purposes untilAttorney General approvalis obtained.In those instances in whichttorney General approval forcontinued sur veillance is obtained,co unicationsof, ormay be disseminated in accordance withconcerning,subsection 4.A.4 of these procedures.(3)lf the United States Signols Intel-ligence system is intentional y co 1 iect't'ng· tofuin ·ications of.or concerning, a United Statesciti enor permanent residentalien abroad, it must terminate the surveillan9e promptly uponlearning that person is in the United States.ElectronicHANDLE VIA COMINT CHANNELS ONLYSECRET15408

CROt'.Ktisurveillence may be reinstituted only in accordance with FISA.In the eventco unicationsof, or concerning, the targetcontinue to be collected before termination can be effected ,processing and use of information derived from suchco unicationsshall be restricted to the greatest extentpossible and special care shall be taken to ensure that suchinformation is not. . disseminated for any purpose unlessauthorized·in accordance with the provisions of FISA.(f)(5 CCO)Provided the proposedm nitoringis nototherwise regulated by Section 4.A.l(a)-(e), voice and facsimileHANDLE VIA COMINT CHANNELS ONLYSECRETl64091092

CR 1093. ·sECRETcommunications withon communicant in the United States maybe targeted for intercept only with the prior approval of theAttorney General or the Director, National Security Agency , asset forth below,Security Agency, may approve the targeting of such communications iftechnical - evices(e.g .,are employed that limit acquisition by theNational Security Agency toco municationswhere the target is anon-U . S. person located abroad . or to specific forms ofconrnunications used by those targets, i.e.,casesin which it is not possible to use such technical devi ces, the ttorneyGenera l mus t approve the targeting .Approvals grantedby the Director, NSA under this provision shall be available forr eview by the Attorney General.(h)(Sceo) Use of direction finding solely to. -·- .·-"' . . . . -··.determine the location of a transmitter does not constituteelectronic surveillance or collection even if directed attransmitters believed to be used by United States persons.Unless collection of the communications is otherwise authorizedHANDLE VIA COMINT CHANNELS ONLYSECREr17410

SECRETpursuant to this annex, the contents ofCR 1094com unicationsto whicha United States person is a party mon1tored in the course ofdirection finding shall be used solely to identify thetransmitter.2.(Sceo)Retention(U)Foreign communications of, or concerning, UnitedStates persons that are intercepted by the United States SignalsIntelligence System may be retained -in their original form or astranscribed only:(a)if processed so as to eliminate. any referenceto United States persons·;(b)data bases .if necessary to the maintenance of technicalRetention for this purpose is permitted for aperiod sufficient to allow a thorough exploitation and to permitaccess to data that are, or are reasonably believed likely tobecome, . relevant to a current or future intelligence requirement.Sufficient duration may vary with the nature of the exploitation.In t

Annex to Department of Defense Regulation 524 0.1, "Acti viti es of DoD Intelligence Components that Affect u.s. Persons". The Regulation implements Executive Order 12333, united States Intelligence Activities", which requires that certain collection techniques including electronic surveill nce be conducted in

Related Documents:

WABO Standard 1702 b. International Building Code (IBC) c. Manual of Steel Construction (AISC) d. AWS Welding Codes: D1.1, D1.4, D1.8 e. AISC Seismic Provisions 341 Note: Purpose of these examinations is to establish and maintain a consistent approach to verifying quality control personnel qualification and to assess his/her technical code knowledge and competence in coordinating overall .

Banking Standard Implementation Requirements, PSD2, the RTS and the CMA Order. Where relevant, it provides a regulatory reference (as per the CMA Order, PSD2/PSRs and the RTS on SCA and CSC). These are marked as either mandatory, optional or conditional in line with the definitions used across the Open Banking Standards. For TPPs, certifying against the CEG Checklist is considered as a signal .

Analytic Geometry and Calculus I Exam 1 Practice Problems Solutions 2/19/7 Question 1 Write the following as an integer: 2log4(9) log2(5) We have: 2log4(9) log2(5) 2log4(9) 2log2(5) 5 2log4(9) 5 41 2 log 4(9) 5 4log4(9) 1 2 5(9)12 5(3) 15: Here we used the properties: a b c a ac; aloga(b) b; (ab) c abc (a )b: Question 2 Eliminate the parameter t to nd a Cartesian equation .

university of calicut syllabus for undergraduate programmes in english . a02 a03 a04 a05 a06 2 bcom and other lrp a01 a02 a03 a04 core courses serial no. course code seme ster title of the course hrs/wk credits page no. 1 eng1b01 1 introducing literature 6 5 10 2 eng2b02 2 appreciating poetry 6 5 13 3 eng3b03 3 appreciating prose 4 4 15 4 eng3b04 3 english grammar and usage 5 4 17 5 eng4b05 .

The BSc Chemistry (Apprenticeship) programme is directly aligned with this message of meshing the academic with real-world outputs. This degree will give apprentices a solid background in the chemical sciences but will also focus on the application of chemistry in specific areas of this ‘central science’. Whilst they are studying, apprentices on this programme will be applying their .

original Climate Change: Evidence and Causes in 2014. It was written and reviewed by a UK-US team of leading climate scientists. This new edition, prepared by the same author team, has been updated with the most recent climate data and scienti c analyses, all of which reinforce our

Cyber threat actors and threat groups are continuously networking, researching, and testing out new tactics, techniques, and procedures (TTPs). They are also always looking for new ways to disrupt operations, make money, or spy on their targets. iDefense threat intelligence analysts have observed multiple tactical shifts

Keynote: Building and sustaining a successful threat intelligence program Speaker(s): Mike Antico, CISO, CLEAR Cybersecurity Collaborative Member Threat intelligence has transformed the information security world for the better but it’s not always leveraged in the best way possible by organizations and departments. Depending on the business,