SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
DOCID: 411668
,e, nCRtl
Third Party Nations: Partners and Tar,ets (8·eOO~
---------10.....--_
Thll ..rl~d. i. rl!llllil'ied i 31 JICR!] JP:&dIs : La emaia. ehuw& CUi) 51 lCi;aeau.,.
15
nRN OLE ,(!It eeMIff'f 811Atllll!iWl QNIs¥
'8' SEERn
b
b
b
b
-so 1l:3C 403
-F.L. 8G-3G
-18 fJoC 798
A,pproved for Relea~;e b')o" ~~SA CI
~----~-----------------------I.J9-26-2CI07, FOIA C:ase # 5231--~
DOCID~ 411668
IOPSECREi CRYPTOLOGIC QUAR'IERLY
Alb) (1)
/i(,p) (3)-50 USC 403
, .: i',i::) (3) -Po L. 86-36
!ClJ) (3) -18 USC 798
BACKGROUND
But the
costs of obtaining this material are often substantial, if the time spent y po ICY makers,
negotiators, stafTcoordinators, material handlers, and office help are all added in. Si~c~,
in addition, a reverse now of material~ Ito the Third; Party: i$
usually part of the bargain, the total dollar costs and U.S. man hours involved may exceed
those which would have been required for an equivalent U.S. effort. , . .
But considerations of cost and cost effectiveness are usually secondar
the desirabilit of a Third Part exchan e. Focus is enerall on the ""---"'!---~""
Ib) (3) -P.L. 36-36"'''''''''':re:~h:::;t~:=a~~~~:~;i:~m~;r~un::.;::=.:~~=;",;,;:~-----------.....!'f
Party, whether or not this wou coste ec we.
I Inot cost saving, is the primary objective Of.Jroo"!"l~~a~rt.r"y"'e~x~c~a~n~g~e~s-.----~',
in parallel with claims of Sigint operational advantages or of cost savings to be,
derived from the use of Third Party resources, several arguments are available to justify
the risks entailed in eXChanileS whieh foster the devetonment of Third Partv .
__ , 0 · · · , . . . .
(b)i;')""
(b)(3)-50 USC 403
(b)(3)-P,L.86-36
J Finally, in a broader context, there are occasions
"w~h~e~re~cu~rr~e-n"":'t"n-a-:t"Pio-n-a~lll""a.~l"m~s-"'m-a~lk"le--'It'deSirable..to. b..r.iden intergence, ineluding Sigint,
relationships with a Third Party, though benefits to Sigint may be minor or
nonexistant. . . " , . . .
To each oOhesearguments there are counter arguments, which are, in turn, subject
tor~buU;al;and the rebuttals themselves are rebuttable, etc. Because, in these
arguments and counter arguments, subjective judgment and objective fact are hopelessly
intermixed, the pros and cons regarding the points made in the preceding paragraph are
presented below in the form of a dialogue. The aim is to give a clear and forceful
exposition of the two opposing views. The arguments against loosening constraints are
designated "Conservative" and those in favor are labeled "Liberal." The phrasing of the
points will attempt to reflect the conviction, even emotion, with which the issues are often
viewed by each side.
10' SESaE.T 16
Ih'.ff8M!I ';JIA 891411ll'f 81l.',JJ;tqiloi Qtlr.,.
DOClD: 411668
TIfIRDPARTY NAnONS: PARTNERS ANDTARGETS
Generol Spread o{Cryplologic Knowledge/Awareness
Tap 5EEII£if
-50 TJ:::(~ 4(13
-r, L. :=:l;-3l;
Conservative;
There is no,ll.lU1ilw, that generar""yptologic awareness is likely to increase either!
with or withoutL-...jss91stance to Third Parties. But Sigint success is a function of
the ability to stay ahead of target Comsec development; and an ability to stay ahead is, in.
turn, directly dependent on the rale of that Comsec development. Cryptologic assistan¢e
to Third Parties will, without question, increase that rate. ' "
Liberal:
The underlying rate of cryptologic development throughout the world is faster than
ever before and getting even faster. Cryptologic literature in the public domain
concerning advanced analytic techniques is proliferating. Inexpensive high g'rade
cryptographic equipment is readily accessible on the open market. l.t is hard to imagine
that the rate of Third Party cryptologic development can be much .affected by a gradual
broadening of selected Third Party exchanges. .
Conservative;
The gap between the state of cryptologic technology inthe pub" amain and the
actual use of cryptologic technology is ordinarily very wide. When . rnishes
cryptologic assistance, even if the material provided is .thecretiea y WIt 1Il a Third
Party's cryptologic competence, that action, at minimurrunarrowa that gap, brInging the
actual state of a Third Party'. cryptologic prcgre•• eloeee to, if not beyond, that which the
Third Party could, in theory, achieve on its own.
Liberal:
Excessive, sometimes paranoid, concern over the alleged risk tocryptologic
information already in the public domain can only hobble, needlessly, U.S. efforts to deal
with present realities. Third Party Sigint Capabilities and aspirations have advanced
greatly since the early post-WWII period. Vhat were regarded as necessary and sound
security constraints then do not have the same applicability today.
Conservative:
.' :
Neither sound Sigint security principles nor sound banking principles have been
generated by paranoia, though bothare periodically out of popular favor. In both cases
the price of putting long-term system stability at risk in the pursuit of short-term
advantage is very high; vide, the current Texas banks/savings and loan .Crisis.
Enhancement ofThlrd Party Security Measure.
Conservative:
Some degree of control over the further dissemination of cryptologie information,.l'!!!-,
penh,:'v be achieved hY'G,ybljahiop 00 el~ange arrangement W..i'th a T.h..I.'.r..d...p...ar....t.yL...J
I _ .. Jltisalsoquestiona:blewhether limiting the .
distri ution of material whicb would have been passed on by the Third Party in the > "(bl(31-P.L. 86-36
absence ofl lconstraints would justify putting~e additional material
supplied to or generated by the Third Party BlI a result olLJs.iatance.
17
LiANDll • In C8MIlflf elhetnfBI!l& aITkH
'01 JEEREr
DOell): 4t1668
iOPSECNEi CRYPTOLOGlC QUARTERLY
/!(b) (1)
/' (b) (3) -50 USC 403
(b) (3) -18 USC 798
(b) (3)-P.L. 86-36
Liberal: , '" " . , ,
We have leen alaln and Illain that when we"h~ve set (ightef gec4rit~~ rules as a
condition of a given Third Party exchange, the Third Party .hit8 inS:titutti:~. and go'far as
can be determined, abided by luch ruleI. ' , , "" ,
Conservative:
It would be
ts if'.it suits
1.-_......._..-o:_=-=-_~~~~.-lronle.l1y, it .til i hieh we are
moving gradually toward de racto Second PartY••ta'tUI, 'th.re~y m8Jlimizin.~he risks of
(fxnlalQgjr co,promise and t«hnololY tra9.r.r after, and :perhaPI even b,Core, such
Advanced Cryptologic Capabilitie. orC,r~4,.iTAlrrJPm,t."
.: ~ ~
: : r - '- - . . . . . ,
them.lve. materia! whiCh
Conservative:
Some Third Parties do indeed exehan
, , ,
, , ,
, , ,
, , ,
Liberal: ./ i :
------Thel ladvantage'in geographical breadt~;of tft'ort 1. steadily decre~sing as
--_ cooperanon, especially interregional cooperation, be~w••n Third Party nations inereases,
:t-Ild cer~ainly there wou,ld be only minor fi~~ncialeonltralntlonl 1should
tht!~d~pdeto embark On a much expanded Slgtnt effort.
~-----",,!,,!,,---.......--ooo!...Q a a Y .ucae•• 818ms on, rge JS
by no means indicative of a general ctlpability .,ainlt lin'/11ar tarptl or of a knowledge of
the most effective techniques for achievinr that and .imUar .uccesses. :,In many
circumstlirl.cesf ISigint success has been 1••• ~ rtlult or advanced ctyptologic
/_- skiltthan of the br~l1~.thofthel ISirint effort,: a breadth of eWort not,': for both
--"geogr-aphicatanlH'lnancial reasons, achievable by any Third Party nation. .
- ,--_.-_.---_.-
(b)(1)
(b)(3)-50 USC 403
(b)(3)-P, L, 86-36
This becomes:agai~aq-ue_stionof the degr:ee and or the rate or development.
.,.IJlLW:.aa,tij·on. cooperative ar.rang~~rnt)8 ip th, a~Bence ~t uample e.nd a.listanee from
L.__....&.:w:;.:l;:.:ll~b~eless effecbve tha'1-----JEln:trally dlreeted eft'ort. AI to the breadth
-frort, though some increase 18 lnevit,alble,jt i. likely rbe much slower
an WIth the transfer ofcryptologic tecnnology fto'l
Liberal:
Where a Third Party, such a~ rare friends and allies, we should look with
favor on an increase in their cryptologic capabilities. As the relative power of the United
States in the world decreases, our interest in developing the competence ofour allies must
increase,
",PSiCPEL 18
H t NO' i' HI' 'ilQ"mR 8IlJtlFfl!l!:! 014 LI
DOCID: 411668
THIRD PARTY NATIONS; PARTNERS AND TARGETS lOP $!elltET
Conservative:
A friend and any today mayor may not always be a friend and ally. Cryptology is an
area of technology development in which the United States still holds a 8ubstantiallead
~
-Iri-the ·lig-ht-of other ·noncryptologic. ar-ea8--in. Whieh _We .have__prQvi~l'd. ,
t e means of achieving a technological preeminence - a_,.rea8~n.which'wear_e. : ":(bJI1)
....._-~-... .'(b)!31-50 usc 403
now struggling to catch up - it seems ill-advisedto tradeaway'oui' technological lea,dfor • ibJ(3J-P.L 86-36
marginally importani 'assistance,H H fb)(3)-18 USC 798
Liberal:
mentioned it is often desirable to enter into ~'Phird Party agreement in
This has particular relevance to nations..... .......hieh have or can be expect to
develop a substantial cryptologic competence.
Using Si,int Assistance as "Quid" in Broader Negotiation' with a Third Party
Conservative: . . . . H
I third'Partiesw{[ti'a-mOd~~t.~IIl~~~~'~':crYPtolOgiCassistance may. indeed. /
on occasion, smooth general diplomatic or intelligence relationship. with them androay "
on occasion be justifiable on that basis. but it is doubtful that the Ilnerl,l UB~Or Sigint
assistance in this fashion is a wise policy, since it usually result. in ....ri•• ofelCalatirig
demands for more of the s a m e , / / - -
./ibJ(3)-P.L. 86-36
Liberal: /(b(1)
" J "...... IbJ($l-50 USC 403
For better or {or worse, Third Party nations are aware of the .v.ll.bUityoq_~~~, (b)~3)-P.L e.6-36
cryp!'Ologic.assi8ta.nc~ ?fthe1t:e beingn;QV:'d:,_ tp ;::m::;rt.g oth:f.nationl. Not to
consider thiS as a lelPtimate _ _ __ , .- ' _ _ _ elp overall U.S..
political and intelligence relabons can on y ~ rme cryp c paroe allam. /
Conserva tive:
tfostering a continual year-by-year eve
capability. As a result, an initial agreement
becomes over a period of, say, five years. a s~irn~ifi~c".:"8~n~t~tr~an~IIi7..~r~oTc~r~yp~to~o~fI~c~t~ec~n~o~ogy~,..I
As for "cryptologic parochialism," criticism of this nature ("arrolance" hal been a term
sometimes used} has, over the years, been periodically lurf'aced by certain members or the
Intelligence Community in reaction to NSA's refUBal to permIt undue rl.k. to Sigint
material: restrictions on the inclusion of Sigint technical data in end product; reatrictions
on the routine use of sensitive Sigint in tacticalsituationl; r8ltrlctionl on the use of Sigint
as trading "wampum" in diplomatic el(changes. It CAn be aflUld that it parochialism is
involved in this controversy, it might better characterize the position of organizations
which, in pursuit of the short-term goals in which thoN orlsnizations are currently
interested, would risk the effectivenes8 of s weapon (Si,int) of critical long-term
importance to the nation', Btrategic posture.
f , J ' c'
I SjeiO' .,.~.o:Lfu~".n'Sigin,ends hav. _todI.v openocllh. door to • kind of
ith constantly escalatin. demand. tor more eryptologic
assistance.ot infrequently the negotiating philolophy of' the U.S, exch.nge
. r tructure staff itself has been that it ill neeesur for the health of an exchange to
.e., by
010 Ie
19
lihue.. '}fA 88M"" ellldml!l~eUls'i
'lOP S!CRfT
DOCID. 411668
lor SECRET
··ilb) (1)
",---------- /.:'(b) (3) -50 USC 403
CRYPTOLOGICQUARTERLY .. Ib) (3)-P.L. 86-36
Liberal:
It js JloreeHstic ~_~_Pltln--O~---~:~.eatin8' into some cryptologic FortreS8:/"A.merica or
I tThe era of U.S. military/economic world dominance is over. We must
learn to deal with friendly nations on a more equal basis in cryptologic as well as other
areas.
Conservative:
As U.S. relative power declines, intelligence becomes more and more important as 8
means of directing our remaining influence and of employing our resources on those
matters and on those future occasions which can be expected to have the greatest
significance for major U.S. interests. We must not blunt the future effectiveness of the
Sigint weapon by encouraging the development ofdefenses against it.· .
Overall Policy
Liberal:
The conservative arguments against making any basic revisions in the constraints
which have, too often, burdened Third Party exchanges are eharaetertsed by a general
unwillingness to recognize that, in any domain, change is inevitable and that it is neither
practical nor politically feasible to forego the advantages of closer, less constrained,
relationships with Third Parties. The range and difficulty of Sigint tarzets continues to
grow, with no realistic possibility of a comparable growth inl • lrasources. To
prevent unacceptable gaps in Sigint support to U.S. military and political officials, we
must make the most effective possible use of all available resources, including Third
Parties. For better or for worse, either because of the greater attention now accorded to
cryptologic matters throu hout the world or because of a natllJ"al desire on the part of
Third Partie wear!lobliged to come out
of the closet an ea muc more open y Wlt em a u cryp .. ogic matters .
i(bj(31-P.L.86-36
Conservative:
U.S. economic and technical preeminence since WWIl has made it possible, by the
sheer size of increased Sigint funding, to stay ahead of many cryptographic advances by
target nations. With the fading of that preeminence, other avenues to Sigint success.are
needed. One approach, certainl valid even vital in some instances, is to place greater
reliance on Third Parties This approach, however, is by
no w IV r n m 10 d extensiveI may result
in Another
approach, ess likely to be counterproductive, is to ocus availab e igint resources, with
maximum effectiveness and efficiency, on targets of major importance. while relying to a
greater degree on non-Sigint sources of intelligence regarding selected targets ofless than
major importance.
Whether or not the U.S. has entered a phase ofabsolute decline there is little question
that the U.S. will cease to act as military policemen for the entire world. Certainly U.S.
dominance in the Fsr East is no longer a rational possibility. For the purposes of Sigint
planning. it need. to be recognized that Japan, China, and even India are as likely to be
competitors a. allies in the twenty-first century, perhaps earlier; that powerful forces
within the Soviet Union are attempting to move the USSR away from military
confrontation with the U.S.; that the economic/political division of Europe engendered by
,er 5EEIlE' 20
U. NO' r 'U t CpwNT eM' NNE' 'i 9N' ¥
/Ib) II
, (b) (3 -5(1 ll~:(~ 403
(b) (3 -F.L. 86-='l;
DOCID: 411668
TIlIRD PARTY NATIONll: PARTNERS ANDTARGETS TO' !~C"!T
post-WWlI Eaat-Weat rivalries is coming to an end; that global problems of
overpopulation, with consequent atmospheric and terrestrial pollution and in~mational
competition for increasingly searee reeeureea, are likely to be the dominant international
concerns after the year 2000.
Liberal:
It is not the place of NSA or of the cryptologic community to direct national policy or
to make national intelligence estimates. NSA'. job i. to respond to intelligence
information requirements according to established priorities, using whataver resources
are available. It is neither politically practical nor operationally prudent for NSA to
organize its efforts to address tasks and circumstances other than those specified by U.S.
Sigint users. .
Conservative:
NSA is responsible for pursuing policies and measures to maximize the long-term
value of Sigint as an asset critical to the support of U.S. military and political action.
Sigint may soon 100m even larger as a support to actions in the <!Conomic sphere. Beyond
that, as a member of the U.S. Intelligence Community NSA has a responsibility to make
it. voiceheard in matters ....
The above arguments have no real end and the controversy no clear-cut resolution.
Each participanlJreader is likely to find the foregoing merely a confirmation of his or her
already f1l'lllly held vieWll. .
·····lbJI3J-P.L.86-36
21
IWJi8hR 'F.:1: 8SMllfilP81h':fiUIiM 8UltY
'ParSEIAA'
DOCII) I 41H68
Ter 5EEIli'T CRYPTOLOGIC QUARTERLY
,(b) (3)-P.L.SG-36
Some actions which might help to further sort out the issues raised:
• a more thorough examination of the question of the cost effectiveness of each
individual Third Party exchange. A rigorous cost accounting review. by
"outsiders" might suggest some useful modifications in one or more of the existing
exchanges,
• a (re)consideration of the cost-benefit of Third Party exchanges involving targe.ts
of lower priority.
• a review of U.S. Sigint posture vis-a-vis Third Parties for the future, assuming
major realignments ofinternational power relationships over the next 20 years.
bolds a IIA m International KelaQonS from Yale umversuy, an '''0'' rrom
Harvard Business School, and a Doctorale in Jurisprudence 'rom
American University. He i. certified as a Special Research Analyst and
Traffic Analyst.
Tep S&'OR'iI, 22
II 118hl!i HI £9'0"7 Gil' ,aryl 5 Db" Y

Contenu connexe

Similaire à Third part nations - S-CCO leaked document 1

20161122a SSDCO Eng GP3100 What is the Future of JIDO
20161122a SSDCO Eng GP3100 What is the Future of JIDO20161122a SSDCO Eng GP3100 What is the Future of JIDO
20161122a SSDCO Eng GP3100 What is the Future of JIDOChristopher Eng, CISSP, SPHR
 
Memo and order_citizens_against
Memo and order_citizens_againstMemo and order_citizens_against
Memo and order_citizens_againstClifford Stone
 
Us Statement Sccr+Scanned Text
Us Statement Sccr+Scanned TextUs Statement Sccr+Scanned Text
Us Statement Sccr+Scanned TextJeff Witt
 
Nato osint reader final 11 oct02
Nato osint reader final 11 oct02Nato osint reader final 11 oct02
Nato osint reader final 11 oct02Steph Cliche
 
FinalEach answer should be at least 150 words long and in APA .docx
FinalEach answer should be at least 150 words long and in APA .docxFinalEach answer should be at least 150 words long and in APA .docx
FinalEach answer should be at least 150 words long and in APA .docxAKHIL969626
 
A Wrinkle In Time Essay Questions
A Wrinkle In Time Essay QuestionsA Wrinkle In Time Essay Questions
A Wrinkle In Time Essay QuestionsJackie Jones
 
A Wrinkle In Time Essay Questions
A Wrinkle In Time Essay QuestionsA Wrinkle In Time Essay Questions
A Wrinkle In Time Essay QuestionsJennifer Mower
 
DeRabbie-Thesis-January 1997
DeRabbie-Thesis-January 1997DeRabbie-Thesis-January 1997
DeRabbie-Thesis-January 1997Doug DeRabbie
 
Simplicial closure and simplicial diffusions
Simplicial closure and simplicial diffusionsSimplicial closure and simplicial diffusions
Simplicial closure and simplicial diffusionsAustin Benson
 
Information Inflation Can The Legal System Adapt
Information Inflation Can The Legal System AdaptInformation Inflation Can The Legal System Adapt
Information Inflation Can The Legal System Adaptlegalservices
 
Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...
Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...
Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...legalservices
 
Information Inflation Can The Legal System Adapt
Information Inflation Can The Legal System AdaptInformation Inflation Can The Legal System Adapt
Information Inflation Can The Legal System Adaptlegalwebsite
 
How To Legally Beat Debt Collectors
How To Legally Beat Debt CollectorsHow To Legally Beat Debt Collectors
How To Legally Beat Debt Collectorslegalinfo
 
Future Forum 2013 - Stefano Baroni
Future Forum 2013 - Stefano BaroniFuture Forum 2013 - Stefano Baroni
Future Forum 2013 - Stefano BaroniFriuli Future Forum
 
t . ;t - ^-v 4J (ii,-.i ii.I.docx
t . ;t - ^-v  4J (ii,-.i  ii.I.docxt . ;t - ^-v  4J (ii,-.i  ii.I.docx
t . ;t - ^-v 4J (ii,-.i ii.I.docxssuserf9c51d
 

Similaire à Third part nations - S-CCO leaked document 1 (16)

20161122a SSDCO Eng GP3100 What is the Future of JIDO
20161122a SSDCO Eng GP3100 What is the Future of JIDO20161122a SSDCO Eng GP3100 What is the Future of JIDO
20161122a SSDCO Eng GP3100 What is the Future of JIDO
 
Ufo hypothesis
Ufo hypothesisUfo hypothesis
Ufo hypothesis
 
Memo and order_citizens_against
Memo and order_citizens_againstMemo and order_citizens_against
Memo and order_citizens_against
 
Us Statement Sccr+Scanned Text
Us Statement Sccr+Scanned TextUs Statement Sccr+Scanned Text
Us Statement Sccr+Scanned Text
 
Nato osint reader final 11 oct02
Nato osint reader final 11 oct02Nato osint reader final 11 oct02
Nato osint reader final 11 oct02
 
FinalEach answer should be at least 150 words long and in APA .docx
FinalEach answer should be at least 150 words long and in APA .docxFinalEach answer should be at least 150 words long and in APA .docx
FinalEach answer should be at least 150 words long and in APA .docx
 
A Wrinkle In Time Essay Questions
A Wrinkle In Time Essay QuestionsA Wrinkle In Time Essay Questions
A Wrinkle In Time Essay Questions
 
A Wrinkle In Time Essay Questions
A Wrinkle In Time Essay QuestionsA Wrinkle In Time Essay Questions
A Wrinkle In Time Essay Questions
 
DeRabbie-Thesis-January 1997
DeRabbie-Thesis-January 1997DeRabbie-Thesis-January 1997
DeRabbie-Thesis-January 1997
 
Simplicial closure and simplicial diffusions
Simplicial closure and simplicial diffusionsSimplicial closure and simplicial diffusions
Simplicial closure and simplicial diffusions
 
Information Inflation Can The Legal System Adapt
Information Inflation Can The Legal System AdaptInformation Inflation Can The Legal System Adapt
Information Inflation Can The Legal System Adapt
 
Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...
Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...
Proposed Rule Aliens; Legal Assistance Restrictions Negotiated Rulemaking Wor...
 
Information Inflation Can The Legal System Adapt
Information Inflation Can The Legal System AdaptInformation Inflation Can The Legal System Adapt
Information Inflation Can The Legal System Adapt
 
How To Legally Beat Debt Collectors
How To Legally Beat Debt CollectorsHow To Legally Beat Debt Collectors
How To Legally Beat Debt Collectors
 
Future Forum 2013 - Stefano Baroni
Future Forum 2013 - Stefano BaroniFuture Forum 2013 - Stefano Baroni
Future Forum 2013 - Stefano Baroni
 
t . ;t - ^-v 4J (ii,-.i ii.I.docx
t . ;t - ^-v  4J (ii,-.i  ii.I.docxt . ;t - ^-v  4J (ii,-.i  ii.I.docx
t . ;t - ^-v 4J (ii,-.i ii.I.docx
 

Plus de Marc Manthey

The Rise of BaaS A Utopia for Client-Side Developers
The Rise of BaaS A Utopia for Client-Side DevelopersThe Rise of BaaS A Utopia for Client-Side Developers
The Rise of BaaS A Utopia for Client-Side DevelopersMarc Manthey
 
Javascript on Fiber - http://fibjs.org
Javascript on Fiber - http://fibjs.orgJavascript on Fiber - http://fibjs.org
Javascript on Fiber - http://fibjs.orgMarc Manthey
 
Future topic geoengineering
Future topic geoengineeringFuture topic geoengineering
Future topic geoengineeringMarc Manthey
 
PTS- Wissenschaftliche Grundlagen des Analysesystems
PTS- Wissenschaftliche Grundlagen des AnalysesystemsPTS- Wissenschaftliche Grundlagen des Analysesystems
PTS- Wissenschaftliche Grundlagen des AnalysesystemsMarc Manthey
 
Firmen die Monsanto verwenden
Firmen die Monsanto verwendenFirmen die Monsanto verwenden
Firmen die Monsanto verwendenMarc Manthey
 
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-NDBt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-NDMarc Manthey
 
Wi fi technology - an uncontrolled global experiment on the health of mankind...
Wi fi technology - an uncontrolled global experiment on the health of mankind...Wi fi technology - an uncontrolled global experiment on the health of mankind...
Wi fi technology - an uncontrolled global experiment on the health of mankind...Marc Manthey
 
Wifi - a thalidomide in the making - who cares
Wifi -  a thalidomide in the making - who caresWifi -  a thalidomide in the making - who cares
Wifi - a thalidomide in the making - who caresMarc Manthey
 
Silent weapons for quiet wars
Silent weapons for quiet warsSilent weapons for quiet wars
Silent weapons for quiet warsMarc Manthey
 
Vision 2015 - Geheimdienste Global verknüpfen
Vision 2015 - Geheimdienste Global verknüpfenVision 2015 - Geheimdienste Global verknüpfen
Vision 2015 - Geheimdienste Global verknüpfenMarc Manthey
 
Wenn diese Petition es vor den Petitionsausschuss schafft geb ich einen Aus
Wenn diese Petition es vor den Petitionsausschuss schafft geb ich einen AusWenn diese Petition es vor den Petitionsausschuss schafft geb ich einen Aus
Wenn diese Petition es vor den Petitionsausschuss schafft geb ich einen AusMarc Manthey
 
Der spiegel 28-2013_-_nur_der_snowden_und_nsa_part
Der spiegel 28-2013_-_nur_der_snowden_und_nsa_partDer spiegel 28-2013_-_nur_der_snowden_und_nsa_part
Der spiegel 28-2013_-_nur_der_snowden_und_nsa_partMarc Manthey
 
Wirtschaftsspionage in Zeiten von Vollüberwachung
Wirtschaftsspionage in Zeiten von VollüberwachungWirtschaftsspionage in Zeiten von Vollüberwachung
Wirtschaftsspionage in Zeiten von VollüberwachungMarc Manthey
 
CoCCA OpenReg development, registry software
CoCCA OpenReg development, registry softwareCoCCA OpenReg development, registry software
CoCCA OpenReg development, registry softwareMarc Manthey
 
UNICEF Terms of use
UNICEF Terms of useUNICEF Terms of use
UNICEF Terms of useMarc Manthey
 
Multistakeholder processes
Multistakeholder processesMultistakeholder processes
Multistakeholder processesMarc Manthey
 

Plus de Marc Manthey (20)

The Rise of BaaS A Utopia for Client-Side Developers
The Rise of BaaS A Utopia for Client-Side DevelopersThe Rise of BaaS A Utopia for Client-Side Developers
The Rise of BaaS A Utopia for Client-Side Developers
 
Javascript on Fiber - http://fibjs.org
Javascript on Fiber - http://fibjs.orgJavascript on Fiber - http://fibjs.org
Javascript on Fiber - http://fibjs.org
 
Future topic geoengineering
Future topic geoengineeringFuture topic geoengineering
Future topic geoengineering
 
PTS- Wissenschaftliche Grundlagen des Analysesystems
PTS- Wissenschaftliche Grundlagen des AnalysesystemsPTS- Wissenschaftliche Grundlagen des Analysesystems
PTS- Wissenschaftliche Grundlagen des Analysesystems
 
Firmen die Monsanto verwenden
Firmen die Monsanto verwendenFirmen die Monsanto verwenden
Firmen die Monsanto verwenden
 
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-NDBt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
Bt hack-full-disclosure Uncovered – //NONSA//NOGCHQ//NOGOV - CC BY-ND
 
Ecolog2000
Ecolog2000Ecolog2000
Ecolog2000
 
Wi fi technology - an uncontrolled global experiment on the health of mankind...
Wi fi technology - an uncontrolled global experiment on the health of mankind...Wi fi technology - an uncontrolled global experiment on the health of mankind...
Wi fi technology - an uncontrolled global experiment on the health of mankind...
 
Wifi - a thalidomide in the making - who cares
Wifi -  a thalidomide in the making - who caresWifi -  a thalidomide in the making - who cares
Wifi - a thalidomide in the making - who cares
 
Silent weapons for quiet wars
Silent weapons for quiet warsSilent weapons for quiet wars
Silent weapons for quiet wars
 
Xkeyscore
XkeyscoreXkeyscore
Xkeyscore
 
Vision 2015 - Geheimdienste Global verknüpfen
Vision 2015 - Geheimdienste Global verknüpfenVision 2015 - Geheimdienste Global verknüpfen
Vision 2015 - Geheimdienste Global verknüpfen
 
Wenn diese Petition es vor den Petitionsausschuss schafft geb ich einen Aus
Wenn diese Petition es vor den Petitionsausschuss schafft geb ich einen AusWenn diese Petition es vor den Petitionsausschuss schafft geb ich einen Aus
Wenn diese Petition es vor den Petitionsausschuss schafft geb ich einen Aus
 
Der spiegel 28-2013_-_nur_der_snowden_und_nsa_part
Der spiegel 28-2013_-_nur_der_snowden_und_nsa_partDer spiegel 28-2013_-_nur_der_snowden_und_nsa_part
Der spiegel 28-2013_-_nur_der_snowden_und_nsa_part
 
Wirtschaftsspionage in Zeiten von Vollüberwachung
Wirtschaftsspionage in Zeiten von VollüberwachungWirtschaftsspionage in Zeiten von Vollüberwachung
Wirtschaftsspionage in Zeiten von Vollüberwachung
 
CoCCA OpenReg development, registry software
CoCCA OpenReg development, registry softwareCoCCA OpenReg development, registry software
CoCCA OpenReg development, registry software
 
Drdos
DrdosDrdos
Drdos
 
UNICEF Terms of use
UNICEF Terms of useUNICEF Terms of use
UNICEF Terms of use
 
Piraten analyse
Piraten analysePiraten analyse
Piraten analyse
 
Multistakeholder processes
Multistakeholder processesMultistakeholder processes
Multistakeholder processes
 

Dernier

Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxAneriPatwari
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 

Dernier (20)

Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptx
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 

Third part nations - S-CCO leaked document 1

  • 1. DOCID: 411668 ,e, nCRtl Third Party Nations: Partners and Tar,ets (8·eOO~ ---------10.....--_ Thll ..rl~d. i. rl!llllil'ied i 31 JICR!] JP:&dIs : La emaia. ehuw& CUi) 51 lCi;aeau.,. 15 nRN OLE ,(!It eeMIff'f 811Atllll!iWl QNIs¥ '8' SEERn b b b b -so 1l:3C 403 -F.L. 8G-3G -18 fJoC 798 A,pproved for Relea~;e b')o" ~~SA CI ~----~-----------------------I.J9-26-2CI07, FOIA C:ase # 5231--~
  • 2. DOCID~ 411668 IOPSECREi CRYPTOLOGIC QUAR'IERLY Alb) (1) /i(,p) (3)-50 USC 403 , .: i',i::) (3) -Po L. 86-36 !ClJ) (3) -18 USC 798 BACKGROUND But the costs of obtaining this material are often substantial, if the time spent y po ICY makers, negotiators, stafTcoordinators, material handlers, and office help are all added in. Si~c~, in addition, a reverse now of material~ Ito the Third; Party: i$ usually part of the bargain, the total dollar costs and U.S. man hours involved may exceed those which would have been required for an equivalent U.S. effort. , . . But considerations of cost and cost effectiveness are usually secondar the desirabilit of a Third Part exchan e. Focus is enerall on the ""---"'!---~"" Ib) (3) -P.L. 36-36"'''''''''':re:~h:::;t~:=a~~~~:~;i:~m~;r~un::.;::=.:~~=;",;,;:~-----------.....!'f Party, whether or not this wou coste ec we. I Inot cost saving, is the primary objective Of.Jroo"!"l~~a~rt.r"y"'e~x~c~a~n~g~e~s-.----~', in parallel with claims of Sigint operational advantages or of cost savings to be, derived from the use of Third Party resources, several arguments are available to justify the risks entailed in eXChanileS whieh foster the devetonment of Third Partv . __ , 0 · · · , . . . . (b)i;')"" (b)(3)-50 USC 403 (b)(3)-P,L.86-36 J Finally, in a broader context, there are occasions "w~h~e~re~cu~rr~e-n"":'t"n-a-:t"Pio-n-a~lll""a.~l"m~s-"'m-a~lk"le--'It'deSirable..to. b..r.iden intergence, ineluding Sigint, relationships with a Third Party, though benefits to Sigint may be minor or nonexistant. . . " , . . . To each oOhesearguments there are counter arguments, which are, in turn, subject tor~buU;al;and the rebuttals themselves are rebuttable, etc. Because, in these arguments and counter arguments, subjective judgment and objective fact are hopelessly intermixed, the pros and cons regarding the points made in the preceding paragraph are presented below in the form of a dialogue. The aim is to give a clear and forceful exposition of the two opposing views. The arguments against loosening constraints are designated "Conservative" and those in favor are labeled "Liberal." The phrasing of the points will attempt to reflect the conviction, even emotion, with which the issues are often viewed by each side. 10' SESaE.T 16 Ih'.ff8M!I ';JIA 891411ll'f 81l.',JJ;tqiloi Qtlr.,.
  • 3. DOClD: 411668 TIfIRDPARTY NAnONS: PARTNERS ANDTARGETS Generol Spread o{Cryplologic Knowledge/Awareness Tap 5EEII£if -50 TJ:::(~ 4(13 -r, L. :=:l;-3l; Conservative; There is no,ll.lU1ilw, that generar""yptologic awareness is likely to increase either! with or withoutL-...jss91stance to Third Parties. But Sigint success is a function of the ability to stay ahead of target Comsec development; and an ability to stay ahead is, in. turn, directly dependent on the rale of that Comsec development. Cryptologic assistan¢e to Third Parties will, without question, increase that rate. ' " Liberal: The underlying rate of cryptologic development throughout the world is faster than ever before and getting even faster. Cryptologic literature in the public domain concerning advanced analytic techniques is proliferating. Inexpensive high g'rade cryptographic equipment is readily accessible on the open market. l.t is hard to imagine that the rate of Third Party cryptologic development can be much .affected by a gradual broadening of selected Third Party exchanges. . Conservative; The gap between the state of cryptologic technology inthe pub" amain and the actual use of cryptologic technology is ordinarily very wide. When . rnishes cryptologic assistance, even if the material provided is .thecretiea y WIt 1Il a Third Party's cryptologic competence, that action, at minimurrunarrowa that gap, brInging the actual state of a Third Party'. cryptologic prcgre•• eloeee to, if not beyond, that which the Third Party could, in theory, achieve on its own. Liberal: Excessive, sometimes paranoid, concern over the alleged risk tocryptologic information already in the public domain can only hobble, needlessly, U.S. efforts to deal with present realities. Third Party Sigint Capabilities and aspirations have advanced greatly since the early post-WWII period. Vhat were regarded as necessary and sound security constraints then do not have the same applicability today. Conservative: .' : Neither sound Sigint security principles nor sound banking principles have been generated by paranoia, though bothare periodically out of popular favor. In both cases the price of putting long-term system stability at risk in the pursuit of short-term advantage is very high; vide, the current Texas banks/savings and loan .Crisis. Enhancement ofThlrd Party Security Measure. Conservative: Some degree of control over the further dissemination of cryptologie information,.l'!!!-, penh,:'v be achieved hY'G,ybljahiop 00 el~ange arrangement W..i'th a T.h..I.'.r..d...p...ar....t.yL...J I _ .. Jltisalsoquestiona:blewhether limiting the . distri ution of material whicb would have been passed on by the Third Party in the > "(bl(31-P.L. 86-36 absence ofl lconstraints would justify putting~e additional material supplied to or generated by the Third Party BlI a result olLJs.iatance. 17 LiANDll • In C8MIlflf elhetnfBI!l& aITkH '01 JEEREr
  • 4. DOell): 4t1668 iOPSECNEi CRYPTOLOGlC QUARTERLY /!(b) (1) /' (b) (3) -50 USC 403 (b) (3) -18 USC 798 (b) (3)-P.L. 86-36 Liberal: , '" " . , , We have leen alaln and Illain that when we"h~ve set (ightef gec4rit~~ rules as a condition of a given Third Party exchange, the Third Party .hit8 inS:titutti:~. and go'far as can be determined, abided by luch ruleI. ' , , "" , Conservative: It would be ts if'.it suits 1.-_......._..-o:_=-=-_~~~~.-lronle.l1y, it .til i hieh we are moving gradually toward de racto Second PartY••ta'tUI, 'th.re~y m8Jlimizin.~he risks of (fxnlalQgjr co,promise and t«hnololY tra9.r.r after, and :perhaPI even b,Core, such Advanced Cryptologic Capabilitie. orC,r~4,.iTAlrrJPm,t." .: ~ ~ : : r - '- - . . . . . , them.lve. materia! whiCh Conservative: Some Third Parties do indeed exehan , , , , , , , , , , , , Liberal: ./ i : ------Thel ladvantage'in geographical breadt~;of tft'ort 1. steadily decre~sing as --_ cooperanon, especially interregional cooperation, be~w••n Third Party nations inereases, :t-Ild cer~ainly there wou,ld be only minor fi~~ncialeonltralntlonl 1should tht!~d~pdeto embark On a much expanded Slgtnt effort. ~-----",,!,,!,,---.......--ooo!...Q a a Y .ucae•• 818ms on, rge JS by no means indicative of a general ctlpability .,ainlt lin'/11ar tarptl or of a knowledge of the most effective techniques for achievinr that and .imUar .uccesses. :,In many circumstlirl.cesf ISigint success has been 1••• ~ rtlult or advanced ctyptologic /_- skiltthan of the br~l1~.thofthel ISirint effort,: a breadth of eWort not,': for both --"geogr-aphicatanlH'lnancial reasons, achievable by any Third Party nation. . - ,--_.-_.---_.- (b)(1) (b)(3)-50 USC 403 (b)(3)-P, L, 86-36 This becomes:agai~aq-ue_stionof the degr:ee and or the rate or development. .,.IJlLW:.aa,tij·on. cooperative ar.rang~~rnt)8 ip th, a~Bence ~t uample e.nd a.listanee from L.__....&.:w:;.:l;:.:ll~b~eless effecbve tha'1-----JEln:trally dlreeted eft'ort. AI to the breadth -frort, though some increase 18 lnevit,alble,jt i. likely rbe much slower an WIth the transfer ofcryptologic tecnnology fto'l Liberal: Where a Third Party, such a~ rare friends and allies, we should look with favor on an increase in their cryptologic capabilities. As the relative power of the United States in the world decreases, our interest in developing the competence ofour allies must increase, ",PSiCPEL 18 H t NO' i' HI' 'ilQ"mR 8IlJtlFfl!l!:! 014 LI
  • 5. DOCID: 411668 THIRD PARTY NATIONS; PARTNERS AND TARGETS lOP $!elltET Conservative: A friend and any today mayor may not always be a friend and ally. Cryptology is an area of technology development in which the United States still holds a 8ubstantiallead ~ -Iri-the ·lig-ht-of other ·noncryptologic. ar-ea8--in. Whieh _We .have__prQvi~l'd. , t e means of achieving a technological preeminence - a_,.rea8~n.which'wear_e. : ":(bJI1) ....._-~-... .'(b)!31-50 usc 403 now struggling to catch up - it seems ill-advisedto tradeaway'oui' technological lea,dfor • ibJ(3J-P.L 86-36 marginally importani 'assistance,H H fb)(3)-18 USC 798 Liberal: mentioned it is often desirable to enter into ~'Phird Party agreement in This has particular relevance to nations..... .......hieh have or can be expect to develop a substantial cryptologic competence. Using Si,int Assistance as "Quid" in Broader Negotiation' with a Third Party Conservative: . . . . H I third'Partiesw{[ti'a-mOd~~t.~IIl~~~~'~':crYPtolOgiCassistance may. indeed. / on occasion, smooth general diplomatic or intelligence relationship. with them androay " on occasion be justifiable on that basis. but it is doubtful that the Ilnerl,l UB~Or Sigint assistance in this fashion is a wise policy, since it usually result. in ....ri•• ofelCalatirig demands for more of the s a m e , / / - - ./ibJ(3)-P.L. 86-36 Liberal: /(b(1) " J "...... IbJ($l-50 USC 403 For better or {or worse, Third Party nations are aware of the .v.ll.bUityoq_~~~, (b)~3)-P.L e.6-36 cryp!'Ologic.assi8ta.nc~ ?fthe1t:e beingn;QV:'d:,_ tp ;::m::;rt.g oth:f.nationl. Not to consider thiS as a lelPtimate _ _ __ , .- ' _ _ _ elp overall U.S.. political and intelligence relabons can on y ~ rme cryp c paroe allam. / Conserva tive: tfostering a continual year-by-year eve capability. As a result, an initial agreement becomes over a period of, say, five years. a s~irn~ifi~c".:"8~n~t~tr~an~IIi7..~r~oTc~r~yp~to~o~fI~c~t~ec~n~o~ogy~,..I As for "cryptologic parochialism," criticism of this nature ("arrolance" hal been a term sometimes used} has, over the years, been periodically lurf'aced by certain members or the Intelligence Community in reaction to NSA's refUBal to permIt undue rl.k. to Sigint material: restrictions on the inclusion of Sigint technical data in end product; reatrictions on the routine use of sensitive Sigint in tacticalsituationl; r8ltrlctionl on the use of Sigint as trading "wampum" in diplomatic el(changes. It CAn be aflUld that it parochialism is involved in this controversy, it might better characterize the position of organizations which, in pursuit of the short-term goals in which thoN orlsnizations are currently interested, would risk the effectivenes8 of s weapon (Si,int) of critical long-term importance to the nation', Btrategic posture. f , J ' c' I SjeiO' .,.~.o:Lfu~".n'Sigin,ends hav. _todI.v openocllh. door to • kind of ith constantly escalatin. demand. tor more eryptologic assistance.ot infrequently the negotiating philolophy of' the U.S, exch.nge . r tructure staff itself has been that it ill neeesur for the health of an exchange to .e., by 010 Ie 19 lihue.. '}fA 88M"" ellldml!l~eUls'i 'lOP S!CRfT
  • 6. DOCID. 411668 lor SECRET ··ilb) (1) ",---------- /.:'(b) (3) -50 USC 403 CRYPTOLOGICQUARTERLY .. Ib) (3)-P.L. 86-36 Liberal: It js JloreeHstic ~_~_Pltln--O~---~:~.eatin8' into some cryptologic FortreS8:/"A.merica or I tThe era of U.S. military/economic world dominance is over. We must learn to deal with friendly nations on a more equal basis in cryptologic as well as other areas. Conservative: As U.S. relative power declines, intelligence becomes more and more important as 8 means of directing our remaining influence and of employing our resources on those matters and on those future occasions which can be expected to have the greatest significance for major U.S. interests. We must not blunt the future effectiveness of the Sigint weapon by encouraging the development ofdefenses against it.· . Overall Policy Liberal: The conservative arguments against making any basic revisions in the constraints which have, too often, burdened Third Party exchanges are eharaetertsed by a general unwillingness to recognize that, in any domain, change is inevitable and that it is neither practical nor politically feasible to forego the advantages of closer, less constrained, relationships with Third Parties. The range and difficulty of Sigint tarzets continues to grow, with no realistic possibility of a comparable growth inl • lrasources. To prevent unacceptable gaps in Sigint support to U.S. military and political officials, we must make the most effective possible use of all available resources, including Third Parties. For better or for worse, either because of the greater attention now accorded to cryptologic matters throu hout the world or because of a natllJ"al desire on the part of Third Partie wear!lobliged to come out of the closet an ea muc more open y Wlt em a u cryp .. ogic matters . i(bj(31-P.L.86-36 Conservative: U.S. economic and technical preeminence since WWIl has made it possible, by the sheer size of increased Sigint funding, to stay ahead of many cryptographic advances by target nations. With the fading of that preeminence, other avenues to Sigint success.are needed. One approach, certainl valid even vital in some instances, is to place greater reliance on Third Parties This approach, however, is by no w IV r n m 10 d extensiveI may result in Another approach, ess likely to be counterproductive, is to ocus availab e igint resources, with maximum effectiveness and efficiency, on targets of major importance. while relying to a greater degree on non-Sigint sources of intelligence regarding selected targets ofless than major importance. Whether or not the U.S. has entered a phase ofabsolute decline there is little question that the U.S. will cease to act as military policemen for the entire world. Certainly U.S. dominance in the Fsr East is no longer a rational possibility. For the purposes of Sigint planning. it need. to be recognized that Japan, China, and even India are as likely to be competitors a. allies in the twenty-first century, perhaps earlier; that powerful forces within the Soviet Union are attempting to move the USSR away from military confrontation with the U.S.; that the economic/political division of Europe engendered by ,er 5EEIlE' 20 U. NO' r 'U t CpwNT eM' NNE' 'i 9N' ¥
  • 7. /Ib) II , (b) (3 -5(1 ll~:(~ 403 (b) (3 -F.L. 86-='l; DOCID: 411668 TIlIRD PARTY NATIONll: PARTNERS ANDTARGETS TO' !~C"!T post-WWlI Eaat-Weat rivalries is coming to an end; that global problems of overpopulation, with consequent atmospheric and terrestrial pollution and in~mational competition for increasingly searee reeeureea, are likely to be the dominant international concerns after the year 2000. Liberal: It is not the place of NSA or of the cryptologic community to direct national policy or to make national intelligence estimates. NSA'. job i. to respond to intelligence information requirements according to established priorities, using whataver resources are available. It is neither politically practical nor operationally prudent for NSA to organize its efforts to address tasks and circumstances other than those specified by U.S. Sigint users. . Conservative: NSA is responsible for pursuing policies and measures to maximize the long-term value of Sigint as an asset critical to the support of U.S. military and political action. Sigint may soon 100m even larger as a support to actions in the <!Conomic sphere. Beyond that, as a member of the U.S. Intelligence Community NSA has a responsibility to make it. voiceheard in matters .... The above arguments have no real end and the controversy no clear-cut resolution. Each participanlJreader is likely to find the foregoing merely a confirmation of his or her already f1l'lllly held vieWll. . ·····lbJI3J-P.L.86-36 21 IWJi8hR 'F.:1: 8SMllfilP81h':fiUIiM 8UltY 'ParSEIAA'
  • 8. DOCII) I 41H68 Ter 5EEIli'T CRYPTOLOGIC QUARTERLY ,(b) (3)-P.L.SG-36 Some actions which might help to further sort out the issues raised: • a more thorough examination of the question of the cost effectiveness of each individual Third Party exchange. A rigorous cost accounting review. by "outsiders" might suggest some useful modifications in one or more of the existing exchanges, • a (re)consideration of the cost-benefit of Third Party exchanges involving targe.ts of lower priority. • a review of U.S. Sigint posture vis-a-vis Third Parties for the future, assuming major realignments ofinternational power relationships over the next 20 years. bolds a IIA m International KelaQonS from Yale umversuy, an '''0'' rrom Harvard Business School, and a Doctorale in Jurisprudence 'rom American University. He i. certified as a Special Research Analyst and Traffic Analyst. Tep S&'OR'iI, 22 II 118hl!i HI £9'0"7 Gil' ,aryl 5 Db" Y