Title: SIGINT Strategy Threads 4 and 7

Release Date: 2014-12-28

Document Date: 2011-09-14

Description: This 14 September 2011 post from the NSA internal newsletter SIDToday from the agency’s Cryptanalysis and Exploitation Services division explains why ubiquitous encryption presents a “major threat” to the agency: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.

Document: SIDToday - SIGINT Strategy Threads 4 and 7

DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL

• Web search

• Agency-all Emails

• SID-all Emails

• NS A Rolodex

• SCOAWK: The SID Mailbag

• SIDtodav Blog

• SIDtodav Series

• SIGINT Worldwide VTC

• SIDtodav Article

• Letter to the Editor

• SIGINT-v Social Media Page

(U//FOUO) SIGINT Strategy Threads 4 and 7

FROM: Cryptanalysis and Exploitation Services (S31) SERIES:

Run Date: 09/14/2011

SIGINT Strategy
Threads

(TS//SI//REL) Did you know that ubiquitous encryption
on the Internet is a major threat to NSA's ability to
prosecute digital-network intelligence (DNI) traffic or

1. Analytic

Modernization and
the Information

1 of 3

SIDToday - SIGINT Strategy Threads 4 and 7

defeat adversary malware?

(TS//SI//REL) Twenty years ago, the fact that
communications were encrypted meant they were very
likely to contain foreign intelligence, because only
governments or other important targets had the resources
to purchase or develop and implement encrypted
communications. Today, anyone who uses the Internet can
access web pages via the strong commercial encryption
provided by HTTPS, and companies of all sizes can
implement virtual private networks (VPN) to permit their
employees to access sensitive or proprietary company
data securely via an Internet connection from anywhere
in the world. SID refers to this widespread encryption,
which poses great challenges to SIGINT, as "ubiquitous
encryption."

(TS//SI//REL) Meanwhile, NSA is doing plenty to stay
ahead of this trend. To learn more about how SIGINT
Mission threads 4 and 7 are addressing these encryption
challenges and how these activities will help us meet the
goals of the SIGINT Strategy, click on the links below.

(TS//SI//REL) Due to the sensitive nature of these
activities you will need access to the BULLRUN
Community of Interest, which protects NSA's capabilities
to defeat encryption of network communications.

Inclusion in the BULLRUN Col requires attending an
indoctrination briefing. Please see the BULLRUN
Indoctrination FAQ for additional information.

(TS//SI//REL) Click here to read about Mission Thread 4 :
"Countering the effects of strong commercial webmail
encryption used by CT targets."

(TS//SI//REL) Click here to learn more about how Mission
Thread 7, "Virtual Private Networks" will help NSA
distinguish intelligence-bearing encrypted
communications from routine when Internet encryption
has become ubiquitous.

Space

2. SIGINT Mission
Thread Two:
Analyst-Facing
Deliverables

3. SIGINT Mission
Thread 3

4. SIGINT Mission
Thread Five:
Midpoint Injection

5. SIGINT Mission
Thread Six:
Mainstream
Shaping

6. SIGINT Strategy
Threads 4 and 7

"(U//FOUO) SIDtoday
articles may not be
republished or
reposted outside
NSANet without the
consent of SO 121
(DL sid comms)."

2 of 3

SIDToday - SIGINT Strategy Threads 4 and 7

Information Owner:

DYNAMIC PAGE -
HIGHEST POSSIBLE
CLASSIFICATION IS
TOP SECRET// SI / TK
// REL TO USA AUS
CAN GBR NZL
DERIVED FROM:
NSA/CSSM 1-52,
DATED 08 JAN 2007
DECLASSIFY ON:
20320108

3 of 3

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh