Technical-Requiremen

Total Page:16

File Type:pdf, Size:1020Kb

Technical-Requiremen UNCLASSIFIED//FOR OFFICIAL USE ONLY Version 1.0 (U//FOUO) TECHNICAL REQUIREMENTS DOCUMENT (TRD) FOR THE PROGRAMMABLE OBJECTIVE ENCRYPTION TECHNOLOGIES (POET) ADVANCED CRYPTOGRAPHIC MODULE (ACM) DOCUMENT DISTRIBUTION RESTRICTIONS: This document contains information exempt from mandatory disclosure under the Freedom of Information Act (FOIA). Exemption 3 applies. Not Releasable to the Defense Technical Information Center (DTIC) per DOD Instruction 3200.12. Unclassified FOUO Information: The document contains unclassified For Official Use Only information which is for the exclusive use of Government and Contractor personnel with a need-to-know the information. Such information is specifically prohibited from posting on unrestricted bulletin boards or other unlimited access applications. UNCLASSIFIED//FOR OFFICIAL USE ONLY DAAB07-03-R-P650 UNCLASSIFIED//FOR OFFICIAL USE ONLY Version 1.0 06 January 2006 (U//FOUO) Revision History Affected Ver. Date Description of Change Pages 1.0 01/06/06 Initial Release All Dissemination restricted as described on cover page UNCLASSIFIED//FOR OFFICIAL USE ONLY DAAB07-03-R-P650 2 of 285 UNCLASSIFIED//FOR OFFICIAL USE ONLY Version 1.0 06 January 2006 (U//FOUO) TABLE OF CONTENTS Section Page 1. (U//FOUO) Introduction 2 1.1. (U//FOUO) Scope 2 1.2. (U//FOUO) System Overview 2 1.3. (U//FOUO) Definition of Terms 2 2. (U//FOUO) Applicable Documents 2 2.1. (U//FOUO) Program-Specific Documents 2 2.2. (U//FOUO) Government Documents 2 2.2.1. (U//FOUO) Specifications, Standards, or Handbooks 2 2.3. (U//FOUO) Other 2 2.3.1. (U//FOUO) Standards 2 3. (U//FOUO) Technical Requirements 2 3.1. (U//FOUO) Notional High-Speed-Embeddable ACM 2 3.2. (U//FOUO) ACM Capabilities Summary 2 3.3. (U//FOUO) Cryptographic Services 2 3.3.1. (U//FOUO) Key Stream Generation 2 3.3.1.1. (U//FOUO) TRANSEC Key Stream Generation 2 3.3.1.2. (U//FOUO) Cover/Decover Key Stream Generation 2 3.3.2. (U//FOUO) Bulk Encryption/Decryption 2 3.3.3. (U//FOUO) Waveform COMSEC Encryption/Decryption 2 3.3.4. (U//FOUO) Baseband COMSEC Encryption/Decryption 2 3.3.5. (U//FOUO) HAIPE Encryption/Decryption 2 3.3.6. (U//FOUO) Telemetry, Tracking, and Command (TT&C) 2 3.3.7. (U//FOUO) Non Type 1 Services 2 3.3.7.1. (U//FOUO) Key Pair Management 2 3.3.7.2. (U//FOUO) Non Type 1 IPSec 2 3.3.7.3. (U//FOUO) Other Encryption/Decryption 2 3.3.7.4. (U//FOUO) Authentication Processing 2 3.3.8. (U//FOUO) Integrity Services 2 3.3.9. (U//FOUO) Digital Signature Services 2 3.3.10. (U//FOUO) Host Utility Services 2 3.3.11. (U//FOUO) Other Services 2 3.4. (U//FOUO) Mission Based ACM Loadings 2 3.4.1. (U//FOUO) Family of Advanced Beyond Line of Sight (FAB-T) 2 3.4.2. (U//FOUO) High Capacity Communications Capability (HC3) 2 3.4.3. (U//FOUO) Navy Multiband Terminal (NMT) 2 3.5. (U//FOUO) Key Management 2 3.5.1. (U//FOUO) Key Agreement and Key Exchange 2 3.5.1.1. (U//FOUO) Type 1 2 3.5.1.2. (U//FOUO) Non Type 1 2 3.5.2. (U//FOUO) Key Fill 2 Dissemination restricted as described on cover page UNCLASSIFIED//FOR OFFICIAL USE ONLY DAAB07-03-R-P650 3 of 285 UNCLASSIFIED//FOR OFFICIAL USE ONLY Version 1.0 06 January 2006 3.5.2.1. (U//FOUO) RED Fill 2 3.5.2.2. (U//FOUO) Benign Fill 2 3.5.2.3. (U//FOUO) BLACK Fill 2 3.5.3. (U//FOUO) Key Identification 2 3.5.4. (U//FOUO) Key Allocation and Usage 2 3.5.5. (U//FOUO) Key Accounting and Audit 2 3.5.6. (U//FOUO) Key Storage 2 3.5.7. (U//FOUO) Key Update 2 3.5.8. (U//FOUO) Key Rollover 2 3.5.9. (U//FOUO) Key Zeroization 2 3.5.9.1. (U//FOUO) Selective zeroization 2 3.5.9.2. (U//FOUO) Recoverable zeroization 2 3.5.9.3. (U//FOUO) Destructive zeroization 2 3.5.9.4. (U//FOUO) Over-the-Air Zeroization (OTAZ) 2 3.5.10. (U//FOUO) Over-the-Air Rekey (OTAR) 2 3.6. (U//FOUO) Cryptographic Modernization 2 3.6.1. (U//FOUO) Configurability 2 3.6.2. (U//FOUO) Programmability 2 3.6.2.1. (U//FOUO) Programmable Architecture 2 3.6.2.2. (U//FOUO) Cryptographic Software/Firmware Loading 2 3.6.2.3. (U//FOUO) Cryptographic Algorithm Identification 2 3.6.2.4. (U//FOUO) Cryptographic Software/Firmware Storage 2 3.6.2.5. (U//FOUO) Cryptographic Software/Firmware Erasure 2 3.6.3. (U//FOUO) Releasability 2 3.6.4. (U//FOUO) Cryptographic Family Interoperability 2 3.6.4.1. (U//FOUO) HAIPIS 2 3.6.4.2. (U//FOUO) LEF 2 3.7. (U//FOUO) Software Communications Architecture (SCA) 2 3.8. (U//FOUO) Lifecycle 2 3.8.1. (U//FOUO) ACM Startup 2 3.8.2. (U//FOUO) ACM Shutdown 2 3.8.3. (U//FOUO) Algorithm Initialization 2 3.8.4. (U//FOUO) Cryptographic Channel Instantiation 2 3.8.5. (U//FOUO) Cryptographic Channel Run-time 2 3.8.6. (U//FOUO) Cryptographic Channel Termination 2 3.9. (U//FOUO) Levels of Security and Classification 2 3.10. (U//FOUO) ACM Security Policy 2 3.11. (U//FOUO) Bypass Processing 2 3.11.1. (U//FOUO) Cryptographic Channel Bypass 2 3.11.2. (U//FOUO) Control/Status Bypass 2 3.11.3. (U//FOUO) CDL Bypass 2 3.11.4. (U//FOUO) Network Management Bypass 2 3.12. (U//FOUO) Unattended Operation 2 Dissemination restricted as described on cover page UNCLASSIFIED//FOR OFFICIAL USE ONLY DAAB07-03-R-P650 4 of 285 UNCLASSIFIED//FOR OFFICIAL USE ONLY Version 1.0 06 January 2006 3.13. (U//FOUO) Unclassified Handling 2 3.14. (U//FOUO) Tamper 2 3.15. (U//FOUO) TEMPEST 2 3.16. (U//FOUO) Identification and Authentication (I&A) 2 3.17. (U//FOUO) Audit 2 3.18. (U//FOUO) Alarm 2 3.19. (U//FOUO) Built-In Test (BIT) and Health Status 2 3.19.1. (U//FOUO) BIT 2 3.19.1.1. (U//FOUO) Power-on BIT 2 3.19.1.2. (U//FOUO) Continuous BIT 2 3.19.1.3. (U//FOUO) Initiated BIT (IBIT) 2 3.19.2. (U//FOUO) ACM Health Status 2 3.20. (U//FOUO) External Interfaces 2 3.21. (U//FOUO) Design margins 2 3.21.1. (U//FOUO) Processor Capacity 2 3.21.2. (U//FOUO) Memory Capacity 2 3.22. (U//FOUO) Power 2 3.22.1. (U//FOUO) General 2 3.22.2. (U//FOUO) Battery 2 3.23. (U//FOUO) Physical 2 3.24. (U//FOUO) Environmental 2 3.25. (U//FOUO) Maintainability 2 3.26. (U//FOUO) Reliability 2 3.27. (U//FOUO) Interchangeability 2 3.28. (U//FOUO) Workmanship 2 3.29. (U//FOUO) Documentation 2 3.30. (U//FOUO) Information Assurance (IA) Standards and Certification 2 4. (U//FOUO) NOTES 2 4.1. (U//FOUO) Acronyms 2 APPENDIX A: (U//FOUO) POET ACM REQUIRED ALGORITHMS 2 APPENDIX B: (U//FOUO) FAB-T Environmental Requirements 2 APPENDIX C: (U//FOUO) HC3 Environmental Requirements 2 APPENDIX D: (U//FOUO) NMT Environmental Requirements 2 1. Altitude, Non-Operating [Navy] 2 2. Atmospheric Pressure [Navy] 2 3. Temperature 2 3.1. Non-Operating [Navy] 2 3.2. Operating [Navy] 2 4. Humidity [Navy] 2 5. Salt Atmosphere 2 6. Vibration 2 6.1. Below Decks Equipment 2 Dissemination restricted as described on cover page UNCLASSIFIED//FOR OFFICIAL USE ONLY DAAB07-03-R-P650 5 of 285 UNCLASSIFIED//FOR OFFICIAL USE ONLY Version 1.0 06 January 2006 APPENDIX E: (U//FOUO) POET INDEPENDENT VERIFICATION AND VALIDATION (IV&V) MATRIX 2 APPENDIX F: (U//FOUO) Cryptograhic Modernization Requirements for the Programmable OBjective Encryption technologies (POET) Advanced Cryptographic Module (ACM) 2 1. (U) Purpose of Document 2 2. (U) Applicability 2 3. (U) Introduction 2 4. (U) Definitions 2 5. (U) Fundamental Programmable Functionality 2 5.1. (U) Confidentiality 2 5.2. (U) Authentication 2 5.3. (U) Integrity 2 6. (U) Other Considerations 2 6.1. (U) Modular Design 2 6.2. (U) Algorithm Baseline 2 6.3. (U) Spare Capacity 2 7. (U) Reprogrammable Architecture Overview 2 8. (U) Algorithm Approval Process 2 9. (U) Architecture Support Requirements 2 9.1. (U) Algorithm Software Distribution and Download 2 9.2. (U) Distribution of JOSEKI Splits 2 9.3. (U) Algorithm Load Options 2 9.4. (U) Housekeeping Requirements 2 9.5. (U) Algorithm Management Support for Foreign Interoperability and Releasability 2 9.6. (U) Key Management Support 2 9.6.1. (U) Basic System Key Management Functionality 2 9.6.2. (U) Key Fill Options 2 9.6.3. (U) Minimum Key Sizes 2 9.7. (U) Overall ECU Management 2 9.7.1. (U) Generating Electronically Signed Receipts 2 9.7.2. (U) User Status Information 2 9.7.3. (U) Configuration Management 2 10. (U) Designing for Programmability and Flexibility 2 10.1. (U) Reprogramming Software/Firmware 2 10.2. (U) Factory/Depot Initialization 2 10.3. (U) Electronic Serial Numbers 2 10.4. (U) Boot Loaders 2 10.5. (U) Trust Anchors 2 10.6. (U) Switching Among Algorithms 2 10.6.1. (U) Sustaining Operations During Reprogramming 2 10.7. (U) Capacity Chokepoints 2 10.8. (U) Risks And Vulnerabilities 2 10.9. (U) Certification Considerations 2 Dissemination restricted as described on cover page UNCLASSIFIED//FOR OFFICIAL USE ONLY DAAB07-03-R-P650 6 of 285 UNCLASSIFIED//FOR OFFICIAL USE ONLY Version 1.0 06 January 2006 11.
Recommended publications
  • Efficiency of Tuna Purse-Seiners and Effective Effort’ « Efficacité Des Senneurs Thoniers Et Efforts Réels » (ESTHER)
    SCTB15 Working Paper FTWG–5 ‘Efficiency of Tuna Purse-Seiners and Effective Effort’ « Efficacité des Senneurs Thoniers et Efforts Réels » (ESTHER) 1 Selected Annotated Bibliography Marie-Christine REALES ESTHER Project Document Officer 1 To receive the complete ESTHER ANNEXE BIBLIOGRAPHIQUE, contact Daniel Gaertner, 1 Institute of Research for Develoment (IRD - UR 109), CHMT BP 171, 34203 Séte Cedex, France PROGRAMME DE RECHERCHES N° 98/061 IRD (Institut de Recherches pour le Développement) / IEO (Instituto Español de Oceanografía) ‘Efficiency of Tuna Purse-Seiners and Effective Effort’ « Efficacité des Senneurs Thoniers et Efforts Réels » (ESTHER) ANNEXE BIBLIOGRAPHIQUE Marie-Christine REALES Documentaliste du projet ESTHER 1 SOMMAIRE INTRODUCTION……………………………………………………………………p. 4 I.Méthodologie………………………………………………………..…………….…p. 5 I.1 Etablissement d'une liste de mots-clés……………………………………...………...p. 5 I.2 Sources utilisées………………………………………………………………………p. 5 I.3 Recherche et validation des résultats…………………………………………………p. 7 I.3.1 Interrogation des bases…………………………………………………………p. 7 I.3.2 Evolution de la liste de mots-clés………………………………………………p. 7 I.3.3 Validation des références…………………………………………………...….p. 9 I.3.4 Diffusion des références……………………………………………………..…p. 9 I.4 Transfert des références sous le logiciel bibliographique PROCITE……………….p. 10 II.Quelques adresses de sites sur Internet………………………………….…p. 23 CONCLUSION………………………………………………………….…….……..p. 26 * * * Bibliographie thématique…………………………………………………………p. 3 Fishing Fleet…………………………………………………………………….…….…p. 3 Purse Seiner Technology…………………………………………………….……..……p. 7 Fisher's Behavior…………………………………………………………………….......p. 13 Fish Catch Statistics……………………………………………………………………...p. 18 Fishing Operations……………………………………………………………..………...p. 30 Tuna Behaviour………………………………………………………………..………...p. 34 Models…………………………………………………………………………………...p. 39 2 Bibliographie Thématique FISHING FLEET Abrahams, M.V. ; Healey, M.C., 1993. Some consequences of variation in vessel density : a manipulative field experiment. Fisheries Research , 15 (4) : 315-322.
    [Show full text]
  • Harris Sierra II, Programmable Cryptographic
    TYPE 1 PROGRAMMABLE ENCRYPTION Harris Sierra™ II Programmable Cryptographic ASIC KEY BENEFITS When embedded in radios and other voice and data communications equipment, > Legacy algorithm support the Harris Sierra II Programmable Cryptographic ASIC encrypts classified > Low power consumption information prior to transmission and storage. NSA-certified, it is the foundation > JTRS compliant for the Harris Sierra II family of products—which includes two package options for the ASIC and supporting software. > Compliant with NSA’s Crypto Modernization Program The Sierra II ASIC offers a broad range of functionality, with data rates greater than 300 Mbps, > Compact form factor legacy algorithm support, advanced programmability and low power consumption. Its software programmability provides a low-cost migration path for future upgrades to embedded communications equipment—without the logistics and cost burden normally associated with upgrading hardware. Plus, it’s totally compliant with all Joint Tactical Radio System (JTRS) and Crypto Modernization Program requirements. The Sierra II ASIC’s small size, low power requirements, and high data rates make it an ideal choice for battery-powered applications, including military radios, wireless LANs, remote sensors, guided munitions, UAVs and any other devices that require a low-power, programmable solution for encryption. Specifications for: Harris SIERRA II™ Programmable Cryptographic ASIC GENERAL BATON/MEDLEY SAVILLE/PADSTONE KEESEE/CRAYON/WALBURN Type 1 – Cryptographic GOODSPEED Algorithms* ACCORDION FIREFLY/Enhanced FIREFLY JOSEKI Decrypt High Assurance AES DES, Triple DES Type 3 – Cryptographic AES Algorithms* Digital Signature Standard (DSS) Secure Hash Algorithm (SHA) Type 4 – Cryptographic CITADEL® Algorithms* SARK/PARK (KY-57, KYV-5 and KG-84A/C OTAR) DS-101 and DS-102 Key Fill Key Management SINCGARS Mode 2/3 Fill Benign Key/Benign Fill *Other algorithms can be added later.
    [Show full text]
  • Conclusions and Overall Assessment of the Bloody Sunday Inquiry Return to an Address of the Honourable the House of Commons Dated 15 June 2010 for The
    Principal Conclusions and Overall Assessment of the Principal Conclusions and Overall Return to an Address of the Honourable the House of Commons dated 15 June 2010 for the Principal Conclusions and Overall Assessment of the Bloody Sunday Inquiry The Rt Hon The Lord Saville of Newdigate (Chairman) The Hon William Hoyt OC The Hon John Toohey AC Bloody Sunday Inquiry Published by TSO (The Stationery Office) and available from: The Principal Conclusions and Overall Assessment Online (Chapters 1–5 of the report) are reproduced in this volume www.tsoshop.co.uk This volume is accompanied by a DVD containing the full Mail, Telephone, Fax & E-mail TSO text of the report PO Box 29, Norwich NR3 1GN Telephone orders/General enquiries: 0870 600 5522 Order through the Parliamentary Hotline Lo-Call: 0845 7 023474 Fax orders: 0870 600 5533 E-mail: customer.services@tso.co.uk Textphone: 0870 240 3701 The Parliamentary Bookshop 12 Bridge Street, Parliament Square, London SW1A 2JX Telephone orders/General enquiries: 020 7219 3890 Fax orders: 020 7219 3866 Email: bookshop@parliament.uk Internet: www.bookshop.parliament.uk TSO@Blackwell and other Accredited Agents Customers can also order publications from TSO Ireland 16 Arthur Street, Belfast BT1 4GD Telephone: 028 9023 8451 Fax: 028 9023 5401 HC30 £19.50 Return to an Address of the Honourable the House of Commons dated 15 June 2010 for the Principal Conclusions and Overall Assessment of the Bloody Sunday Inquiry The Rt Hon The Lord Saville of Newdigate (Chairman) The Hon William Hoyt OC The Hon John Toohey
    [Show full text]
  • Volume I Return to an Address of the Honourable the House of Commons Dated 15 June 2010 for The
    Report of the Return to an Address of the Honourable the House of Commons dated 15 June 2010 for the Report of the Bloody Sunday Inquiry The Rt Hon The Lord Saville of Newdigate (Chairman) Bloody Sunday Inquiry – Volume I Bloody Sunday Inquiry – Volume The Hon William Hoyt OC The Hon John Toohey AC Volume I Outline Table of Contents General Introduction Glossary Principal Conclusions and Overall Assessment Published by TSO (The Stationery Office) and available from: Online The Background to Bloody www.tsoshop.co.uk Mail, Telephone, Fax & E-mail Sunday TSO PO Box 29, Norwich NR3 1GN Telephone orders/General enquiries: 0870 600 5522 Order through the Parliamentary Hotline Lo-Call: 0845 7 023474 Fax orders: 0870 600 5533 E-mail: customer.services@tso.co.uk Textphone: 0870 240 3701 The Parliamentary Bookshop 12 Bridge Street, Parliament Square, London SW1A 2JX This volume is accompanied by a DVD containing the full Telephone orders/General enquiries: 020 7219 3890 Fax orders: 020 7219 3866 text of the report Email: bookshop@parliament.uk Internet: www.bookshop.parliament.uk TSO@Blackwell and other Accredited Agents Customers can also order publications from £572.00 TSO Ireland 10 volumes 16 Arthur Street, Belfast BT1 4GD not sold Telephone: 028 9023 8451 Fax: 028 9023 5401 HC29-I separately Return to an Address of the Honourable the House of Commons dated 15 June 2010 for the Report of the Bloody Sunday Inquiry The Rt Hon The Lord Saville of Newdigate (Chairman) The Hon William Hoyt OC The Hon John Toohey AC Ordered by the House of Commons
    [Show full text]
  • W^Ffs^Jlpâltlfmllpla^I N E, Frescos
    Fundado em 1930 •• Ano XIX ¦¦ IN." 7880 A. DIÁRIO UE NOTICIAS- Tiragem da Propriedade da S. *'<>n>er» O Matutino de Maior O. R. Dantas, presidente; RI. Moreira. Capital da República leRoiirrire; Aurélio Silva, seeretmio. Dis- ASSINATURAS: Previsões ate. 2 horas de amanhã, no n TEMPO rom nebulosidade. »s- Federa!:' Tunnn nom XO.O0: Trim. Cr» ».i.IK, „.„„ Em elevaçüo. Venlns — Dr. Ano, Cri 100,00; Semestre. Crf vni>lrci. Temperatura W^ffS^JlpâltlfmllPla^i N E, frescos. Rep.B. Paulo: VY Farinello - 8. Bento, 220-3.» T. <-íBJi F,n. »E HOJE, 2 SEi;OEsTll PAUS - Cr* 0.50 Universidade Rural, ¦*'•*!'£• «.íi-- •1q1.15.2-; Penha, Rio de Janeiro, Sábado, 3 de Julho de 1918 «¦"-«••• 11 — Tel.: 42-2910 (Rede Interna) ^í^íBua^^-"*''^^"o***^--- ^r4..?jT"uo5"-.^»:i-.?i..M.,ep. Qú?«i«. Constituição, Éstralésia para enfrentar o bloqueio russo Marshall declara que os Estados Unidos, Inglaterra e APELAM PARA STÀLIN OS COMUNISTAS DA IUGOSLÁVIA combater a ati- França estão traçando planos para Quinze mil marxistas dirrçem-lhe um telegrama, solicitando que elimine as Resolveu não convocar o Congresso "falsas tude soviética em Berlim acusações" feitas pelo Cominform contra o mal. Tito e seu governo decisão do presiden- ação conjunta Oficialmente anunciada essa "amor "premier" — Declinou de revelar qualquer detalhe sobre a Protestaram ilimitado" ao russo Que- — considerada na Casa Branca acaoar com a das três potências Também ram «ue nao comparecerão*- rem que êste faça tudo ao seu alcance para o líder anunciado que » pre.lde»te - Ordens só dos russos, diz T ^v -'- (V '«• •'> - 1*1 ».fUda.n,e,,.e..
    [Show full text]
  • ASFIS ISSCAAP Fish List February 2007 Sorted on Scientific Name
    ASFIS ISSCAAP Fish List Sorted on Scientific Name February 2007 Scientific name English Name French name Spanish Name Code Abalistes stellaris (Bloch & Schneider 1801) Starry triggerfish AJS Abbottina rivularis (Basilewsky 1855) Chinese false gudgeon ABB Ablabys binotatus (Peters 1855) Redskinfish ABW Ablennes hians (Valenciennes 1846) Flat needlefish Orphie plate Agujón sable BAF Aborichthys elongatus Hora 1921 ABE Abralia andamanika Goodrich 1898 BLK Abralia veranyi (Rüppell 1844) Verany's enope squid Encornet de Verany Enoploluria de Verany BLJ Abraliopsis pfefferi (Verany 1837) Pfeffer's enope squid Encornet de Pfeffer Enoploluria de Pfeffer BJF Abramis brama (Linnaeus 1758) Freshwater bream Brème d'eau douce Brema común FBM Abramis spp Freshwater breams nei Brèmes d'eau douce nca Bremas nep FBR Abramites eques (Steindachner 1878) ABQ Abudefduf luridus (Cuvier 1830) Canary damsel AUU Abudefduf saxatilis (Linnaeus 1758) Sergeant-major ABU Abyssobrotula galatheae Nielsen 1977 OAG Abyssocottus elochini Taliev 1955 AEZ Abythites lepidogenys (Smith & Radcliffe 1913) AHD Acanella spp Branched bamboo coral KQL Acanthacaris caeca (A. Milne Edwards 1881) Atlantic deep-sea lobster Langoustine arganelle Cigala de fondo NTK Acanthacaris tenuimana Bate 1888 Prickly deep-sea lobster Langoustine spinuleuse Cigala raspa NHI Acanthalburnus microlepis (De Filippi 1861) Blackbrow bleak AHL Acanthaphritis barbata (Okamura & Kishida 1963) NHT Acantharchus pomotis (Baird 1855) Mud sunfish AKP Acanthaxius caespitosa (Squires 1979) Deepwater mud lobster Langouste
    [Show full text]
  • 523696 REF ID:A523696 {U) Chapter 16 Cryptology and the Watergate
    DOCID: 523696 REF ID:A523696 lOP SECRET I::JMBM {U) Chapter 16 Cryptology and the Watergate Era (U) BACKGROUND TO SCANDAL (U) The greatest political scandal in American history originated with an obscure note in the Metro seetion of the Washington Post on Sunday, June 18, 1972. In it, two ~etro . section reporters, Bob Woodward and Carl Bernstein, cove~ed what appeared to be an amateurish break-in at the Democratic National Headquarters in the Watergate Hotel in downtown Washington. (U) The Nixon administration managed to cover over the politi~l effects of the break-in until after the elections in Novem~r. But when Congress returned in January, it was ready to investigate. In February 1973, the Senate voted to establish a Select Committee, commonly referred to as the Ervin Committee after Senator Sam Ervin, Democratic senator from North Carolina, to hold hearings. At the time, no one associated with the committee knew where they would get information, since the administration was keeping a tight lip, and· the . Watergate burglars weren't•talking. But on March 23, one of the burglars, James McCord, turned state's evidence: The federal judg~, John Sirica, had been pressuring the defendants by threatening lengthy prison terms if they did not cooperate. Now McCord was cooperating, and the entire thing began to unravel. The president, concerned with get~g on with his second term. tried to shush the (U) Prealclent Nixon an4 hlalDner circle, 1973 whole thing. (U) The scandal, of course, would not shush. Instead, it mushroomed, swallowing first Nixon's White House staff', then much of his cabinet, and imally the president himself.
    [Show full text]
  • The Military's Role in Counterterrorism
    The Military’s Role in Counterterrorism: Examples and Implications for Liberal Democracies Geraint Hug etortThe LPapers The Military’s Role in Counterterrorism: Examples and Implications for Liberal Democracies Geraint Hughes Visit our website for other free publication downloads http://www.StrategicStudiesInstitute.army.mil/ To rate this publication click here. hes Strategic Studies Institute U.S. Army War College, Carlisle, PA The Letort Papers In the early 18th century, James Letort, an explorer and fur trader, was instrumental in opening up the Cumberland Valley to settlement. By 1752, there was a garrison on Letort Creek at what is today Carlisle Barracks, Pennsylvania. In those days, Carlisle Barracks lay at the western edge of the American colonies. It was a bastion for the protection of settlers and a departure point for further exploration. Today, as was the case over two centuries ago, Carlisle Barracks, as the home of the U.S. Army War College, is a place of transition and transformation. In the same spirit of bold curiosity that compelled the men and women who, like Letort, settled the American West, the Strategic Studies Institute (SSI) presents The Letort Papers. This series allows SSI to publish papers, retrospectives, speeches, or essays of interest to the defense academic community which may not correspond with our mainstream policy-oriented publications. If you think you may have a subject amenable to publication in our Letort Paper series, or if you wish to comment on a particular paper, please contact Dr. Antulio J. Echevarria II, Director of Research, U.S. Army War College, Strategic Studies Institute, 632 Wright Ave, Carlisle, PA 17013-5046.
    [Show full text]
  • Central, Istrouma Grads Crowd NBR Reunion BATON ROUGE — More Than School Closed Two Years Ago Ovation
    General Excellence Louisiana Press Association CENTRALCENTRAL CITYCITY National Newspaper Assn. High-Ranking Ex-City Official Issued Citation For Incident at Central City Hall Page 15 ® & The Leader NEWSNEWSJuly 2016 • Vol. 19, No. 7 • 16 Pages • Circulation 14,000 • 30,000 online • www.centralcitynews.us • 225-261-5055 City of Central • Founded July 11, 2005 City’s 11th AnniversaryCentral Family Fun Celebration At 6 p.m. Saturday at Stadium CENTRAL — Citizens of the City of Central and their friends are invited to help celebrate the 11th Anniver- sary of the founding of the City of Central this Satur- day at 6 p.m. at Wildcat Sta- WILLIE dium. Mayor Jr. Shelton is urg- ing families to come and AMITE COMITE enjoy themselves. He said the fireworks display will be the biggest in Central history. Participants are encour- aged to bring lawn chairs and blankets so they can sit on the football field. Stadi- um seating is also available. Congratulations, The program includes the Central! Kenny Fife and Bac Trac Band beginning at 6 p.m., You’re 11 Years Old! the Molly Ringwalls at 7:30, Birthday Bash and the fireworks at 9:30. 6 p.m. ANOTHER FOUR YEARS — Doug Welborn of Central was sworn in for another four-year term as A barbecue food truck East Baton Rouge Parish Clerk of Court on July 1 in ceremonies at the clerk’s office. Here he enjoys a will sell food, and the Kit- Saturday, July 16 laugh with former LSU football great and former head coach Jerry Stovall and Jodi Stovall.
    [Show full text]
  • Initial List Alphabetically Listed by Initials 6.11.87
    INITIAL LIST ALPHABETICALLY LISTED BY INITIALS INIT. NAHF SALESORG. flEEICf AA Andreassen, Asb]0rn HO S-1 1206 AAA Aas, Arild N B0 4114 AAAN Aanerud, Arne HO S-1 1202 AAB Borge, Aase HO S-2 1205 AABE Eker, Ase Briskodden N Asker 4419 AABK Kolstad, Ase Br0rby HO S-2 1101 AAF Foss, Ashild (30%) HO G-4 2303 AAG Gull, Aaron UK Newbury 2201 AAGR Grimseth, Ashild HO 5-1 1206 AAGU Gulbrandsen, Age HO M- 5 2215 AAH Hauger, Ase R. HO M-2 4406 AAJN Nordsteien, Asmund Johansen N Steinkjer 4109 AAL Albers, Anton D Bad Homb 3380 AALA Larsen, Age CN Z-4 6404 AAM Milne, Alec UK Newbury 3199 AAML Lunde, Ase M. HO Tr'heim 6127 AAN Andersen, Andreas HO R-5 2214 AANO Nord, Aage HO S-1 2104 AAO 0rstad, Aage-John N Z-5 4110 AAST Steen, Aase Marie HO 5- 1 1903 ABE Bergersen, Arne N Y-5 4103 ABF Frigaard, Anne Beate N Z-5 4110 ABGI Gingell, Andrew UK Newbury 1301 ABI Iversen, Anne Brit N Y-5 3123 ABO Olstad, Aud Bj0rhus N Y-6 3214 ABP Pughe, Arthur Brian (Brian) UK Manchester 3104 ABR Brunstad, Anne L. HO B-4 2205 ABS Solstad, Anna Brith N Troms0 4104 ABW Walestrand, Agnes Bergene{75% )H0 S-2 1910 ABWI Wiger, Anne Beth (50%) HO S - 3 6230 AC Clay, Anthony N Z-5 3201 ACDR Droste, Achim D Bad Homb. 5500 ACH Cheyne, Andrew UK Ney/bury AC I Ingvoldsen, Anita C. HO S-2 1910 ACL Loehr, Achim D Stuttgart 3370 ACLI Lindvald, Anna-Carin S Uppl.Vasby 4503 ACO Cokluk, Adnan (75%) HO K-3 6230 ACRC Chantler, Arthur (Chris) UK Newbury 3113 ACWH Whittle, Andrew C.
    [Show full text]
  • David Sheldon Boone Charging Him with Selling the Security Apparatus
    CHAPTER 2 INTRODUCTION In the early 1990s, the new Russian in the Leningrad KGB.1 Putin also quietly replaced counterintelligence service embarked on a mission fourteen presidential representatives in the regions to reclaim the former KGB’s internal security with former security offi cers. power, which had been diminished with the fall of the Soviet Union in 1991. A spate of press FSB director Patrushev said that, in 1999, his service articles in early 1996 by spokesmen for the Federal stopped the activities of 65 foreign individual Security Service (FSB) boasted the service’s role in offi cers and prevented 30 Russian citizens from protecting the state from foreign subversion. FSB passing secrets to foreign intelligence services. In offi cers noted that the service has the responsibility 1998, the FSB foiled the activities of 11 intelligence to monitor foreign astronauts at “Star City” and to offi cers and caught 19 Russian citizens attempting to prevent the emigration of Russian scientists. The sell classifi ed information to foreign secret services. FSB has also bragged about the arrest of Israeli, And in 1996, then-FSB chief Nikolai Kovalyov said Turkish, and North Korean spies and the expulsion the FSB had exposed 400 employees of foreign of a British businessman and an Israeli diplomat. intelligence services and 39 Russians working for The government moves against ecologists further them during the period 1994-96. revealed a resurgence of FSB internal power. The Sutyagin case follows the sentencing in Although there continues to be mutually benefi cial December 2000 of retired US Navy offi cer Edmund cooperation between Washington and Moscow, Pope to 20 years for spying.
    [Show full text]
  • History Comsec Ii.Pdf
    A HISTORY OF U.S. COMMUNICATIONS SECURITY (U) THE DAVID G. BOAK LECTURES VOLUME II NATIONAL SECURITY AGENCY FORT GEORGE G. MEADE, MARYLAND 20755 The information contained in this publication will not be disclosed to foreign nationals or their representatives without express approval of the DIRECTOR, NATIONAL SECURITY AGENCY. Approval shall refer specifically to this publication or to specific information contained herein. JULY 1981 CLASSIFIED BY NSAlCSSM 123-1 REVIEW ON 1 JULY 200t NOT RELEASABLE TO FOREI6N NATIONALS HA~tDLE VIA COPtHNT CIIA~i~iELS O~iLY ORIGINAL (Reverse Blank) ---------- • UNCLASSIFIED • TABLE OF CONTENTS SUBJECT PAGE NO INTRODUCTION • • •• • • _____________ iii POSTSCRIPT ON SURPRISE • __________________ I • OPSEC .___________________ 3 ORGANIZATIONAL DYNAMICS .__ ___ _______________ _ _ _ 7 THREAT IN ASCENDANCY • __ • ______________ 9 • LPI • • _• _______ II SARK-SOME CAUTIONARY HISTORY __ ________ __ ________ ____ __ 13 THE CRYPTo-IGNITION KEY __________ ____ _________ _ __________________ ___ 15 • PCSM • • •__________ 17 NET SIZE • ___________ 19 EQUIPMENT CLASSIFICATION • ______________ 21 PUBLIC CRYPTOGRAPHY-SOME CAUSES & CONSEQUENCES 27 • PKC 33 COMPUTER CRYPTOGRAPHY • ______________________________________ 35 POSTSCRIPT ______________________________________________________________________ 37 • TEMPEST UPDATE "• • ______________ 39 SFA REVISITED • _. • •______________________________________ 4r NESTOR IN VIETNAM __ •••• __ • _____________________________ 43 • EMERGENCY DESTRUCTION OF CRYPTo-EQUIPMENT • ____________________
    [Show full text]