Keith Alexander’s Secret Lie: Retention and Distribution of Domestic Encrypted and Hacking Communications?

As I noted in my last two posts, Keith Alexander has admitted that the classified lie Mark Udall and Ron Wyden accused him of telling “could have more precisely described the requirements of collection under FISA Amendments Act.”

He then goes onto repeat the many claims about Section 702, which are different forms of saying that it may not collect information on someone knowingly in the US.

Which leads me to suspect that the lie Udall and Wyden described is that the program can retain and distribute domestic communications, which are defined as “communications in which the sender and all intended recipients are reasonably believed to be located in the United States at the time of acquisition.”

The minimization procedures actually describe four kinds of domestic communications that can be distributed with written NSA Director determination. Three of those — significant foreign intelligence information, evidence of a crime imminently being committed, and threat of serious harm to life or property — were generally known. But there is a fourth which I think is probably huge collection:

Section 5(3)

The communication is reasonably believed to contain technical data base information, as defined in Section 2(i), or information necessary to understand or assess a communications security vulnerability. Such communication may be provided to the FBI and/or disseminated to other elements of the United States Government. Such communications may be returned for a period sufficient to allow a thorough exploitation and to permit access to data that are, or are reasonably believed likely to become, relevant to a current or future foreign intelligence requirement. Sufficient duration may vary with the nature of the exploitation.

a. In the context of a cryptanalytic effort, maintenance of technical data bases requires retention of all communications that are enciphered or reasonably believed to contain secret meaning, and sufficient duration may consist of any time period during which encrypted material is subject to, or of us in, cryptanalysis.

b. In the case of communications that are not enciphered or otherwise thought to contain secret meaning, sufficient duration is five years unless the Signal Intelligence Director, NSA, determines in writing that retention for a longer period is required to respond to authorized foreign intelligence or counterintelligence requirements,

Technical data base information, according to the definitions, “means information retained for cryptanalytic, traffic analytic, or signal exploitation purposes.”

In other words, hacking.

Encrypted communications and evidence of hacking have secretly been included in a law purportedly about foreign intelligence collection. And they can keep that information as long as it takes, exempting it from normal minimization requirements.

To be clear, the government still has to get the communication believing (according to its 51% rule) that it has one foreign component. But if Keith Alexander says so, NSA can keep it, forever, even after it finds out it is a domestic communication.

Update: Here’s the July 2012 letter to Clapper. Here’s Clapper’s August 2012 response — the good bits of which are all classified.

Tweet about this on Twitter0Share on Reddit0Share on Facebook0Google+2Email to someone

19 Responses to Keith Alexander’s Secret Lie: Retention and Distribution of Domestic Encrypted and Hacking Communications?

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
Emptywheel Twitterverse
emptywheel @BradMossEsq No. I'm simply not pretending these are the crown jewels, like you are. @pwnallthethings
33sreplyretweetfavorite
emptywheel @pwnallthethings Yes. But that is, of course, an admission that Russian HUMINT has access to gold dust via many channels. @BradMossEsq
3mreplyretweetfavorite
emptywheel @pwnallthethings The more functional you get the more over-cautious people will be abt defaulting to classified. @BradMossEsq
4mreplyretweetfavorite
emptywheel @pwnallthethings Agree there too. But at that level I expect lots of most interesting to be private emails and classified. @BradMossEsq
5mreplyretweetfavorite
emptywheel @BradMossEsq I don't believe I said that. But I do think YOU are treating these as if they're the crown jewels. They're not.
7mreplyretweetfavorite
emptywheel @nickmanes1 Possible Sheldon is considering bankrolling Snyder to undercut the other midwest governor the Kochs will be funding @p2wy
7mreplyretweetfavorite
emptywheel @pwnallthethings Moreover given Russian competence in other collection approaches, they likely knew most of this. @BradMossEsq
10mreplyretweetfavorite
emptywheel @pwnallthethings Of course. But I assume it's nowhere near the most sensitive stuff Russia has gotten from us. @BradMossEsq
12mreplyretweetfavorite
emptywheel @nickmanes1 With unbelievable cowardice, the same way he has approached gay marriage? Plus, if Sheldon's banking him...
20mreplyretweetfavorite
emptywheel @BradMossEsq You forgot the bit where 1) these are unclassified emails 2) Obama's WH overclassifies everything.
22mreplyretweetfavorite
emptywheel @BradMossEsq Actually pointing out that CISA wouldn't do anything to stop it. But that may be a bit subtle for you to understand, I get that
31mreplyretweetfavorite
bmaz RT @OKnox: While @jetjocko is right that it isn't really deserving of #NerdProm moniker, well...I try http://t.co/qnj5iv15uW
39mreplyretweetfavorite
June 2013
S M T W T F S
« May   Jul »
 1
2345678
9101112131415
16171819202122
23242526272829
30