![]() ![]() ![]() Nonetheless, every type of collection undergoes a strict oversight and compliance process internal to NSA that is conducted by entities within the agencies other than those responsible for the actual collection. Due to the fragility of these sources, providing any significant detail outside of classified channels is damaging to national security. Uses EO 12333 authority to collect foreign intelligence from communications systems around the world. This strategy helps ensure that NSA's collection of communications content is more precisely focused on only those targets necessary to respond to identified foreign intelligence requirements. For instance, the collection of overseas communications metadata associated with telephone calls - such as the telephone numbers, and time and duration of calls - allows NSA to map communications between terrorists and their associates. national security interests in a large and complicated global network. This process will often involve the collection of communications metadata - data that helps NSA understand where to find valid foreign intelligence information needed to protect U.S. Matches its collection to those vulnerabilities or develops new capabilities to acquire communications of interest if needed. Identifies vulnerabilities in the methods of communication used to transmit them. Identifies the telecommunications infrastructure used to transmit those communications. Identifies how the foreign entities communicate (radio, e-mail, telephony, etc.). In other words, if NSA is tracking a specific terrorist, NSA will endeavor to determine who that person is in contact with and who they are taking direction from. For example, NSA works to identify individuals who may belong to a terrorist network.ĭevelops the "network" with which that person or organization's information is shared or the command and control structure through which it flows. Identifies foreign entities (persons or organizations) that have information responsive to an identified foreign intelligence requirement. Regardless of the specific authority or collection source, NSA applies a standard process. To undertake collections authorized by EO 12333, NSA uses a variety of methodologies. Intelligence activities conducted under this authority are carried out in accordance with minimization procedures established by the Secretary of Defense and approved by the Attorney General. Collection pursuant to EO 12333 is conducted through various means around the globe, largely from outside the United States, which is not otherwise regulated by the Foreign Intelligence Surveillance Act of 1978 (FISA). To the extent a person located outside the United States communicates with someone inside the United States or someone inside the United States communicates with a person located outside the United States those communications could also be collected. The principal application of this authority is the collection of communications by foreign persons that occur wholly outside the United States. Recommendations for publications to be considered by NIST can be sent to HOWEVER, terms without a source publication will not be independently added to this Glossary.Executive Order (EO) 12333 is the foundational authority by which NSA collects, retains, analyzes, and disseminates foreign signals intelligence information. The Glossary may be expanded to include relevant terms in external or supplemental sources, such as applicable laws and regulations. New publications in development will also follow that guidance. (b) TABLE OF CONTENTS.The table of contents for this Act is as follows: Sec. (5) Division EDepartment of State Authorization (6) Division FOther Non-Department of Defense Matters. As we revise publications, we are reviewing and editing that language based on NIST’s inclusive language guidance. (3) Division CDepartment of Energy National Security Authorizations and Other Authorizations. ![]() We recognize that some NIST publications contain potentially biased terminology. Always refer to the source publication for the authoritative term and definition, and to see that information in its proper context. Terminology changes over time, and may differ based on the topic being addressed. Only terms that are defined in final publications-not drafts-are included here. Share sensitive information only on official, safer websites. This Glossary only consists of terms and definitions extracted verbatim from NIST's cybersecurity- and privacy-related publications- Federal Information Processing Standards (FIPS), NIST Special Publications (SPs), and NIST Internal/Interagency Reports (IRs)-as well as from Committee on National Security Systems (CNSS) Instruction CNSSI-4009. /national-transmit-security-system-actĚ locked padlock) or means you’ve safely attached to which. Glossary terms and definitions last updated: March 28, 2023 ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |