SIGNIT, NSA 2013 Budget Lyrics

Computer Network Operations
SIGINT Enabling

Project Description
The SIGINT Enabling Project actively engages the US and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs. These design changes make the systems in question exploitable through SIGINT collection (e.g., Endpoint. MidPoint. etc.) with foreknowledge of the modification. To the consumer and other adversaries, however, the systems' security remains intact. In this way, the SIGINT Enabling approach uses commercial technology and insight to manage the increasing cost and technical challenges of discovering and successfully exploiting systems of interest within the ever-more integrated and security-focused global communications environment.

This Project supports the Comprehensive National Cybersecurity Initiative (CNCI) by investing in corporate partnerships and providing new access to intelligence sources, reducing collection and exploitation costs of existing sources, and enabling expanded network operation and intelligence exploitation to support network defense and cyber situational awareness. This Project contains the SIGINT Enabling Sub-Project.

Base resources in this project are used to:

- Insert vulnerabilities into commercial encryption systems, IT systems, networks. and endpoint communications devices used by targets.

- Collect target network data and metadata via cooperative network carriers and/or increased control over core networks

- Leverage commercial capabilities to remotely deliver or receive information to and from target endpoints.

- Exploit foreign trusted computing platforms and technologies.

- Influence policies. standards and specification for commercial public key technologies.

- Make specific and aggressive investments to facilitate the development of a robust exploitation capability against Next-Generation Wireless (NGW) communications.

- Maintain understanding of commercial business and technology trends.

- Procure products for internal evaluation.
- Partner with industry and/or government agencies in developing technologies of strategic interest to NSA/CSS.

- Support the SIGINT exploitation of NSW. a MIP/NIP collective investment. This request reflects only the NIP portion of the program. Refer to MIP NSA volume for details on MIP related activities.

- Provide for continued partnerships with major telecommunications carriers to shape the global network to benefit other collection accesses and allow the continuation of partnering with commercial Managed Security Service Providers and threat researchers, doing threat/vulnerability analysis.

- Continue relationships with commercial partners and capitalize on new opportunities, including the enabling of cryptography used by the [redacted] governments; enable the encryption being used in a high interest satellite signal, which allows access to the communications being carried on a commercial satellite provider.

There am no new activities in this Project for FY 2013.

The CCP expects this Project to accomplish the following in FY 20l3:

- Reach an initial operating capability for SIGINT access to data flowing through a commercial Arabic language/Middle East-oriented anonymous internet service [CCP_00009]

- Reach full operating capability for SIGINT access to data flowing through a hub for a major commercial communications provider and assess its long term benefits.

- Reach full operating capability for SIGINT access to a major Internet Peer-to-Peer voice and text communications system.

- Complete enabling for [redacted] chips used in Virtual Private Network and Web encryption devices. [CCP_00009]

- Make gains in enabling decryption and Computer Network Exploitation (CNE) access to fourth generation/Long Term Evolution (4G/LTE) networks via enabling. [CCP_00009]

- Assess existing wireless calling metadata accesses and balance flow of this data into NSA/CSS with the ability to ingest and utilize this information.

- Assess existing commercial cyber information flows and balance the of this data into NSA/CSS with the ability to ingest and analyze this information to support cyber situational awareness. [CO_00047]
- Shape the worldwide commercial cryptography marketplace to make it more tractable to advanced cryptanalytic capabilities being developed by NSA/CSS. [CPP_00090]

Changes From FY 2012 to FY 2013:

SIGINT Enabling: $20.4 million ($20.4 Base), -2 civilian positions. The aggregate decrease is the result of:

Increases:
— $5.6 million reflects additional level of investment in enabling exploitation capabilities against NGW mobile and data networks.

- $41 million enables additional support to Endpoint operations. Support to this mission area requires SIGINT Enabling to invest in new infrastructure and capabilities with commercial partners.

- $0.4 million in civilian pay and benefits.

— $0.3 million due to revised economic assumptions.

Decreases:

- $20.8 million of contractor reductions to fund priority Community investments, which impacts the ability to sustain and expand activities directly supporting cyber informational needs.

- Decrease of $10.0 million in support of deficit reduction efforts, which reduces effectiveness of accesses supporting intelligence collection and Endpoint operations.

— Two civilian positions reduces development of strategic capabilities enabling cryptographic exploitation of target communications to advanced NSA/CSS' missions.

How to Format Lyrics:

  • Type out all lyrics, even repeating song parts like the chorus
  • Lyrics should be broken down into individual lines
  • Use section headers above different song parts like [Verse], [Chorus], etc.
  • Use italics (<i>lyric</i>) and bold (<b>lyric</b>) to distinguish between different vocalists in the same song part
  • If you don’t understand a lyric, use [?]

To learn more, check out our transcription guide or visit our transcribers forum

About

Genius Annotation

SIGINT, a program designed to break encryption schemes used across the world and influence willful flaws within these systems, is funded directly by taxpayer dollars.

Via the New York Times.

Q&A

Find answers to frequently asked questions about the song and explore its deeper meaning

Credits
Tags
Comments