From: cpunk@remail.ecafe.org (ECafe Anonymous Remailer)
To: cypherpunks@toad.com
Message Hash: 910f9ce43152c2a0b9a3c24f8a32b473fd7bc968780fe3492803bf35cce683ff
Message ID: <199604090146.CAA03627@pangaea.hypereality.co.uk>
Reply To: N/A
UTC Datetime: 1996-04-09 08:15:18 UTC
Raw Date: Tue, 9 Apr 1996 16:15:18 +0800
From: cpunk@remail.ecafe.org (ECafe Anonymous Remailer)
Date: Tue, 9 Apr 1996 16:15:18 +0800
To: cypherpunks@toad.com
Subject: NSA Budget
Message-ID: <199604090146.CAA03627@pangaea.hypereality.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
>Is there a public release of the NSA's annual Budget.
>If so is there a quarterly release. -Erinn
-----
Yes, there are annual and quarterly reports released to the
public which describe in meticulous detail expenditures for
the agency's program, personnel and equipment:
1. The program of services and information supplied to
government and other intelligence organizations, US and
foreign, with terms of each client contract.
2. US employees, their organization, skills, duties and
longevity of service; their names, ranks, identification
codes, secure communication methods and home addresses;
the location of workplaces; the continued training each
is scheduled to receive; leaves of absence and
destinations while absent.
3. Foreign nationals covertly employed worldwide, with
information on each as per 2.
4. A comprehensive listing of all types of world-wide
equipment operated; its detailed design, function and
output; where it is located; its designers,
manufacturers and purchase cost; its schedule of
amortization; and its schedule for replacement and/or
upgrade, with fifteen-year projected procurement.
5. Special short- and long-term contracts with governmental
and non-governmental organizations, US and foreign for
one-time projects, by goal, personnel and equipment.
6. Special projects with other US and foreign counter-
intelligence to issue disinformation about the agency.
7. Special section on world-wide US and foreign cryptology:
cryptanalysis, cryptography, steganography, codes,
cyphers, glyphs, mimes; each ranked for security and
ease of cracking; governmental and non-governmental
parties using each; names of cooperative and resistant
cryptographers and cooperating pseudo-cryptographers.
8. Sub-section on methods of Internet traffic and language
analysis; operation and surveillance of anonymous
remailers, bulletin boards and mail lists; lists of
cooperative and resistant educational institutions and
commercial organizations.
9. Appendices on: black operations; transparent operations;
methods for managing cooperative and resistant
governmental and non-governmental persons.
The public is invited to study and/or download these
reports anonymously at:
http://nsa.dod.gov/~reports/quarterly.txt
Return to May 1996
Return to “Kari Laine <buster@klaine.pp.fi>”