1997-02-27 - Counterintel Center

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: cb1353e1da007985867cc75307aee823b10a0fc397ada59a9fc1902e2ddbab4a
Message ID: <1.5.4.32.19970227180151.006f51fc@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-02-27 18:08:37 UTC
Raw Date: Thu, 27 Feb 1997 10:08:37 -0800 (PST)

Raw message

From: John Young <jya@pipeline.com>
Date: Thu, 27 Feb 1997 10:08:37 -0800 (PST)
To: cypherpunks@toad.com
Subject: Counterintel Center
Message-ID: <1.5.4.32.19970227180151.006f51fc@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


The National Counterintelligence Center (NACIC) 
announced today in the Federal Register a new system of 
records. There's an explanation of the NACIC and what 
it tries to do, reciting the James Angleton/Aldrich Ames 
myrrh mantra.

   http://jya.com/ncc022797.txt

The new records system includes:

   "6. Compromised Names Database. The purpose of the 
   database is to notify US intelligence community personnel 
   whose names were potentially compromised as a result of 
   espionage or other foreign intelligence collection activity. 
   NACIC reviews pertinent reports to determine documents 
   that were possibly passed in a particular case and then 
   reviews those documents for names. The database contains 
   the names of persons potentially compromised, date of the 
   memo sent to the person or their employer informing them, 
   the document number of where the person's name came 
   from, document title, and document date."








Thread