From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: cb1353e1da007985867cc75307aee823b10a0fc397ada59a9fc1902e2ddbab4a
Message ID: <1.5.4.32.19970227180151.006f51fc@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-02-27 18:08:37 UTC
Raw Date: Thu, 27 Feb 1997 10:08:37 -0800 (PST)
From: John Young <jya@pipeline.com>
Date: Thu, 27 Feb 1997 10:08:37 -0800 (PST)
To: cypherpunks@toad.com
Subject: Counterintel Center
Message-ID: <1.5.4.32.19970227180151.006f51fc@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
The National Counterintelligence Center (NACIC)
announced today in the Federal Register a new system of
records. There's an explanation of the NACIC and what
it tries to do, reciting the James Angleton/Aldrich Ames
myrrh mantra.
http://jya.com/ncc022797.txt
The new records system includes:
"6. Compromised Names Database. The purpose of the
database is to notify US intelligence community personnel
whose names were potentially compromised as a result of
espionage or other foreign intelligence collection activity.
NACIC reviews pertinent reports to determine documents
that were possibly passed in a particular case and then
reviews those documents for names. The database contains
the names of persons potentially compromised, date of the
memo sent to the person or their employer informing them,
the document number of where the person's name came
from, document title, and document date."
Return to February 1997
Return to “John Young <jya@pipeline.com>”
1997-02-27 (Thu, 27 Feb 1997 10:08:37 -0800 (PST)) - Counterintel Center - John Young <jya@pipeline.com>