Appendix G

GLOSSARY

(AES) Advanced Encryption Standard An encryption algorithm for securing sensitive but unclassified material by US Government agencies and, as a consequence, may eventually become the de facto encryption standard for commercial transactions in the private sector. Source: http://searchsecurity.techtarget.com/definition.Advanced-Encryption-Standard

AG Attorney General

Backdoor A means of access to a computer program that bypasses security mechanisms. A programmer may sometimes install a backdoor so that the program can be accessed for troubleshooting or other purposes. Source: http://searchsecurity.techtarget.com/definition/back-door

Big Data Analytics The process of examining large amounts of data of a variety of types (big data) to uncover hidden patterns, unknown correlations, and other useful information. Source: http://searchbusinessanalytics.techtarget.com/definition/big-data-analytics

Bulk Data An electronic collection of data composed of information from multiple records, whose primary relationship to each other is their shared origin from a single or multiple databases. Source: http://www.maine.gov/legis/opla/RTKINFORMEcomments.pdf

Church Committee An 11-member investigating body of the Senate (a Senate Select Committee) that studied governmental operations with respect to Intelligence Activities. It published 14 reports that contain a wealth of information on the formation, operation, and abuses of US intelligence agencies. The reports were published in 1975 and 1976, after which recommendations for reform were debated in Congress and in some cases enacted. Source: http://www.aarclibrary.org/publib/contents/church/contents_church_reports.htm

CIA Central Intelligence Agency

Cloud Computing A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Source: http://csrc.nist.gov/publications/nistpubs/800–145/SP800–145.pdf

CLPP Board Civil Liberties and Privacy Protection Board

(CMP) Continuous Monitoring Program Maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. Source: http://csrc.nist.gov/publications/nistpubs/800–137/SP800–137-Final.pdf

Counter-intelligence Information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or their agents, or international terrorist organizations or activities. Source: (Executive Order 12333, as amended 30 July 2008 and JP 2–01.2, CI & HUMINT in Joint Operations, 11 Mar 2011) http://www.fas.org/irp/eprint/ci-glossary.pdf

Counter-proliferation Those actions (e.g., detect and monitor, prepare to conduct counter-proliferation operations, offensive operations, weapons of mass destruction, active defense, and passive defense) taken to defeat the threat and/or use of weapons of mass destruction against the United States, our military forces, friends, and allies. Source: (JP 1–02 & JP 3–40) http://www.fas.org/irp/eprint/ci-glossary.pdf

Data-Mining The process of collecting, searching through, and analyzing a large amount of data within a database, to discover patterns of relationships. Source: http://dictionary.reference.com/browse/data+mining?s=t

Decryption The process of converting encrypted data back to its original form, so it can be understood. Source: http://searchsecurity.techtarget.com/definition/encryption

DHS Department of Homeland Security

DIAA Defense Information Assurance Agency

Diffie-Hellman Key Exchange Algorithm Cryptographic algorithm used for secure key exchange. The algorithm allows two users to exchange a symmetric secret key through an insecure wired or wireless channel and without any prior secrets. Source: (2005 International Conference on Wireless Networks, Communications and Mobile Computing) http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1549408&tag=1

(DRM) Digital Rights Management/(IRM) Information Rights Management A collection of systems and software applications used to protect the copyrights of documents and electronic media. These include digital music and movies, as well as other data that is stored and transferred digitally. DRM is important to publishers of electronic media because it helps to control the trading, protection, monitoring, and tracking of digital media, limiting the illegal propagation of copyrighted works. Source: http://www.techterms.com/definitions/drm

DISA Defense Information Systems Agency

DNI Director of National Intelligence

DOD Department of Defense

DOJ Department of Justice

DTRA Defense Threat Reduction Agency

EINSTEIN 3 An advanced, network-layer intrusion detection system (IDS) which analyzes Internet traffic as it moves in and out of United States Federal Government networks. EINSTEIN filters packets at the gateway and reports anomalies to the United States Computer Emergency Readiness Team (US-CERT) at the Department of Homeland Security. Source: http://searchsecurity.techtarget.com/definition/Einstein

Encryption The conversion of data into a form, called a ciphertext (encrypted text), that cannot be easily understood by unauthorized people. Source: http://searchsecurity.techtarget.com/definition/encryption

Executive Order Official documents, numbered consecutively, through which the President of the United States manages the operations of the Federal Government. Source: http://www.archives.gov/federal-register/executive-orders/about.html

Executive Order 12333 Under section 2.3, intelligence agencies can only collect, retain, and disseminate information about a “US person” (US citizens and lawful permanent residents) if permitted by applicable law, if the information fits within one of the enumerated categories under Executive Order 12333, and if it is permitted under that agency’s implementing guidelines approved by the Attorney General. The EO has been amended to reflect the changing security and intelligence environment and structure within the US Government. Source: https://it.ojp.gov/default.aspx?area=privacy&page=1261#12333

FBI Federal Bureau of Investigation

(FISA) Foreign Intelligence Surveillance Act As amended, establishes procedures for the authorization of electronic surveillance, use of pen registers and trap-and-trace devices, physical searches, and business records for the purpose of gathering foreign intelligence. Source: https://it.ojp.gov/default.aspx?area=privacy&page=1286

(FISC) Foreign Intelligence Surveillance Court A special court for which the Chief Justice of the United States designates 11 federal district court judges to review applications for warrants related to national security investigations. Source: https://www.fjc.gov/history/home.nsf/page/courts_special_fisc.html

FTC Federal Trade Commission

Identifier/Selector Communication accounts associated with a target (e.g., e-mails address, phone number)

IAD Information Assurance Directorate of the National Security Agency

Intelligence Community Seventeen-member group of Executive Branch agencies and organizations that work separately and together to engage in intelligence activities, either in an oversight, managerial, support, or participatory role necessary for the conduct of foreign relations and the protection of the national security of the United States. Source: http://www.fas.org/irp/eprint/ci-glossary.pdf

Meta-data A characterization or description documenting the identification, management, nature, use, or location of information resources (data). Source: A Glossary of Archival and Records Terminology, Copyright 2012, Society of American Archivists (http://www2.archivists.org/glossary).

(MLAT) Mutual Legal Assistance Treaty An understanding and agreement between two countries that wish to mutually cooperate regarding investigation, prosecution, and enforcement of the provisions of the laws of the agreeing countries. The MLAT also specifies the grounds on which a request by either nation may be rejected or denied by the other nation. Source: http://perry4law.org/clic/?page_id=39

NAS National Academy of Sciences

(NIPF) National Intelligence Priorities Framework DNI’s guidance to the Intelligence Community on the national intelligence priorities approved by the President. The NIPF guides prioritization for the operation, planning, and programming of US intelligence analysis and collection. Source: http://www.fbi.gov/about-us/nsb/faqs

(NSC/DC) National Security Council Deputies Committee The senior sub-Cabinet interagency forum for consideration of policy issues affecting national security. The NSC/DC prescribes and reviews work for the NSC interagency groups discussed in a directive. The NSC/DC helps to ensure issues brought before the NSC/PC or the NSC have been properly analyzed and prepared for decision. The regular members of the NSC/DC consist of the Deputy Secretary of State or Under Secretary of the Treasury or Under Secretary of the Treasury for International Affairs, the Deputy Secretary of Defense or Under Secretary of Defense for Policy, the Deputy Attorney General, the Deputy Director of the Office of Management and Budget, the Deputy Director of Central Intelligence, the Vice Chairman of the Joint Chiefs of Staff, the Deputy Chiefs of Staff to the President for Policy, the Chief of Staff and National Security Advisor to the Vice President, the Deputy Assistant to the President for International Economic Affairs, and the Assistant to the President and Deputy National Security Advisor (who shall serve as chair). Source: http://www.fas.org/irp/offdocs/nspd/nspd-1.htm

(NSC/PC) National Security Council Principals Committee The senior interagency forum for consideration of policy affecting national security. The regular members of the NSC/PC consist of the Secretary of State, the Secretary of the Treasury, the Secretary of Defense, the Chief of Staff to the President, and the Assistant to the President for National Security Affairs, who serves as chair. Source: http://www.fas.org/irp/offdocs/nspd/nspd-1.htm

(NSL) National Security Letter A letter from a United States government agency demanding information related to national security. It is independent of legal courts and therefore is different from a subpoena. It is used mainly by the FBI when investigating matters related to national security. It is issued to a particular entity or organization to turn over records and data pertaining to individuals. By law, NSLs can request only non-content information, such as transactional records, phone numbers dialed, or sender or recipient of the letter from disclosing that the letter was ever issued. Source: http://en.wikipedia.org/wiki/National_security_letter. Source: USA PATRIOT Improvement and Reauthorization Act of 2005: A Legal Analysis, Congressional Research Service’s Report for Congress, Brian T. Yeh, Charles Doyle, December 21, 2006.

NSS National Security Staff

NIST National Institute of Standards and Technology

Non-Disclosure Agreement (commonly referred to as “Gag Orders”) Contracts intended to protect information considered to be proprietary or confidential. Parties involved in executing an NDA promise not to divulge secret or protected information. Source: http://inventors.about.com/od/nondisclosure/a/Nondisclosure.htm

NRC National Research Council

NRO National Reconnaissance Office

NSA National Security Agency

NSD/DoJ National Security Division of the Department of Justice

ODNI Office of the Director of National Intelligence

ODOC NSA’s Office of the Director of Compliance

OIA/DoJ Office of International Affairs of the Department of Justice

OMB Office of Management and Budget

OSD Office of the Secretary of Defense

OTA Office of Technology Assessment

PATRIOT Act An Act of Congress that was signed into law by President George W. Bush on October 26, 2001. The title of the act is a ten-letter acronym (USA PATRIOT) that stands for Uniting (and) Strengthening America (by) Providing Appropriate Tools Required (to) Intercept (and) Obstruct Terrorism Act of 2001. Source: http://www.gpo.gov/fdsys/pkg/PLAW-107publ56/html/PLAW-107publ56.htm

PCLOB Privacy and Civil Liberties Oversight Board

Pen Register A device that decodes or records electronic impulses, allowing outgoing numbers from a telephone to be identified. Source: http://legal-dictionary.thefreedictionary.com/Pen+Register

PII Personally identifiable information

PIBD Public Interest Declassification Board

(RAS) Reasonable Articulable Suspicion/Reasonable Grounds to Believe (as applied to section 215) A legal standard of proof in United States law that is less than probable cause, the legal standard for arrests and warrants, but more than an “inchoate and unparticularized suspicion or ‘hunch’”; it must be based on “specific and articulable facts,” “taken together with rational inferences from those facts.” Source: http://supreme.justia.com/cases/federal/us/392/1/case.html#27. Source: http://en.wikipedia.org/wik/Reasonable_Articulable_Suspicion#cite_note-1

Rockefeller Commission Headed by Vice-President Nelson Rockefeller, the commission issued a single report in 1975, which delineated CIA abuses including mail openings and surveillance of domestic dissident groups. Source: http://historymatters.com/archive/contents/church/contents_church_reports_rockcomm.htm

RSA Algorithm (Rivest-Shamir-Adleman) An Internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. The RSA algorithm is the most commonly used encryption and authentication algorithm and is included as part of the Web browsers from Microsoft and Netscape and many other products. Source: http://searchsecurity.techtarget.com/definition/RSA

Section 215 Statutory provision of FISA that permits the government access to business records for foreign intelligence and international terrorism investigations. The governing federal officials are permitted the ability to acquire business and other “tangible records” which include: business records, phone provider records, apartment rental records, driver’s license, library records, book sales records, gun sales records, tax return records, educational records, and medical records. Under this provision, federal investigators can compel third-party record holders, such as telecom firms, banks, or others, to disclose these documents. In order to use this provision, the US government must show that there are reasonable grounds to believe that the records are relevant to an international terrorism or counterintelligence investigation. Source: http://www.law.cornell.edu/uscode/text/50/1861. Source: http://belfercenter.ksg.harvard.edu/publication/19163/usapatriot_act.html

Section 702 Statutory provision for the targeting of individuals reasonably believed to be non-U.S persons located outside the United States. Source: http://www.fas.org/irp/news/2013/06/nsasect702.pdf

(SSL) Secure Sockets Layer A commonly used protocol for managing the security of a message transmission on the Internet. Source: http://searchsecurity.techtarget.com/definition/Secure-Sockets-Layer-SSL

(SIGINT) Signals Intelligence Intelligence derived from electronic signals and systems used by foreign targets, such as communications systems, and radar communications system. Source: http://www.nsa.gov/sigint

Social Networking A dedicated website or other application that enables users to communicate with each other by posting information, comments, messages, images, etc. Source: http://www.oxforddictionaries.com/us/definition/american_english/social-network

Splinternet Also referred to as “cyberbalkanization” or “Internet Balkanization,” it is the segregation of the Internet into smaller groups with similar interests, to a degree that they show a narrow-minded approach to outsiders or those with contradictory views. Source: http://www.techopedia.com/definition/28087/cyberbalkanization

Third Party Doctrine Provides that information “knowingly exposed” to a third party is not subject to Fourth Amendment protection because one “assumes the risk” that the third party will disclose that information. The doctrine holds that the information that individual disclosed to businesses (credit card transactions, phone records, etc.) doesn’t carry with it a “reasonable expectation of privacy” under the Fourth Amendment, as one has “assumed the risk” that this information might at some point be disclosed. Source: http://www.lawtechjournal.com/articles/2007/02_070426_lawless.pdf. Source: http://www.nationalreview.com/agenda/350896/third-party-doctrine-reihan-salam

T-TIP Transatlantic Trade and Investment Partnership

Trap-and-Trace A device or process that captures the incoming electronic or other impulses which identify the originating number or other dialing, routing, addressing, and signaling information reasonably likely to identify the source of a wire or electronic communication, provided, however, that such information shall not include the contents of any communication. Source: 18 U.S.C. § 3127(3).

Tutelage The codename of a classified NSA technology used to monitor communications used on military networks. Source: http://www.wired.com/threatlevel/2009/07/einstein/

Warfighter Military personnel with a combat or combat related mission.

Whistle-blower A person who tells someone in authority about something they believe to be illegal that is happening, especially in a government department or a company. Source: http://dictionary.cambridge.org/dictionary/british/whistle-blower

Wiretap To place a device on (someone’s phone) in order to secretly listen to telephone calls. Source: http://www.merriam-webster.com/dictionary/wiretap

Zero Day Exploitation Taking advantage of security vulnerability on the same day that the vulnerability becomes generally known. There are zero days between the time the vulnerability is discovered and the first attack. It is an exploit of vulnerability in software, which is being utilized for the first time and which, therefore, is unknown to defensive software. Source: http://searchsecurity.techtarget.com/definition/zero-day-exploit

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.221.165.246