> 9585320EEAF81044F20D55030A035B11BECE81C785E6C933E4A8A131F6578107, > 2c55e5e45edf713dc43475effe8813a60326a64d9ba3d2e39cb639b0f3b0ad10, or > c97445f45cdef9f0d3e05e1e585fc297235b82b5be8ff3efca67c59852018192 but not
> 9585320EEAF81044F20D55030A035B11BECE81C785E6C933E4A8A131F6578109, > 2c55e5e45edf713dc43475effe8813a60326a64d9ba3d2e39cb639b0f3b0ac10, or > c97445f45cdef9f0d3e05e1e585fc297235b82b5be8ff3efca67c59852017192 ... ....... Giving away state secrets in FOIA requests... They HAVE a 'jacket' with yo' name on it... -- RR "You might want to ask an expert about that - I just fiddled around with mine until it worked..." coderman wrote: > first FOIA of the New Year! > ''' > To Whom It May Concern: > > This is a request under the Freedom of Information Act. I hereby > request the following records: > > Records associated with the suppression, coordination, or appraisal > via third parties of vulnerabilities in Dual_EC and ANSI X9.31 in > ScreenOS or Juniper OS, developed by Juniper Corporation in > California, and reported to the Bureau as part of the Vulnerabilities > Equities Process, or as part of National Security investigations > facilitated by the Data Intercept Technology Unit within the Bureau > (DITU). Passive decrypt enabling of Juniper ScreenOS may also be > referred to as "VPN Decryption (CVE-2015-7756) in ScreenOS 6.2.0r15 > through 6.2.0r18 and 6.3.0r12 through 6.3.0r20". Time frame of > responsive records search is during or after 2005, and before 2016. > Specific identifying terms for search include changed values for X > coordinates for Dual EC curve point Q of: > 9585320EEAF81044F20D55030A035B11BECE81C785E6C933E4A8A131F6578107, > 2c55e5e45edf713dc43475effe8813a60326a64d9ba3d2e39cb639b0f3b0ad10, or > c97445f45cdef9f0d3e05e1e585fc297235b82b5be8ff3efca67c59852018192. Note > that proper matching of these cryptographic curve point values may > require marshaling to a packed binary representation. A search of > primary record repositories as well as cross-references to these data > stores is explicitly requested. Cross reference search is demanded for > proper scope of responsive materials. Please include timeline for > initial discovery with source of discovery, first operational use, and > finally, date for vendor notification, if applicable. Please provide > emails, memorandums of understanding, agreements, or legal orders > directed to Juniper Corporation relevant to this request, if > applicable. Please also review records associated with activities > authorized by Executive Order 12,333, or Section 215 of the Patriot > Act, or Section 702 of the Foreign Intelligence Surveillance Act > Amendments Act (FAA), or any other applicable authority while > processing this request. Records related to coordination with partner > agencies, including NSA, and especially programs including MARINA, > TRAFFICTHIEF, PINWHALE, BULLRUN, AMBULANT, APERIODIC, AUNTIE, ABEYANT, > DICHOTOMY, DILEMMA, FIRSTDOWN, FORBIDDEN, FORBORNE, PAWLEYS, TAREX, > PENDLETON, PAINTEDEAGLE, PAWNSHOP, PERKYAUTUMN, PICAROON, PICARESQUE, > PIEDMONT, PITCHFORD, PLACEBO, POMPANO, or PRESSURETWIN for explicit > search of responsive materials. Note that some of these ECI Coverterms > may be germane to NSA or CIA elements only; explicit resolution into > current terms, if necessary, is requested. See > https://robert.sesek.com/2014/9/unraveling_nsa_s_turbulence_programs.html > for additional context regarding bulk decryption activities relevant > to records sought in this request. Thank you! > ''' > - > https://www.muckrock.com/foi/united-states-of-america-10/prunedkipperos-23339/ > > :P > > > best regards, >
signature.asc
Description: OpenPGP digital signature
