From Cryptome.
Spooks, Squid, and the Shat: we certainly have taken a detour through the Twilight Zone recently, haven't we?
Every time I publish something like this and read something like Sec. 158.13 (i) I wonder how long it'll be before some nicely-suited yet jackbooted team in Mormon haircuts beats down my door…but then I realize I live on the Downtown EastSide and if the security here can keep the home-grown junkies out, it can certainly keep the CIA at bay for a few days at least, long enough for the email to get through. Unless they, like the burglar of two years ago, climb into the parking garage and up the chimney of the incinerator to the roof, from whence they lower themselves on ropes. Yeah, they could get in that way. If they were fireproof. Patrick hooked the incinerator back up, just for protective purposes. We shall see how well it works.
20 May 2006
Source: http://www.gpoaccess.gov/cfr/index.html
———————————————————————–
[Code of Federal Regulations]
[Title 32, Volume 1]
[Revised as of July 1, 2003]
From the U.S. Government Printing Office via GPO Access
[CITE: 32CFR158.13][Page 629-631]
TITLE 32–NATIONAL DEFENSE
CHAPTER I–OFFICE OF THE SECRETARY OF DEFENSE
PART 158–GUIDELINES FOR SYSTEMATIC DECLASSIFICATION REVIEW OF CLASSIFIED
INFORMATION IN PERMANENTLY VALUABLE DoD RECORDS–Table of Contents
Sec. 158.13 Central Intelligence Agency areas of interest.(a) Cryptologic, cryptographic, or SIGINT. (Information in this
category shall continue to be forwarded to the NSA/CSS in accordance
with Sec. 158.11(d). The NSA/CSS shall arrange for necessary
coordination.)
(b) Counterintelligence.
(c) Special access programs
(d) Information that identifies clandestine organizations, agents, sources, or methods.
(e) Information on personnel under official or nonofficial cover or revelation of a cover arrangement.
(f) Covertly obtained intelligence reports and the derivative information that would divulge intelligence sources or methods.
(g) Methods or procedures used to acquire, produce, or support intelligence activities.
(h) CIA structure, size, installations, security, objectives, and budget.
(i) Information that would divulge intelligence interests, value, or extent of knowledge on a subject. (you mean like this?)
(j) Training provided to or by the CIA that would indicate its capability or identify personnel.
(k) Personnel recruiting, hiring, training, assignment, and evaluation policies.(then you need to take your help wanted ads offline)
(l) Information that could lead to foreign political, economic, or military action against the United States or its allies.
(m) Events leading to international tension that would affect U.S. foreign policy.(this could be all of the news, every damn day)
(n) Diplomatic or economic activities affecting national security or international security negotiations.
(o) Information affecting U.S. plans to meet diplomatic contingencies affecting national security.
(p) Nonattributable activities conducted abroad in support of U.S. foreign policy.
(q) U.S. surreptitious collection in a foreign nation that would affect relations with the country.
(r) Covert relationships with international organizations or foreign governments.
(s) Information related to political or economic instabilities in a foreign country threatening American lives and installations therein.
(t) Information divulging U.S. intelligence collection and assessment capabilities.
(u) U.S. and allies' defense plans and capabilities that enable a foreign entity to develop countermeasures.
(v) Information disclosing U.S. systems and weapons capabilities or deployment.
(w) Information on research, development, and engineering that enables the United States to maintain an advantage of value to national security.
(x) Information on technical systems for collection and production of intelligence, and their use.
(y) U.S. nuclear programs and facilities.
(z) Foreign nuclear programs, facilities, and intentions.
(aa) Contractual relationships that reveal the specific interest and expertise of the CIA.
(bb) Information that could result in action placing an individual in jeopardy.
(cc) Information on secret writing when it relates to specific chemicals, reagents, developers, and microdots.
(dd) Reports of the Foreign Broadcast Information Service (FBIS) (– Branch, –Division) between July 31, 1946, and December 31, 1950, marked CONFIDENTIAL or above.
(ee) Reports of the Foreign Documents Division between 1946 and 1950 marked RESTRICTED or above.
(ff) Q information reports.
(gg) FDD translations.
(hh) U reports.
