Cryptome DVDs are offered by Cryptome. Donate $25 for two DVDs of the Cryptome 12-and-a-half-years collection of 47,000 files from June 1996 to January 2009 (~6.9 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. The collection includes all files of cryptome.org, cryptome.info, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org, and 23,100 (updated) pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985.The DVDs will be sent anywhere worldwide without extra cost.

Google
 
Web cryptome.org cryptome.info jya.com eyeball-series.org cryptome.cn


[All annexes, 28 pages]

                                SECRET
                                         222

               NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE
                        Fort George G. Meade, Maryland


                                                   20 October 1980


              UNITED STATES SIGNAL INTELLIGENCE DIRECTIVE (USSID)


                                      18


                                    ANNEX A


               PROCEDURES IMPLEMENTING THE FOREIGN INTELLIGENCE
                             SURVEILLANCE ACT (U)




                            LETTER OF PROMULGATION


   (U) This annex is issued separately for use by elements of the USSS only 
when conducting electronic surveillance pursuant to the Foreign Intelligence
Surveillance Act (FISA). Such surveillance will be conducted only upon 
notification by NSA/CSS.


                                      [Signature]

                                      B. R. INMAN
                                Vice Admiral, U.S. Navy
                                Director, NSA/Chief, CSS







                                            CLASSIFIED BY NSA/CSSM 123-2
xxxxxxxxxxxxxxxxxxxxxxxxxx                  REVIEW ON 20 OCTOBER 2010

                                 i


                            SECRET



[Form] USSID 18, ANNEX A 20 October 1980 [Blank] ___________________________ SECURITY CLASSIFICATION CHANGE REGISTER _______________________________________________________________________________ CHANGE ENTERED NO. DATE AUTHORITY (Msg Cite/DTG, Hard Copy (HC), OPSCOMM) DATE BY [No entries] _______________________________________________________________________________ FORM A 7083 REV AUG 76 (Supercedes A 7082 Nov 72 which is obsolete) | SECURITY CLASSIFICATION [Blank] ii


SECRET xxxxxxxxxxxxxxxxxxxxxxx

USSID 18
20 October 1980

ANNEX A

PROCEDURES IMPLEMENTING THE FOREIGN INTELLIGENCE SURVEILLANCE ACT (U)
INTELLIGENCE SURVEILLANCE ACT (U)

SECTION 1 - PURPOSE AND APPLICABILITY

1.1. (U) The Foreign Intelligence Surveillance Act (FISA) governs the conduct of certain electronic surveillance activities within the United States to collect foreign intelligence information. These electronic surveillance activities involve either the acquisition of wire communications by direct access in the United States, the acquisition of radio communications where all parties to that communication are located in the United States, the intentional collection of the communications of a particular, known U.S. person who is in the United States, or the acquisition of information within the United States from other than wire or radio communications.

1.2. (U) These procedures apply to the collection, processing, storage, and dissemination of communications collected by electronic surveillance authorized pursuant to FISA, Public Law 95-511 ("the Act"). The procedures also apply to the acquisition of technical intelligence, other than the spoken communications of individuals, conducted under certification of the Attorney General, pursuant to Section 102(a)(1)(A)(ii) of the Act.

SECTION 2 - DEFINITIONS

2.1. (U) In addition to the definitions in Section 3 of USSID 18, the following definitions shall apply to this annex. If a term is defined in Section 3 of USSID 18 and in this annex, only the definition in this annex shall be used for surveillance activities conducted pursuant to the Act. 2.2. (U) "Foreign power" means -

a. A foreign government or any component thereof, whether or not recognized by the United States;

PAGE 1

SECRET xxxxxxxxxxxxxxxxxxxxxxx


SECRET xxxxxxxxxxxxxxxxxxxxxxx

USSID 18, ANNEX A
20 October 1980

b. A faction of a foreign nation, or nations, not substantially composed of U.S. persons;

c. An entity that is openly acknowledged by a forelgn government or governments to be directed and controlled by such foreign government or governments;

d. A group engaged in international terrorism or activities in preparation therefor;

e. A foreign-based political organization, not substantially composed of U.S. persons; or

f. An entity that is directed and controlled by a foreign government or governments.

2.3. (U) "Foreign intelligence information means -

a. Information that relates to, and if concerning a U.S. person, is neceSSary to, the ability of the United States to protect against -
(1) Actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power;

(2) Sabotage or international terrorism by a foreign power or an agent of a foreign power; or

(3) Clandestine intelligence activities by an intelligence service or network of a foreign power or by an agent of a foreign power; or

b. Information with respect to a foreign power or foreign territory that relates to, and if concerning a U.S. person, is necessary to -

(1) The national defense or the security of the United States; or

(2) The conduct of the foreign affairs of the United States.

2.4. (U) "Contents," when used with respect to a communication, include any information concerning the identity of the parties to such communication or the existence, substance, purport, or meaning of that communication.

2.5. (U) "Electronic surveillance" means -

a. The acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication sent by, or intended to be received by, a particular, known U.S. person who is in the United States,

PAGE 2

SECRET xxxxxxxxxxxxxxxxxxxxxxx


SECRET xxxxxxxxxxxxxxxxxxxxxxx

USSID 18, ANNEX A
20 October 1980

if the contents are acquired by intentionally targeting that U.S. person, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes;

b. The acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire communication to or from a person in the United States, without the consent of any party thereto, if such acquisition occurs ia the United States;

c. The intentional acquisition by aa electronic, mechanical, or other surveillance device of the contents of any radio connunication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States; or

d. The installation or use of an electronic, mechanical, or other surveillance device in the United States for monitoring to acquire information, other than from a wire or radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes.

NOTE: Communication intercept activity that does not fall within the above definition and that results in the incidental acquisition of communications sent from, or intended for, receipt within the United States does not thereby become electronic surveillance within the meaning of this definition.

2.6. (U) "U.S. person" means a citizea of the United States, an alien lawfully admitted for permanent residence (as defined in Section 101(a)(20) of the Immigration and Nationality Act), an unincorporated association, a substantial number of members of which are citizens of the United States, or aliens lawfully admitted for permanent residence, or a corporation which is incorporated in the Uaited States, but does not include a corporation or an associatioa which is a foreign power, as defined in subsections 2.2a, b, or c.

2.7. (U) "Wire communication" means any communication while it is being carried by a wire, cable, or other like connection, furnished or operated by any person engaged as a common carrier in providing or operating such facilities, for the transmission of interstate or foreign communications.

PAGE 3

SECRET xxxxxxxxxxxxxxxxxxxxxxx


SECRET xxxxxxxxxxxxxxxxxxxxxxx

USSID 18, ANNEX A
20 October 1980

SECTION 3 - GENERAL

3.1. (U) Collection of foreign intelligence information by electronic surveillance as defined in paragraph 2.5 shall be accomplished only in accordance with an order of the United States Foreign Intelligence Surveillance Court (USFISC) or a certification of the Attorney General. In any case in which it is necessary for the USSS to conduct electronic surveillance, a request to secure a court order or Attorney General certification will be forwarded by the appropriate Rey Component through the General Counsel to the Director. Only targets that meet the definition of either agent of a foreign power or foreign power may be considered for approval pursuant to the Act.

SECTION 4 - MINIMIZATION PROCEDURES

4.1. (U) Each surveillance authorized pursuant to the Act must be conducted pursuant to the minimization procedures approved by the USFISC or the Attorney General for that particular surveillance. Minimization procedures will be attached to each court order or Attorney General certification that is issued and will regulate the collection, processing, storage, and dissemination of information concerning unconsenting U.S. persons consistent with the need of the United States to obtain, produce, and disseminate foreign intelligence information.

4.2. (S) The Attorney General has approved standard minimization procedures applicable to electronic surveillance activities pursuant to the Act. These minimization procedures apply to electronic surveillances authorized by the USFISC or the Attorney General pursuant to the Act, except as provided in subsection 4.4 of this annex.

MINIMIZATION PROCEDURES

Pursuant to Section 101(h) of the Foreign Intelligence Surveillance Act of 1978, the following procedures have been adopted by the Attorney General, and shall be followed by the National Security Agency in implementing this electronic surveillance as ordered by the Court: (S)

PAGE 4

SECRET xxxxxxxxxxxxxxxxxxxxxxx


SECRET xxxxxxxxxxxxxxxxxxxxxxx

USSID 18, ANNEX A
20 October 1980

Sec. 1 - Applicability and Scope.

[12 lines censored]

Sec. 2. Definitions.

In addition to the definitions in Section 2 of this annex, the following definitions shall apply to these procedures:

(a) Acquisition means the interception by the National Security Agency through electronic means of a communication to which it is not an intended party and the processing of the contents of that coamunication into an intelligible form intended for human inspection. (U)

(b) Available publicly means information that a member of the public could obtain on request, by research in public sources, or that has been obtained by casual observation. (U)

(c) Consent is the agreement by a person or organization to permit the USSS to take particular actions that affect the person or organization. An agreement by an organization with the National Security Agency to permit collection of information shall be deemed valid consent if given on behalf of such organization by an official or governing body, determined by the General Counsel, National Security Agency, to have actual or apparent authority to make such an agreement.

(d) Identification of a United States person means the name, unique title, address or other personal identifier of a U.S. person in the context of activities conducted by that person or activities conducted by others and related to that person. A reference to a product by brand name, or manufacturer's name or the use of a name in a descriptive sense; for example, "Monroe Doctrine," is not an identification of a U.S. person. (U)

PAGE 5

SECRET xxxxxxxxxxxxxxxxxxxxxxx


SECRET xxxxxxxxxxxxxxxxxxxxxxx

USSID 18, ANNEX A
20 October 1980

(e) Technical data base neans information retained for cryptanalytic or traffic analytic purposes.

(f) U.S. person. The following guidelines will apply in determining vhether a person is 2 U.S. person:

(1) A person known to be currently in tne United States will be treated as a U.S. person unless that person is positively identified as an alien who has not been admitted for permanent residence or if the nature of the person's communications or other indicia in the contents or circumstances of such communications give rise to a reasonable belief that such person is not a U.S. person.

(2) A person known to be currently outside the United States, or whose location is not known, will not be treated as a U.S. person unless such person can be identified positively as such or the nature of the person's communications or other indicia in the contents or circumstances of such connunications give rise to a reasonable belief that such person is a U.S. person.

(3) A person known to be an alien admitted for permanent residence may be assumed to have lost status as a U.S. person if the person leaves the United States and it is known that the person is not in compliance with the administrative formalities provided by law that enable such person to reenter the United States without regard to the provisions of law that would otherwise restrict an alien's entry into the United States. The failure to follow the statutory procedures provides a reasonable basis to conclude that such alien has abandoned any intention of maintaining status as a permanent resident alien.

(4) An unincorporated association whose headquarters are located outside the United States may be presumed not to be a U.S. person unless the USSS has information indicating that a substantial number of members are citizens of the United States or aliens lawfully admitted for permanent residence.

PAGE 6

SECRET xxxxxxxxxxxxxxxxxxxxxxx


SECRET xxxxxxxxxxxxxxxxxxxxxxx

USSID 18, ANNEX A
20 October 1980

Sec. 3. Acquisition.

The collection of information by electronic surveillance subject to these procedures shall be accomplished in accordance with the certification of the Attorney General or the court order authorizing such-surveillance and will be conducted by technical means, and in a manner designed to minimize to the greatest extent reasonably feasible the acquisition of information which is not relevant to the authorized purpose of the surveillance. Collection personnel will monitor the collection of raw data at regular intervals to verify that the surveillance is not avoidably acquiring communications of U.S. persons outside the authorized scope of the surveillance or information concerning U.S. persons not related to the purpose of the surveillance. Personnel who process intercepted data into an intelligible form intended for inspection by analysts will discard inadvertently acquired communications of, or information concerning, U.S. persons at the earliest practicable point in the processing cycle at which such communication or information can be identified as clearly not relevant to the authorized purpose of the surveillance. Communications of, or information concerning, U.S. persons which may be related to the purpose of the surveillance may be forwarded to analytic personnel who are responsible for producing intelligeace information from the collected data. Any such communication or information acquired ia the course of an authorized surveillance may be retained and disseminated only in accordance with Sections 4 and 5 of these procedures. (S)

[12 lines censored]

PAGE 7

SECRET xxxxxxxxxxxxxxxxxxxxxxx


SECRET xxxxxxxxxxxxxxxxxxxxxxx

USSID 18, ANNEX A
20 October 1980

[50 lines censored]

Sec. 5. Dissemination.
(a) Dissemination of intelligence reports or translations that include an identification of a U.S. person may be made only if one of the following criteria is met:
The U.S. person has consented to the use of communications of, or concerning, him or her and has executed the applicable consent form (see Annex I).

The information is available publicly; for example, the information is derived from unclassified collateral information available to the general public.

The identity of the U.S. person is necessary to understand foreign intelligence information or assess its importance; for example, the identity of a senior official

PAGE 8

SECRET xxxxxxxxxxxxxxxxxxxxxxx


SECRET xxxxxxxxxxxxxxxxxxxxxxx

USSID 18, ANNEX A
20 October 1980

in the Executive Branch. Such officials, when identified, will be identified only by their official titles; For example, "President of the United States."

The coMmunication or information indicates that the U.S. person may be an agent of a foreign power.

The communication or information that is being disseminated indicates that tne U.S. person may be:

A foreign power as defined in this annex, paragraph 2.2d and f;

Residing outside the United States and holding an official position in the government or silitary forces of a foreign power such that information about his activities would constitute foreign intelligenze;

A corporation or other entity that is owned or controlled directly or indirectly by a foreign power; or,

Acting in collaboration with an intelligence or security service of a foreign power, and the U.S. person has, or has had, access to information or material classified by the United States;

The communication or information indicates that the U.S. person may be the target of intelligence activities of a foreign power.

The communication or information indicates that the U.S. person is engaged in the unauthorized disclosure of classified national security information, but only after the agency that originated the information certifies that it is properly classified.

The communication or information indicates that the U.S. person may be engaging in international terrorist activities.

The interception of the U.S. person's communication was authorized by a court order issued pursuant to Section 105 of the Act and the communication may relate to the foreign intelligence purpose of the surveillance.

The communication or information is evidence that a crime has been, is being, or is about to be committed, provided that dissemination is for law enforcement purposes;

PAGE 9

SECRET xxxxxxxxxxxxxxxxxxxxxxx


SECRET xxxxxxxxxxxxxxxxxxxxxxx

USSID 18, ANNEX A
20 October 1980

for example, the communication or information indicates a possible threat to the life or physical safety of any person.

(b) A report based on a communication of, or information concerning, an unconsenting U.S. person that is not publicly available may be disseminated without regard to the limitations in (a) above if the identity of the U.S. person is deleted and a generic term or symbol is substituted so that the inforsation in the context of the communication cannot reasonably be connected with an identifiable U.S. person. (U)

(c) Reports based on the communications of, or containing information concerning, an identified unconsenting U.S. person may only be disseminated to a recipient requiring the identity of such person in the performance of official duties. (U)

(d) Upon recognition that a radio communication to which all parties are in the United States has been unintentionally acquired under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, such communication shall be destroyed promptly unless the Attorney General determines that the contents indicate a threat of death or serious bodily harm to any person. (U)

4.3. (C) If, during the course of electronic surveillance authorized by Attorney General certification, the contents of any communication to which a U.S. person is a party are acquired, that communication shall not be disclosed, disseminated, or used for any purpose or retained for longer than 24 hours after recognition unless a court order is obtained or unless the Attorney General determines that the information indicates a threat of death or serious bodily harm to any person.

4.4. (C) While the minimization procedures set forth in 4.2 and 4.3 are the standard procedures used for surveillance activities conducted by NSA pursuant to the Act, it may be necessary to develop special procedures on a case-by-case basis. Those procedures will be provided directly to the personnel responsible for collecting, processing, storing, and disseminating the information collected by that particular electronic surveillance.

PAGE 10

SECRET xxxxxxxxxxxxxxxxxxxxxxx


SECRET xxxxxxxxxxxxxxxxxxxxxxx

USSID 18, ANNEX A
20 October 1980

SECTION 5 - RESPONSIBILITIES

[3 lines censored]

5.2. (U) The General Counsel will review requests to conduct electronic surveillance pursuant to the Act and will prepare applications for securing court orders and requests for Attorney General certifications.









PAGE 11

SECRET xxxxxxxxxxxxxxxxxxxxxxx


FOR OFFICIAL USE ONLY

USSID 18
20 October 1980

ANNEX B

OPERATIONAL ASSISTANCE TO THE FEDERAL BUREAU OF INVESTIGATION (U)

SECTION 1 - GENERAL

1.1. (U) In accordance with the provisions of Section 2-309(c) of E.O. 12036, the National Security Agency may provide specialized equipment and technical knowledge to the FBI to assist the Bureau in the conduct of its lawful functions. When requesting such assistance, the FBI shall certify to the General Counsel of NSA that such equipment or technical knowledge is necessary to the accomplishment of one or more of the Bureau's lawful functions.

1.2. (U) NSA may also provide expert personnel to assist Bureau personnel in the operation or installation of specialized equipment when that equipment is to be employed to collect foreign intelligence or counterintelligence. When requesting the assistance of expert personnel, the FBI shall certify to the General Counsel that such assistance is necessary to collect foreign intelligence or counterintelligence and that the approval of the Attorney General (and, when necessary. a warrant from a court of competent jurisdiction) has been obtained.

SECTION 2 - CONTROL

2.1 (U) No operational assistance as discussed in Section 1 shall be provided without the express permission of the Director, NSA/Chief, CSS.

PAGE 1

FOR OFFICIAL USE ONLY


CONFIDENTIAL xxxxxxxxxxxxxxxxxxxx

USSID 18
20 October 1980

ANNEX C

SIGNALS INTELLIGENCE SUPPORT TO U.S. AND ALLIED MILITARY EXERCISE
COMMAND AUTHORITIES (U)

SECTION 1 - POLICY

1.1. (C) Signals intelligence support to U.S. and Allied military exercise command authorities is provided for in USSID 56 and DoD Directive 5200.17 (M-2). JCS Secretary's Memorandum 485-73, annexed to USSID 4, establishes doctrine and procedures for providing signals intelligence support to military commanders. The procedures in this annex provide policy guidelines for safeguarding the rights of U.S. persons in the conduct of Exercise SIGINT support activities.

SECTION 2 - DEFINITIONS

2.1. (U) Military Tactical Communications mean United States and Allied military exercise communications, within the United States and abroad, that are necessary for the production of simulated foreign intelligence and counterintelligence or to permit an analysis of communications security.

SECTION 3 - PROCEDURES

3.1. (C xxx) The USSS may collect, process, store, and disseminate military tactical communications that are also communications of, or concerning, U.S persons.

a. Collection efforts will be conducted in such a manner as to avoid, to the extent feasible, the intercept of non-exercise-related communications.

PAGE 1

CONFIDENTIAL xxxxxxxxxxxxxxxxxxxx


CONFIDENTIAL xxxxxxxxxxxxxxxxxxxx

USSID 18, ANNEX C
20 October 1980

b. Military tactical communications may be stored and processed without deletion of references to U.S. persons if the names and communications of the U.S. persons who are exercise participants, whether military, government, or contractor, are contained in, or such communications constitute, exercise-related communications or fictitious communications or information prepared for the exercise.

c. Communications of U.S. persons not participating in the exercise that are inadvertently intercepted during the exercise shall be destroyed a soon as feasible. [5 lines censored]

d. Dissemination of military exercise communications, exercise reports, or information files derived from such communications shall be limited to those authoritiies and persons participating in, or conducting, reviews and critiques thereof.




PAGE 2

CONFIDENTIAL xxxxxxxxxxxxxxxxxxxx


CONFIDENTIAL xxxxxxxxxxxxxxxxxxxx

USSID 18
20 October 1980

ANNEX D

TEST AND EVALUATION OF ELECTRONIC EQUIPMENT (U)

SECTION 1 - PURPOSE AND APPLICABILITY

1.1. (U) This annex applies to the testing (including calibration) and evaluation of electronic equipment that has the capability to intercept communications. Testing and evaluations of such electronic equipment will be conducted, to the maximum extent that is practical, without interception of the communications of U.S. persons.

SECTION 2 - PROCEDURES

2.1. (U) The USSS may test electronic equipment that has the capability to intercept communications subject to the following limitations:

a. To the maximum extent that is practical, the following should be used --
(1) Laboratory-generated signals;

(2) Department of Defense official agency communications with consent from an appropriate DoD official;

(3) Official government agency communications with consent from an appropriate official of the originating agency;

(4) Individual government employee communications with consent from  the employee; or

(5) Communications transmitted between terminals located outside the United States not used by any known U.S. person.

b. Where it is not practical to test electronic equipment solely against signals described in paragraph 2.1a, above, testing may be conducted, provided --

PAGE 1

CONFIDENTIAL xxxxxxxxxxxxxxxxxxxx


CONFIDENTIAL xxxxxxxxxxxxxxxxxxxx

USSID 18, ANNEX D
20 October 1980

(1) It is limited in scope and duration to that necessary to determine the capability of the equipment;

(2) No particular U.S. person is targeted intentionally without consent and it is not reasonable to obtain the consent of the persons incidentally subjected to the surveillance; and

(3) The test does not exceed 90 calendar days.

c. Where the test involves cowmunications other than those identified in 2.1a and a test period longer than 90 days is required, a test proposal and plan shall be submitted to the Attorney General for approval. Such proposals and plans shall be submitted to the Director, NSA, through the General Counsel, NSA, for transmission to the Attorney General. The test proposal shall state the requirement for an extended test involving such communications, the nature of the test, the organization that will conduct the test, and the proposed disposition of any signals or communications acquired during the test.

2.2. (U) The content of any communication acquired during a test and evaluation shall be:

a. Retained only for the purpose of deteroining the capability of the electronic equipment;

b. Disclosed only to persons conducting or evaluating the test; and

c. Destroyed upon coupletion of the testing.

2.3. (U) The technical parameters of a communication, such as frequency, modulation, and time of activity of acquired electronic signals, may be retained and used for test reporting or collection-avoidance purposes. Such parameters way be disseminated to other DoD intelligence components and other entities authorized to conduct electronic surveillance, provided such dissemination and use are limited to testing, evaluation, or collection-avoidance purposes. No content of any communication may be retained or used.



PAGE 2

CONFIDENTIAL xxxxxxxxxxxxxxxxxxxx


CONFIDENTIAL xxxxxxxxxxxxxxxxxxxx

USSID 18
20 October 1980

ANNEX E

COMMUNICATIONS SECURITY (U)

SECTION 1 - PURPOSE

1.1. (U) This annex is provided for information purposes only since USSID are not directive for Communications Security (COMSEC) operations. Implementation of COMSEC surveillance policy and procedures is in National COMSEC Instruction (NACSI) 4000.

SECTION 2 - DEFINITIONS

2.1. (U) Communications security is the protective measures taken to deny unauthorized persons information derived from telecommunications of the U.S. Government related to the national security and to ensure the authenticity of such telecommunications. Communications security also includes the protection of communications containing government-derived unclassified information that relates to the national security. It includes the protection of telecommunications of organizations holding classified Defense contracts or otherwise involved in the industrial security program. It also includes the assessment of the vulnerability of United States communications to foreign electronic surveillance.

2.2. (U) Communications security entity means each entity subject to the guidance of the Secretary of Defense, acting as the executive agent of the United States Government, and the Director, NSA, acting for the Secretary in executing responsibilities as executive agent, that carries out any of the communications security activities of the United States Government.

2.3. (U) Hearability survey means monitoring radio communications to determine whether a particular radio signal can be received at one or more locations and, if reception is possible, to determine the quality of reception over time.

PAGE 1

CONFIDENTIAL xxxxxxxxxxxxxxxxxxxx


CONFIDENTIAL xxxxxxxxxxxxxxxxxxxx

USSID 18, ANNEX E
20 October 1980

SECTION 3 - PROCEDURES

3.1. (U) Communications security monitoring may be directed against the communications of U.S. persons only:

a. With the consent of one of the parties to the communication;

b. As a part of a communication vulnerability survey (see paragraph 3.2); or

c. As part of a hearability survey.

3.2. (U) NSA may survey or authorize the survey by other communications security entities of the transmission facilities of communications common carriers, other private commercial entities, or the federal government to determine the potential vulnerability of those facilities to surveillance sctivities conducted by foreign powers.

a. No communication vulnerability survey may be conducted without the prior written approval of the Deputy Director for Communications Security, NSA.

b. Information collected during a communications vulnerability survey must be stored and processed as follows:

(1) No transmission may be acquired aurally.

(2) No transmission may be demultiplexed or demodulated for any purpose except to detect by a visual display device a test tone placed on the transmission by the owner or operator of the facility.

(3) No content may be acquired and no transmission may be recorded.

(4) Reports and logs may be compiled and retained, provided that no report or log may identify any person or entity except to the extent of identifying those transmission facilities that are vulnerable to surveillance by foreign powers. If the identities of the users of such facilities are not identical with the identities of the owners of the facilities, and their identities are relevant to the national security in light of the vulnerability of the facilities, the identity of such users may be obtained, provided such identities may not be obtained from the content of the transmissions themselves. The reports may be disseminated. Logs may be disseminated only if required to verify results contained in reports.

3.3. (U) NSA may conduct, or may authorize the conduct of, hearability surveys of telecommunications that are transmitted in the United States.

PAGE 2

CONFIDENTIAL xxxxxxxxxxxxxxxxxxxx


CONFIDENTIAL xxxxxxxxxxxxxxxxxxxx

USSID 18, ANNEX E
20 October 1980

a. Where practicable, consent will be secured from the owner or user of the facility against which the hearability survey is to be conducted prior to the commencement of the survey.

b. Information collected during a hearability survey must be processed and stored as follows:

(1) The content of the communication may not be recorded nor included in any report.

(2) No microwave transmission may be demultiplexed or demodulated for any purpose.

(3) No report or log may identify any person or entity except to the extent of identifying the transmission facility that can be intercepted from the intercept site. If the identities of the users of such facilities are not identical with the identities of the owners of the facilities, and their identities are relevant to the purpose for which the hearability surveys has been conducted, the identity of such users may be obtained, provided such identity may not be obtained from the content of the transmission themselves.

c. Reports may be disseminated only within the United States Government. Logs may not be disseminated unless they are required to verify results contained in the reports.

PAGE 3

CONFIDENTIAL xxxxxxxxxxxxxxxxxxxx


SECRET xxxxxxxxxxxxxxxxxxxx

USSID 18
20 October 1980

ANNEX F

SEARCH AND DEVELOPMENT OPERATIONS (U)

SECTION 1 - GENERAL

1.1. (C) This annex provides the procedures for safeguarding the rights of U.S. persons when conducting SIGINT search and development activities.

[15 lines censored]

b. Communications originated or intended for receipt in the United States or originated or intended for receipt by U.S. persons shall be processed in accordance with Section 6 of USSID 18. [4 lines censored]

c. Information necessary for cataloging the constituent elements of the signal environment may be disseminated to the extent such information does not identify U.S. persons, provided that communications equipment nomenclature may be disseminated. Information that reveals a vulnerability to United States communications security may be disseminated to the appropriate communications security authorities.

PAGE 1

SECRET xxxxxxxxxxxxxxxxxxxx


SECRET xxxxxxxxxxxxxxxxxxxx

USSID 18, ANNEX F
20 October 1980

d. All information obtained in the process of search and development that appears to be of foreign intelligence value may be forwarded to the proper analytic office within NSA for processing and dissemination in accordance with relevant portions of USSID 18.

SECTION 2 - CONTROL

2.1. (U) The DDO shall ensure compliance with these procedures.








PAGE 2

SECRET xxxxxxxxxxxxxxxxxxxx


[Annex G censored]


FOR OFFICIAL USE ONLY

USSID 18
20 October 1980

ANNEX H

TRAINING OF PERSONNEL IN THE OPERATION AHD USE OF ELECTRONIC
COMMUNICATIONS AND SIGINT COLLECTION EQUIPMENT (U)

SECTION 1 - APPLICABILITY

1.1. (U) This annex applies to the training of personnel by USSS components in the operation and use of SIGINT collection equipment. This annex does not apply to the interception of communications with the consent of one of the parties to the communication.

SECTION 2 - DEFINITION

2.1. (U) Electronic communications equipment means electronic equipment capable of undetected interception of electronic or oral communications. It does not include equipment designed for use only in the transmission of communications. It does not include equipment designed to determine the direction and location of radio transmitters, such as radio direction finding equipment.

SECTION 3 - POLICY

3.1. (U) Training of USSS personnel in the operation and use of SIGINT collection equipment is conducted, to the maximum extent that is practical, without interception of the communications of U.S. persons who have not given consent.

PAGE l

FOR OFFICIAL USE ONLY


FOR OFFICIAL USE ONLY

USSID 18, ANNEX H
20 October 1980

SECTION 4 - PROCEDURES

4.1. (U) The training of USSS personnel in the operation and use of SIGINT collection equipment shall include guidance concerning the requirements and restrictions of the FISA, Executive Order 12036, and USSID 18 with respect to the unauthorized acquisition, storage, and dissemination of the content of communications of U.S. persons.

4.2. (U) The use of SIGINT collection equipment for training purposes is subject to the following limitations:

a. To the maximum extent that is practical, use of such equipment for training purposes shall be directed against intelligence targets otherwise authorized;

b. The contents of private communications of nonconsenting U.S. persons may not be acquired aurally unless the person is an authorized target of electronic surveillance; and

c. The electronic surveillance will be limited in extent and duration to that necessary to train personnel in the use of the equipment.

4.3. (U) The limitations in paragraph 4.2 do not apply in the following instances:

a. Public broadcasts, distress signals, or official United States Government communications may be monitored, provided that, where governrent agency communications are monitored, the consent of an appropriate official is obtained.

b. Minimal acquisition of information is permitted as required for calibration Purposes.

4.4. (U) Information collected during training that involves authorized intelligence targets may be stored in accordance with Section 7 of USSID 18 and disseminated in accordance with Section 8 of USSID 18. Information other than distress signals collected during training that does not involve authorized intelligence targets or that is acquired inadvertently shall be destroyed as soon as practical or upon completion of the training and may not be disseminated outside the USSS for any purpose. Distress signals should be referred to the DDO.

PAGE 2

FOR OFFICIAL USE ONLY


FOR OFFICIAL USE ONLY

USSID 18
20 October 1980

ANNEX I

SAMPLE CONSENT FORMS (U)

SECTION 1 - PURPOSE

1.1. (U) The consent forms, shown herein, are samples of those used to record an agreement betweeen the U.S. person and NSA concerning the collection and dissemination of foreign comsunications by or about the U.S. person.

1.2. (U) The first sample form is for consent to collect and disseminate a U.S. person's communications and references to that person in foreign communications. The second sample form is for consent to collect and disseminate only references to the U.S. person in foreign communications.




PAGE 1

FOR OFFICIAL USE ONLY


[Both consent forms have large "SAMPLE" stamp across text]

                               FOR OFFICLAL USE ONLY

                                                  USSID 18, ANNEX I
                                                  20 October 1980


                                 EXECUTIVE ORDER


                                CONSENT AGREEMENT


                          SIGNALS INTELLIGENCE COVERAGE


    I, __________(full name)___________, __________(title)__________, hereby
consent to the National Security Agency undertaking to seek and disseminate
communications to or from or referencing me in foreign communications for the
purpose of ________________________________________________________________.

    This consent applies to administrative messages alerting elements of the
United States Signals Intelligence System to this consent, as well as to any
signals intelligence reports that may relate to the purpose stated above.

    Except as otherwise provided by Executive Order 12036 procedures, this
consent covers only information that relates to the purpose stated above
and is effective for the period ____(date)____ to ____(date)____.

    Signals intelligence reports containing information derived from
communications to or from me may only be disseminated to me and to
___________________________________. Signals intelligence reports containing
information derived from communications referencing me may only be
disseminated to me and to __________________________________________________
except as otherwise permitted by procedures under Executive Order 12036.




                                            (SIGNATURE)

                                            (TITLE)    (DATE)










                                 PAGE 2

                           FOR OFFICIAL USE ONLY


FOR OFFICLAL USE ONLY USSID 18, ANNEX I 20 October 1980 EXECUTIVE ORDER CONSENT AGREEMENT SIGNALS INTELLIGENCE COVERAGE I, __________(full name)___________, __________(title)__________, hereby consent to the National Security Agency undertaking to seek and disseminate references to me in foreign communications for the purpose of ________________________________________________________________. This consent applies to administrative messages alerting elements of the United States Signals Intelligence System to this consent, as well as to any signals intelligence reports that may relate to the purpose stated above. Except as otherwise provided by Executive Order 12036 procedures, this consent covers only references to me in foreign communications and information derived therefrom that relate to the purpose stated above. This consent is effective for the period ____(date)____ to ____(date)____. Signals intelligence reports containing information derived from communications referenicng me and related to the purpose stated above may only be disseminated to me and to __________________________________ except as otherwise permitted by procedures under Executive Order 12036. (SIGNATURE) (TITLE) (DATE) PAGE 3 FOR OFFICIAL USE ONLY


Transcription and HTML by Cryptome.