Advertisement
Guest User

Penetrating Hard Targets - Owning the Net - 01/02/2014

a guest
Jan 2nd, 2014
111
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.29 KB | None | 0 0
  1. Excerpts from the “black budget,” Volume 2, “Combined Cryptologic Program”:
  2.  
  3. (U) RESEARCH & TECHNOLOGY (U) PENETRATING
  4. HARD TARGETS
  5. (U) Project Description
  6. (S//SI//REL TO USA, FVEY) The Penetrating Hard Targets Project
  7. provides proof-of-concept technological solutions to {...} enable:
  8. {...}
  9. • (S//SI//REL TO USA, FVEY) Breaking strong encryption.
  10.  
  11. (TS//SI//REL TO USA, FVEY) This Project focuses on meeting those
  12. customer requirements that will directly impact the end-to-end SIGINT
  13. mission during the next decade and beyond. It provides advanced
  14. knowledge of technology trends and opportunities to steer IT products
  15. and standards in a SIGINT-friendly direction. This Project contains the
  16. Penetrating Hard Targets Sub-Project. 

  17. (U) Base resources in this project are used to:
  18.  
  19. {...}
  20.  
  21. • (S//SI//REL TO USA, FVEY) Conduct basic research in quantum
  22. physics and architecture/engineering studies to determine if, and
  23. how, a cryptologically useful quantum computer can be built.
  24.  
  25.  
  26. --
  27.  
  28. {...}
  29.  
  30. (U) The CCP expects this Project to accomplish the following in FY
  31. 2013:
  32. {...}
  33.  
  34. • (TS//SI//REL TO USA, FVEY) Demonstrate dynamical decoupling
  35. and complete quantum control on two semiconductor qubits. A
  36. qubit is the basic “building block” of a quantum computer. This
  37. will enable initial scaling towards large systems in related and
  38. follow-on efforts. [CCP_0127]
  39.  
  40. (U) RESEARCH & TECHNOLOGY
  41. (U) OWNING THE NET
  42. (U) Project Description
  43. (TS//SI//REL TO USA, FVEY) The Owning the Net (OTN) Project
  44. provides the technological means for NSA/CSS to gain access to and
  45. securely return high value target communications. By concentrating on
  46. the means of communication, the network itself, and network links
  47. rather than end systems, OTN research manipulates equipment
  48. hardware and software to control an adversary's network. Research is
  49. conducted at the Laboratory for Telecommunications Sciences in
  50. College Park, MD, and supports the evolving NSA/CSS internal
  51. information infrastructure and the larger IC.
  52.  
  53.  
  54. --
  55.  
  56. {...}
  57.  
  58. (U) Base resources in this project are used to:
  59.  
  60. {...}
  61.  
  62. • (TS//SI//REL TO USA, FVEY) Continue research of quantum
  63. communications technology to support the development of novel
  64. Quantum Key Distribution (QKD) attacks and assess the security
  65. of new QKD system designs.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement