<P> When my oldest son was asked the same question: "Has he been approached by the NSA about backdoors?" he said "No", but at the same time he nodded . Then he was sort of in the legal free . He had given the right answer, everybody understood that the NSA had approached him . </P> <P> IBM Notes was the first widely adopted software product to use public key cryptography for client--server and server--server authentication and for encryption of data . Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits . In 1997, Lotus negotiated an agreement with the NSA that allowed export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a "workload reduction factor" for the NSA . This strengthened the protection for users of Notes outside the US against private - sector industrial espionage, but not against spying by the US government . </P> <P> While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA's ability to surveil the domestic Internet traffic of foreign countries . Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another . Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang routing of Canadian Internet service providers . </P> <P> A document included in NSA files released with Glenn Greenwald's book No Place to Hide details how the agency's Tailored Access Operations (TAO) and other NSA units gain access to hardware . They intercept routers, servers and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered . This was described by an NSA manager as "some of the most productive operations in TAO because they preposition access points into hard target networks around the world ." </P>

Which of the following nsa offices oversees the function of the military cryptologic system