Filtered By
NSAX
Agency [filter]
Results
575 Total
1.0

Strawhorse: Attacking the MacOS and iOS Software Development Kit

Document

Document Date: 2012-02-10Release Date: 2015-03-10
This NSA summary of a talk presented at the 2012 TCB Jamboree describes a Sandia National Laboratories approach to attacking Apple technology using compromised developer tools: see the Intercept article iSpy: The CIA Campaign to Steal Apple’s Secrets, 10 March 2015.
[edit] (S//NF) Strawhorse: Attacking the MacOS and iOS Software Development Kit (S) Presenter: Sandia National Laboratories (S//NF) Ken Thompson's gcc attack (described in his 1984 Turing aw...
1.0

NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks

Document

Document Date: 2010-01-01Release Date: 2013-09-16
These three slides from an NSA presentation made for the 2010 SIGDEV conference show that the agency is actively targeting payments networks: see the Der Spiegel article ‘Follow the Money’: NSA Monitors Financial World, 13 September 2013.
(S//REL TO USA, FVEY) NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks (U//FOUO) NSA, Network Analysis Center 2010 SIGDEV Conference 09/13/13 SE...
1.0

Roger Dingledine at NSA NOV 2007

Document

Document Date: 2007-11-01Release Date: 2013-10-04
This NSA memo summarises a talk given by Roger Dingledine of the Tor Project on 1 November 2007: see the Secret NSA documents show campaign against Tor encrypted network, 4 October 2013.
TOP SECRET // COMINT // REL TO USA, AUS, CAN, GBR, NZL Roger Dingledine at NSA NOV 2007 From PE Contents * 1 (U) Talk by Roger Dingledine at NSA, 11/01/2007 at R&E (Sponsored by NSA RT) o 1...
1.0

SUSLOW monthly report for March 2013

Document

Document Date: 2013-03-01Release Date: 2015-03-10
This NSA document from March 2013 gives an update on GCSB activities, including the use of WARRIOR PRIDE malware against an ASEAN country and the Kim Dotcom case: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY (U//FOUO) SUSLOW Monthly Report for March 2013 (U) March highlights: - (U) Intelligence update: o (TS//SI//REL TO USA, FVEY) GCSB has a WARRIORPRIDE ca...
1.0

HIDDENSALAMANDER: Alerting and Characterization of Botnet Activity in TURMOIL

Document

Release Date: 2015-01-17
This undated NSA presentation describes techniques for detecting botnets: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
P SECRET//COMINT//REL TO USA, FVEY HIDDENSALAMANDER Alerting and Characterization of _____iyiissiQr\] CAPABILIT, ES Botnet Activity in TURMOIL Briefers: SECRET//REL TO USA, FV...
1.0

TUTELAGE

Document

Release Date: 2015-01-17
This undated NSA presentation describes tecniques for repurposing third party attack tools: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT ■ Communications Security Establishment Canada Centre de la sécurité des télécommunications Canada CSEC SIGINT Cyber Discovery: Summary of the current effort ...
1.0

History of the US – Israel SIGINT Relationship, post 1992

Document

Document Date: 2007-01-01Release Date: 2014-05-13
This short extract, taken from a 2007 NSA report on the history of intelligence cooperation between the US and Israel, describe some of the difficulties of that relationship: see the book No Place To Hide, 13 May 2014.
(TS//S1//NF) As close as the ISNU relationship has become, it has not been without tension. The Jonathan Pollard incident is one example that had a negative, albeit temporary, impact to the S1G1...
1.0

How is Human Language (HTL) Progressing?

Document

Document Date: 2011-09-06Release Date: 2015-05-05
This 6 September 2011 post from the NSA’s internal SIDToday newsletter describes progress in the agency’s speech-to-text capability over the course of the year: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
(S//SI//REL) How Is Human Language Technology (HLT) Progressing? FROM: (U//FOUO)^^^H Language Analysis Modernization Lead (S2) Run Date: 09/06/2011 (S//SI//REL) Editor's intro: At the SI...
1.0

RT10 Overview

Document

Document Date: 2006-06-05Release Date: 2015-05-05
This NSA presentation from June 2006 describes advances in voice recognition technology, particularly in the context of operations in Iraq: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
RT10 Overview June 2006 TOPSECRET//COMINT//20291123 TOPSECRET//COMINT//20291123 Current Challenges - Why Innovate? ► Network is converging and dataflow is increasing ► Pushing ev...
1.0

Classification Guide for Human Language Technology (HLT) Models

Document

Document Date: 2011-05-18Release Date: 2015-05-05
This NSA classification guide dated 18 May 2011 delineates the sensitivity of particular aspects of the agency’s speech-to-text capabilities: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
UNCLASSIFIED//FOR OFFICIAL USE ONLY NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) Classification Guide for Human Language Technology (HLT) Models 2-20 Effective Date: 18 May ...
1.0

Finding and Querying on Document Metadata

Document

Document Date: 2009-04-01Release Date: 2015-07-01
This NSA presentation from April 2009 explains how analysts can make use of document metadata available through XKeyScore, together with worked examples and screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Finding and Querying on Document Metadata tooz|/ 1 Booz|Allen| Hamilton Sigint Development Support / SIGINT Technica...
1.0

New FAA702 Certification in the Works – Cyber Threat

Document

Document Date: 2012-03-23Release Date: 2015-06-04
This NSA memo from 23 March 2012 presentation describes the agency’s proposal for a fourth FAA 702 certification that would allow it to target hackers “tied to malicious cyber activity”: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
(TS//SI//NF) New FAA702 Certification in the Works - Cyber Threat By on 2012-03-23 1423 (TS//SI//NF) NSA has drafted a new FAA702 Certification to target Cyber Threats. It is close to being r...
1.0

HTTP Activity vs. User Activity

Document

Document Date: 2009-06-19Release Date: 2015-07-01
This NSA presentation from 19 June 2009 explains the metadata capabilities of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL m V HTTP Activity vs User Activity 19 June 2009 Derived From: NSA/CSSM 1-52 Bated :l2007i MM TOP SEC...
1.0

Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints

Document

Document Date: 2010-05-01Release Date: 2015-07-01
This 61-page NSA presentation from May 2010 provides analysts with a guide to tracking individuals within XKeyScore using the system’s fingerprint capability: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints May 2010 TOP SECRET //COMINT //REL TO USA, AUS, CAN, GBR, NZL ...
1.0

FAIRVIEW Tour

Document

Document Date: 2012-03-28Release Date: 2015-08-15
This 28 March 2012 post from the NSA internal newsletter SSO Weekly describes the agency’s relationship with AT&T (FAIRVIEW) as “highly collaborative”: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
(TS//SI//REL FVEY) FAIRVIEW Tour By on 2012-03-28 1333 (TS//SI//REL FVEY) On 23 March, S3 and GAO Technical Directors: S3 - and HHHH7an^b^blGINT Lom^^nce and Arcnl^^U^e Lead I, a...
1.0

United Nations DNI Collection Enabled

Document

Document Date: 2012-04-18Release Date: 2015-08-15
This 18 April 2012 post from the NSA internal newsletter SSO Weekly reveals that AT&T (FAIRVIEW) cooperated with the NSA, under the terms of a FISA court order, to enable the agency to surveil the internet traffic going to and from the United Nations headquarters in New York: see the New York Times article AT&T […]
(TS//SI//NF) United Nations DNI Collection Enabled By on 2012-04-18 0853 (TS//SI//NF) FAIRVIEW and BLARNEY engineers collaborated to enable the delivery of 700Mbps of paired packet switched t...
1.0

YRS Gears up to Celebrate 40 Years

Document

Document Date: 2012-07-02Release Date: 2015-08-03
This July 2012 article from Northwest Passage, the NSA internal newsletter for the Yakima Research Station, marks the 40th anniversary of the base, including its involvement in ECHELON: see the Intercept article GCHQ and Me: My Life Unmasking British Eavesdroppers, 3 August 2015.
,he NORTHWEST PASSAGE TOP SECRET//SI//REL TO USA, FVEY Volume 3, Issue 7 Your Connection to the Yakima Research Station July 2012 (U) YRS Gears Up to Celebrate 40th Anniversary (S...
1.0

XKEYSCORE for Counter-CNE

Document

Document Date: 2011-03-01Release Date: 2015-07-01
This NSA presentation from March 2011 discusses the use of the XKeyScore tool for countering foreign CNE attacks: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-for-counter-cne-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, FVEY Using the XKS CNE dataset and a DISGRUNTLEDDUCK fingerprint, we now see at least 21 TAO boxes with evidence of this in...
1.0

The SIGINT Philosopher: In Praise of Not Knowing

Document

Document Date: 2012-08-16Release Date: 2015-08-11
This 16 August 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, considers how analysts should tackle the situation where they cannot fully answer the questions they are tasked with: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 • Web search • Agency-all Emails • SID-all Emai...
1.0

The SIGINT Philosopher: When Brevity Is Just the Soul of “Huh?”

Document

Document Date: 2012-07-16Release Date: 2015-08-11
This 16 July 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, discusses the hardships of writing reports for the agency: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 • Web search • Agency-all Emails • SID-all Emai...
1.0

XKEYSCORE Workflows 2011

Document

Document Date: 2011-09-19Release Date: 2015-07-01
This NSA presentation dated 19 September 2011 outlines the use of Workflows within XKeyScore and includes screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-workflows-2011-p1-normal.gif: XKEYSCORE Workflows 19 September 2011 SECRET7/COMINT//REL TO USA, AUS, CAN, GBR, MZL i —* DERIVED FROM: NSA/CSSM 1-52 DATED: 20070108...
1.0

XKEYSCORE Appids & Fingerprints

Document

Release Date: 2015-07-01
This undated NSA presentation gives a technical introduction to the treatment of AppIDs within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-application-ids-p1-normal.gif: XKEYSCORE Appids & Fingerprints xkeyscore@nsaxks-application-ids-p2-normal.gif: • Syntax is similar to C: functionCname', level, coptional info ) = 'se...
1.0

VOIP in XKEYSCORE

Document

Document Date: 2009-03-01Release Date: 2015-07-01
This NSA presentation from March 2009 shows how VOIP intercepts are handled in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
voip-in-xks-p1-normal.gif: TOP SECRET//COMINT7/REL TO USA. AUS, CAN, GBR, NZL//20291123 VOIP in XKEYSCORE March 2009 TOP SECRET//COMINT//REL TO USA. AUS. CAN, GBR, NZL//20291123voip-in-...
1.0

Writing XKS Fingerprints

Document

Document Date: 2010-11-22Release Date: 2015-07-01
This 67-page NSA presentation from November 2010 explains how to create the “Fingerprints” which enable analysts to trace individuals within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
writing-xks-fingerprints-p1-normal.gif: Writing XKS Fingerprints November 2010 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZLwriting-xks-fingerprints-p2-normal.gif: Agenda • Naming...
1.0

Using XKEYSCORE to Enable TAO

Document

Document Date: 2009-07-16Release Date: 2015-07-01
This NSA presentation from 16 July 2009 explains how the XKeyScore system supports the agency’s Tailored Access Operations: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
using-xks-to-enable-tao-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. AUS, CAN. GBR. NZL//20291123 Ait* tuv. Using XKEYSCORE to Enable TAO Booz I AJIen l Hamilton SDS Analyst 16 July ...
1.0

MHS FISINT Successfully Collects Israeli F-16 Heads Up Display

Document

Document Date: 2008-02-01Release Date: 2016-01-29
This March 2008 post from the internal NSA newsletter SIDToday, describes the Menwith Hill station’s success in intercepting the video feeds from Israeli F-16 fighter jets and drones: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016.
TOP SECRET//COMINT/TALENT KEYHOLE// REL TO USA, FVEY published March 2008 MHS FISINT Successfully Collects Israeli F-16 Heads-Up Display (S//SI//REL) , Menwith Hill Station (F77) (S...
1.0

Crypt Discovery Joint Collaboration Activity

Document

Document Date: 2011-01-20Release Date: 2015-09-25
This joint NSA/GCHQ research paper dated 20 January 2011 cites encryption as a threat impacting on both agencies: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
crypt-discovery-activity-p1-normal.gif: TOP SECRET Crypt Discovery Joint Collaboration Activity 20 January 2011 Activity Owners I H/nsa Overview Our Internet Exploitation capabil...
1.0

From SIGINT to HUMINT to SIGINT (through HUMINT) – part 1

Document

Document Date: 2005-03-10Release Date: 2016-05-11
This SIDToday article from 10 March 2005 details the experiences of Eric Fair, a US interrogator in Iraq who went on to work for the NSA. In his memoirs, published in 2016, Fair admits self-censoring in order not to disclose his moral qualms to colleagues: see the Intercept article The Secret NSA Diary of an […]
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) From SIGINT to HUMINT to SIGINT (through HUMINT) -- part 1 FROM: Eric Fai...
1.0

Another Successful Olympics Story

Document

Document Date: 2004-10-06Release Date: 2015-09-29
This post from the NSA’s internal SIDToday newsletter, dated 6 October 2004, reviews the agency’s operations for the recently-concluded Athens Olympics: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
id-863-redacted-formatted-p1-normal.gif: DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Another Successful Olympics Story FROM:...
1.0

ROCKRIDGE

Document

Release Date: 2015-09-03
This undated GCHQ presentation describes some of the Question Focused Databases (QFDs) developed to analyse the massive amount of raw data the agency collects from undersea cables: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
demystifying-nge-rock-ridge-p1-normal.gif: demystifying-nge-rock-ridge-p2-normal.gif: tr tr tr tr Scope and Aims Increase maturity and availability of QFDs Pull through more QFDs ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh