Filtered By
Afghanistan (AFG/AF) X
Countries Mentioned [filter]
Results
95 Total
0.0

Interview with an SID “Hacker” — Part 2: Hacker Culture and Worker Retention

Document

Release Date: 2015-06-11 Document Date: 2012-07-13
This 12 July 2012 post from the NSA newsletter SIDToday describes the internal culture of Tailored Access Operations (TAO) from the perspective of a practitioner: see the Intercept article What the Snowden Files Say About the Osama Bin Laden Raid, 18 May 2015.
sidtoday-interview-with-a-sid-hacker-p1-normal.gif: DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 •...
0.0

PCS Harvesting at Scale

Document

Release Date: 2015-02-19 Document Date: 2010-04-27
This April 2010 GCHQ report proposes an automated approach to seizing large numbers of mobile phone encryption keys: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
TOP SECRET STRAP 1 Reference: OPC-TDSD/TECH/21 Date: 27th April 2010 PCS Harvesting at Scale (OPC-TDSD) (OPC-TDSD) (OPC-CAP) (OPC-TDSD) Summary This report explores the ...
0.0

CCNE Jan10-Mar10 Trial

Document

Release Date: 2015-02-19
These six slides from 2010 GCHQ presentation outline the results of a trial operation to acquire SIM encryption keys: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
where-are-these-keys.pdf: TOP SECRET STRAP 1 Where are these keys? Keys live on the SIM card in the phone They also need to be present on the mobile network; are kept carefully protecte...
0.0

NATO Civilian Intelligence Council – Cyber Panel – Talking Points

Document

Release Date: 2015-02-04 Document Date: 2011-09-14
This US National Intelligence Council memo dated 14 September 2011 provides US talking points for a forthcoming NATO meeting and includes the assessment that the threat presented by Anonymous and hacktivist activity is “minimal”: see the Intercept article Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise, 4 February 2015.
SECRET//REL TO USA, NATO NIM/Cyber 14 September 2011 Talking Points Subject: (S//REL NATO) NATO Civilian Intelligence Council—Cyber Panel National Input A. Threat Overview (U) (U...
0.0

To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; US SIGINT Provides Key Support

Document

Release Date: 2014-12-28 Document Date: 2009-06-12
This 12 June 2009 post from NSA’s internal SIDToday newsletter recounts a German/Afghan targeted operation and its support from the agency: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
SIDToday - To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; U.S. SIGINT Prov... DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS C...
0.0

Visit Precis: Sir Iain Lobban

Document

Release Date: 2014-04-30 Document Date: 2013-04-01
This internal NSA document from April 2013 gives background information to prepare for the then GCHQ Director’s visit on 30 April and 1 May; included topics include access to PRISM data, FLAME malware, Iran, Syria and Israel: see the Intercept article British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools, 30 April 2014. […]
TOPSECRET//SI//NOFORN VISIT PRÉCIS Sir Iain Lobban, KCMG, CB Director, Government Communications Headquarters (GCHQ) 30 April 2013 - 1 May 2013 GEN A Hosted Dinner: 30 April 2013//1...
0.0

January 2007 Strategic Mission List

Document

Release Date: 2013-11-02 Document Date: 2007-01-01
This nine-page briefing describes the NSA’s major missions and signals intelligence priorities for 2007: see the New York Times article No Morsel Too Minuscule for All-Consuming N.S.A., 2 November 2013.
nsa-mission-list-1.png: SECRET//COMINT//REL TO USA. ALS. CAN. GBR//20291123 United States S1GINT System January 2007 Strategic Mission List Introduction - Director’s Intent (S//SI) The ...
0.0

Fusing Signals Data, with WARGODDESS

Document

Release Date: 2016-05-16 Document Date: 2003-05-21
WARGODDESS is a system that fuses multiple sources of signal data to help characterize targets and threats and produce estimates about targets and their intentions.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Fusing Signals Data, with WARGODDESS<br>FROM:<br>WARGODDESS System Enginee...
0.0

UN Security Council: Round Two of U.S. Draft Resolution on Iraq

Document

Release Date: 2016-08-10 Document Date: 2003-10-07
Critical analysis of a U.S. draft resolution on Iraq in the U.N. Security Council and its chances of success.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) UN Security Council: Round Two of U.S. Draft Resolution<br>on Iraq<br>FROM...
0.0

Chef's Choice: Database Access by Tactical Units

Document

Release Date: 2016-08-10 Document Date: 2003-12-16
The Signals Intelligence deputy director writes that a year ago, SID made a commitment to provide tactical units in Iraq and Afghanistan with access to SIGINT databases. This is complete, but the approval process to give access to the database is too slow, so he’s unveiling a plan to speed it up and grant or deny access within seven days.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Chef's Choice: Database Access by Tactical Units<br>FROM: Charlie Meals<br...
0.0

2003 CSE/NSA SIGINT Bilateral

Document

Release Date: 2016-08-10 Document Date: 2003-11-12
Canada’s Communications Security Establishment hosted an annual SIGINT bilateral, including discussions on support to military operations in Afghanistan, homeland security issues, and counterterrorism in Southeast Asia.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) 2003 CSE/NSA SIGINT Bilateral<br>FROM:<br>Deputy SUSLO in Ottawa<br>Run Da...
0.0

Media Leaks - Part I (repost)

Document

Release Date: 2016-08-10 Document Date: 2003-12-31
(Repost) NSA refers to media leaks as “cryptologic insecurities.” This article lists several examples from 2000-2002 (from CBS News, “New York Times Daily News,” the Washington Times, and WorldNetDaily) along with damage assessments and follow-on actions, like reporting to the DOJ and requesting an FBI investigation.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Media Leaks - Part I (repost)<br>FROM: SIGINT Communications<br>Run Date: 12/31/...
0.0

Al-Qa'ida: An Emerging Narco-Supported Terrorist Group?

Document

Release Date: 2016-12-07 Document Date: 2004-08-19
Article lays out questions surrounding al Qaeda's involvement in the narcotics trade in Afghanistan. While there appear to be many low-level al Qaeda operatives involved in the drug trade, there is no intelligence indicating mid- or high-level operatives are involved.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S) Al-Qa'ida: An Emerging Narco-Supported Terrorist Group?<br>FROM:<br>Deputy SINI...
0.0

Charlie Meals Visits GEO

Document

Release Date: 2016-12-07 Document Date: 2004-04-13
The deputy director visited the Geospatial Exploitation Office, meeting with analysts and mission managers supporting the war on terror.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) Charlie Meals Visits GEO<br>FROM:<br>Geospatial Exploitation (S2L)<br>Run...
0.0

IMT Members Make Trip to Afghanistan, Pakistan

Document

Release Date: 2016-12-07 Document Date: 2004-06-09
Two members of the Middle East/North Africa/South Asia Issue Managers Team who traveled to Afghanistan and Pakistan in May 2004 share a brief update and photos from their trip.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) IMT Members Make Trip to Afghanistan, Pakistan<br>FROM: SIGINT Communicatio...
0.0

CT Support For CENTCOM In Afghanistan

Document

Release Date: 2016-12-07 Document Date: 2004-02-09
Job listing for SIGINT analysts interested in joining an "exclusive group" of counterterrorism subject matter experts in Kabul.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S) CT Support For CENTCOM In Afghanistan<br>FROM: Analysis and Production<br>Unkno...
0.0

Exploiting Foreign Lawful Intercept (LI) Roundtable

Document

Release Date: 2015-09-29 Document Date: 2012-01-01
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif: TOP SECRET//SI//REL TO USA, FVEY (S//SI//REL) Exploiting Foreign Lawful Intercept (LI) Roundtable S31122 TOP SECRET//SI//REL TO USA, FVEY...
0.0

Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints

Document

Release Date: 2015-07-01 Document Date: 2010-05-01
This 61-page NSA presentation from May 2010 provides analysts with a guide to tracking individuals within XKeyScore using the system’s fingerprint capability: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints May 2010 TOP SECRET //COMINT //REL TO USA, AUS, CAN, GBR, NZL ...
0.0

How is Human Language (HTL) Progressing?

Document

Release Date: 2015-05-05 Document Date: 2011-09-06
This 6 September 2011 post from the NSA’s internal SIDToday newsletter describes progress in the agency’s speech-to-text capability over the course of the year: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
(S//SI//REL) How Is Human Language Technology (HLT) Progressing? FROM: (U//FOUO)^^^H Language Analysis Modernization Lead (S2) Run Date: 09/06/2011 (S//SI//REL) Editor's intro: At the SI...
0.0

Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations

Document

Release Date: 2015-04-02 Document Date: 2011-03-10
These extracts from a GCHQ paper dated 10 March 2011 provide an indication of the agency’s ongoing effects (misinformation) and “online HUMINT” operations: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.s
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations PhD Human Systems Group, Information Management ...
0.0

INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers

Document

Release Date: 2015-02-04 Document Date: 2010-05-06
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET a/ SI / TK // REL TO USA AUS CAN GBR NZL SID Today archi“s reedback iBi ■ ■ ■ Welcome! Saturday, 10 Nov 2012 1 1 B ...
0.0

iPhone Location Services

Document

Release Date: 2013-09-09
These four sides from an undated NSA presentation boast the agency’s ability to access location information from iPhones – and makes fun of the “zombies” whose information is exfiltrated: see the Der Spiegel article iSpy: How the NSA Accesses Smartphone Data, 9 September 2013.
phone1.jpg: TS//SI//REL to USA, FVEY (S//RED iPhone Location Services (U) Who knew in 1984... TS//SI//RELto USA, FVEYphone2.jpg: TS//SI//REL to USA, FVEY (S//REL) iPhone Locatio...
0.0

Black Budget entry on Computer Network Operations GENIE project

Document

Release Date: 2015-01-17 Document Date: 2012-02-18
This extract from the US Intelligence Community’s Congressional Budget Justification for the Fiscal Year 2013 (the “Black Budget”) provides the budget for GENIE the project “which underpins NSA/CSS’ Computer Network Operations (CNO) Endpoint capabilities conducted by the Tailored Access Operations (TAO) Group: see the Der Spiegel article The Digital Arms Race: NSA Preps America for […]
TOP SECRET//SI/TK//NOFORN (U) COMPUTER NETWORK OPERATIONS (U) GENIE This Exhibit is SECRET//NOFORN FY 20111 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 2013 Base...
0.0

Joint Prioritized Effects List

Document

Release Date: 2014-12-28 Document Date: 2011-01-01
This anonymised version of the Joint Prioritized Effects list highlights aspects of NATO’s targeted killing operations in Afghanistan: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
JPEL TARGETS 669 RESTRICTE NATO SECRET REL ISAF JPEL NEXTJTWG: 08AUG10 NEXT JPEL APPROVAL: 09 AUG10 REGION TRIBAL AFFILIATION PROV TGTNOM LEAD AGENCY/SERV AGENCY OP NAME OBJ ...
0.0

SIGINT Helps Hobble the Taleban by Cutting Off Their Livelihood

Document

Release Date: 2014-12-28 Document Date: 2009-02-03
A post from the internal NSA newsletter SIDToday shows that, as of 2008, “narcotics traffickers were added to the Joint Prioritized Effects List (JPEL) for the first time”: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
SIDToday - SIGINT Helps Hobble the Taleban by Cutting Off Their Livelihood DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL • SIDtodav A...
0.0

Profiling SSL and Attributing Private Networks

Document

Release Date: 2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL PROFILING SSL AND ATTRIBUTING PRIVATE NETWORKS An introduction to FLYING PIG and HUSH PUPPY ICTR - Network Exploitation GCHQ T R J...
0.0

European Technical Center Area Checked for Unexploded WWII Ordnance

Document

This internal NSA post from 14 March 2006 describes an incident on 20 December 2005 when what was suspected to be unexplodeded WWII-era ordnance was discovered at an agency facility in Mainz Kastel, Germany: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) European Technical Center Area Checked for Unexploded WWII Ordnance FROM: multiple authors Unknown Run Date: 03/15/2006 (C) The ETC facility was closed for a day while inves...
0.0

Starting Up a New Mission at the European Security Operations Center: End-to-End Sigint

Document

Release Date: 2014-06-18 Document Date: 2007-12-05
This internal NSA post from 5 December 2007 describes one official’s experiences at the European Security Operations Center (ESOC) at Darmstadt, Germany: see the Der Spiegel article Terrorverdächtige: NSA nutzte Erkenntnisse aus Deutschland-Filiale für Tötungen, 15 June 2014.
(S//SI//REL) Starting Up a New Mission at the European Security Operations Center: End-to-End SIGINT FROM Intelligence Analysis Intern Run Date; 12/05/2007 (S//SI//REL) When considering...
0.0

Boundless Informant heat maps

Document

Release Date: 2013-06-11 Document Date: 2013-03-26
These undated heat maps show the number of pieces of communications data the NSA gathers per country in a particular 30 day period, divided into telephony (DNR) and internet (DNI) metadata. Details in the second map refer to a period in January 2013 and third to a period ending in February the same year: see […]
boundlessinformant.pdf: Page 93 BOUNDLESSINFORMANT Top 5 Countries (i»t 30 o«>» t-om «¡xu/i ■Ohm.pdf: BOUNDLESSINFORMANT im!MwamHMiM:rta.]a;ii]aaMaiM,(.yiii:am«.'.«M«iMiaiiiiiPH;i!i...
0.0

Manhunting Timeline 2010

Document

Release Date: 2014-02-18
This NSA wiki page details “the start of an international effort to focus the legal element of national power upon non-state actor [WikiLeaks editor Julian] Assange, and the human network that supports WikiLeaks”: see the Intercept article: Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters, 18 February 2014.
manhunting.png: Page Otscussion Read Edit Page history Search (U) Manhunting Timeline 2010 ____________rrrr£ > TOP SECRET//SI/TK//NOFORN Main article: Manhunting See also: Manhu...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh