Filtered By
India (IND/IN)X
Countries Mentioned [filter]
Results
27 Total
1.0

NSA lends support to upcoming G8 and G20 meetings in Canada

Document

Document Date: 2010-06-23Release Date: 2013-11-28
This briefing from 23 June 2010 describes the NSA’s plans for the G8 and G20 summits in Toronto and the extent of Canadian cooperation. Note that redactions have been made to this document that were not present in a version broadcast on television: see the CBC News article New Snowden docs show U.S. spied during […]
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Web search Agenev-all Emails SID-all Emails NSA Rolodex SIDtodav Blog SIDtoda...
1.0

January 2007 Strategic Mission List

Document

Document Date: 2007-01-01Release Date: 2013-11-02
This nine-page briefing describes the NSA’s major missions and signals intelligence priorities for 2007: see the New York Times article No Morsel Too Minuscule for All-Consuming N.S.A., 2 November 2013.
nsa-mission-list-1.png: SECRET//COMINT//REL TO USA. ALS. CAN. GBR//20291123 United States S1GINT System January 2007 Strategic Mission List Introduction - Director’s Intent (S//SI) The ...
1.0

Internet Anonymity 2011

Document

Release Date: 2014-12-28
This NSA presentation from 2011 gives an overview of anonymising technologies, including Tor: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
 • NSA (S31323) TOP SECRET//COMINT REL TO USA,FVEY ÊF 1 M r- (U) Many Possible Meanings/lnterpretations (S//REL) Simply Not Using Real Name for Email (S//REL) Private Forum w...
1.0

Close Access Sigads

Document

Document Date: 2010-09-10Release Date: 2013-10-21
This NSA document from 10 September 2010 details operations against foreign embassies, concluding with a glossary of tools and tactics. Earlier versions of this docoument that only contained some of the operations conducted were published in l’Espresso on 5 December 2013 and in Le Monde on 21 October 2013: see the book No Place to […]
Page 145 10 Sep 2010 CLOSE ACCESS SIGADS CLOSE ACCESS SIGADS All Close Access domestic collection uses the US-3136 SIGAD with a unique two-letter suffix for each target location and m...
1.0

Content Extraction Enhancements for Target Analytics

Document

Document Date: 2011-06-09Release Date: 2014-01-16
This NSA presentation from 9 June 2011 shows the scale of the agency’s collection of SMS messages (codenamed Dishfire) and describes the operation of the Prefer analysis tool: see the Guardian article, NSA collects millions of text messages daily in ‘untargeted’ global sweep, 16 January 2014.
TOP SECRET//COMINT//REL TO USA, FVEY//20320108 Content Extraction Enhancements For Target Analytics: SMS Text Messages: A Goldmine to Exploit 9 June, 2011 Presenters: With Wor...
1.0

NIOC Maryland Advanced Computer Network Operations Course

Document

Document Date: 2012-04-18Release Date: 2015-01-17
This April 2012 training presentation produced by Navy Information Operations Command Maryland states that “the next major conflict will start in cyberspace”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
NIOC MARYLAND ADVANCED COMPUTER NETWORK OPERATIONS COURSE Coordinated by -- NAVIOCOM Maryland Center of Excellence for Non-Kinetic Options — 1 SECRET//REL TO USA, / Title • C...
1.0

INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers

Document

Document Date: 2010-05-06Release Date: 2015-02-04
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET a/ SI / TK // REL TO USA AUS CAN GBR NZL SID Today archi“s reedback iBi ■ ■ ■ Welcome! Saturday, 10 Nov 2012 1 1 B ...
1.0

CCNE Jan10-Mar10 Trial

Document

Release Date: 2015-02-19
These six slides from 2010 GCHQ presentation outline the results of a trial operation to acquire SIM encryption keys: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
where-are-these-keys.pdf: TOP SECRET STRAP 1 Where are these keys? Keys live on the SIM card in the phone They also need to be present on the mobile network; are kept carefully protecte...
1.0

UN Climate Change Conference in Copenhagen — Will the Developed and Developing World Agree on Climate Change?

Document

Document Date: 2009-12-07Release Date: 2014-01-30
This article was posted on the NSA intranet on 7 December 2009, the first day of the Copenhgen Climate Summit and explains the contributions the agency has already made towards strengthening US negotiating positions: see the Information article NSA spied against UN climate negotiations, 30 January 2014.
(U) UN Climate Change Conference in Copenhagen -- Will the Developed and Developing World Agree on Climate Change? FROM: Deputy SINIO for Economics and Global Issues (S17) Run Date: 12...
1.0

India: Support to Terrorist Attacks in Mumbai

Document

Release Date: 2014-12-21
This extract from an undated NSA document claims that GCHQ surveillance of Lashkar-e-Taiba operative Zarrar Shah “yielded a complete operations plan” for the 2008 Mumbai terrorist attacks – but only after the plot had succeeded: see the New York Times article In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted Puzzle, 21 December […]

1.0

DAPINO GAMMA Target Personalisation Centres

Document

Document Date: 2011-01-01Release Date: 2015-02-19
This 2011 Wiki page details aspects of GCHQ’s DAPINO GAMMA operation against mobile SIM manufacturer Gemalto: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
[edit] Target Personalisation centres ( non 5 eyes): [edit] France • La Ciotat • Meudon - On outskirts of Paris • PontAudemer [edit] Poland Tczew [edit] Czech Republic [edit]...
1.0

NSA Intelligence Relationship with New Zealand

Document

Document Date: 2013-04-01Release Date: 2015-03-10
This NSA information paper from April 2013 describes the state of the agency’s intelligence relationship with its New Zealand counterpart: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY National Security Agency April 2013 Central Security Service Information Paper (U) Subject: NSA Intelligence Relationship with New Zealand (U) Execu...
1.0

FY2013 Foreign Partner Review

Document

Document Date: 2013-01-01Release Date: 2014-05-13
This slide, taken from the NSA’s annual review of its cooperation with foreign partners, shows an expansion in the agency’s international relationships: see the book No Place To Hide, 13 May 2014.
Page 123 TOP SECRET// COMINT //REL USA, AUS, CAN, GBR, NZL Approved SIGINT Partners ^ORTUtt^ Second Parties Third Parties Australia Algeria Israel Spain Canada Austria Italy Sweden...
1.0

FY2012 Foreign Partner Review

Document

Document Date: 2012-01-01Release Date: 2014-05-13
This slide, taken from the NSA’s annual report on the state of its cooperation with foreign powers, details the countries that have received payments from the agency: see the book No Place To Hide, 13 May 2014.
Page 124 <AD FY12 CCP Funding of Partner In Thousands of USD 3000 TOP SECRET//COMINT//NOFORN
1.0

Exhibit F

Document

Document Date: 2010-07-16Release Date: 2014-06-30
This document lists the 193 governments, intragovernmental organisations and other entities which the NSA was granted the legal authority to intercept communications “about” for foreign intelligence purposes in August 2010: see the Washington Post article Court gave NSA broad leeway in surveillance, 30 June 2014.
TOP SECRET//NOFORN EXHIBIT F IN THE MATTER OF FOREIGN GOVERNMENTS, FOREIGN FACTIONS Ns?F^yyiG#i 11- ENTITIES, AND FOREIGN-BASED POLITICAL ORGANIZATIONS >■,, f;f |:VV DNI/AG 70...
Afghanistan (AFG/AF), Albania (ALB/AL), Algeria (DZA/DZ), Andorra (AND/AD), Angola (AGO/AO), Antigua and Barbuda (ATG/AG), Argentina (ARG/AR), Armenia (ARM/AM), Austria (AUT/AT), Azerbaijan (AZE/AZ), Bahamas (BHS/BS), Bangladesh (BGD/BD), Barbados (BRB/BB), Belarus (BLR/BY), Belgium (BEL/BE), Belize (BLZ/BZ), Benin (BEN/BJ), Bhutan (BTN/BT), Bolivia (BOL/BO), Bosnia and Herzegovina (BIH/BA), Botswana (BWA/BW), Brazil (BRA/BR), Bulgaria (BGR/BG), Burkina Faso (BFA/BF), Burundi (BDI/BI), Cambodia (KHM/KH), Cameroon (CMR/CM), Central African Republic (CAF/CF), Chad (TCD/TD), Chile (CHL/CL), China (CHN/CN), Colombia (COL/CO), Comoros (COM/KM), Congo (COD/CD), Costa Rica (CRI/CR), Croatia (HRV/HR), Cuba (CUB/CU), Cyprus (CYP/CY), Czech Republic (CZE/CZ), Denmark (DNK/DK), Djibouti (DJI/DJ), Dominica (DMA/DM), Dominican Republic (DOM/DO), Ecuador (ECU/EC), Egypt (EGY/EG), El Salvador (SLV/SV), Equatorial Guinea (GNQ/GQ), Eritrea (ERI/ER), Estonia (EST/EE), Ethiopia (ETH/ET), Fiji (FJI/FJ), Finland (FIN/FI), France (FRA/FR), Gabon (GAB/GA), Gambia (GMB/GM), Georgia (GEO/GE), Germany (DEU/DE), Ghana (GHA/GH), Greece (GRC/GR), Grenada (GRD/GD), Guatemala (GTM/GT), Guinea (GIN/GN), Guinea-Bissau (GNB/GW), Guyana (GUY/GY), Haiti (HTI/HT), Vatican (VAT/VA), Honduras (HND/HN), Hungary (HUN/HU), Iceland (ISL/IS), India (IND/IN), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Ireland (IRL/IE), Israel (ISR/IL), Italy (ITA/IT), Jamaica (JAM/JM), Japan (JPN/JP), Jordan (JOR/JO), Kazakhstan (KAZ/KZ), Kenya (KEN/KE), Kiribati (KIR/KI), Korea (KOR/KR), Kuwait (KWT/KW), Kyrgyzstan (KGZ/KG), Latvia (LVA/LV), Lebanon (LBN/LB), Lesotho (LSO/LS), Liberia (LBR/LR), Libya (LBY/LY), Liechtenstein (LIE/LI), Lithuania (LTU/LT), Luxembourg (LUX/LU), Macedonia (MKD/MK), Madagascar (MDG/MG), Malawi (MWI/MW), Malaysia (MYS/MY), Maldives (MDV/MV), Mali (MLI/ML), Malta (MLT/MT), Marshall Islands (MHL/MH), Mauritania (MRT/MR), Mauritius (MUS/MU), Mexico (MEX/MX), Micronesia (FSM/FM), Moldova (MDA/MD), Monaco (MCO/MC), Mongolia (MNG/MN), Montenegro (MNE/ME), Morocco (MAR/MA), Mozambique (MOZ/MZ), Myanmar (MMR/MM), Namibia (NAM/NA), Nauru (NRU/NR), Nepal (NPL/NP), Netherlands (NLD/NL), Nicaragua (NIC/NI), Niger (NER/NE), Nigeria (NGA/NG), Norway (NOR/NO), Oman (OMN/OM), Pakistan (PAK/PK), Palau (PLW/PW), Panama (PAN/PA), Papua New Guinea (PNG/PG), Paraguay (PRY/PY), Peru (PER/PE), Philippines (PHL/PH), Poland (POL/PL), Portugal (PRT/PT), Qatar (QAT/QA), Romania (ROU/RO), Russia (RUS/RU), Rwanda (RWA/RW), Saint Kitts and Nevis (KNA/KN), Saint Lucia (LCA/LC), Samoa (WSM/WS), San Marino (SMR/SM), Sao Tome and Principe (STP/ST), Senegal (SEN/SN), Serbia (SRB/RS), Seychelles (SYC/SC), Sierra Leone (SLE/SL), Singapore (SGP/SG), Slovakia (SVK/SK), Slovenia (SVN/SI), Somalia (SOM/SO), South Africa (ZAF/ZA), Spain (ESP/ES), Sri Lanka (LKA/LK), Sudan (SDN/SD), Suriname (SUR/SR), Swaziland (SWZ/SZ), Sweden (SWE/SE), Switzerland (CHE/CH), Taiwan (TWN/TW), Tajikistan (TJK/TJ), Tanzania (TZA/TZ), Thailand (THA/TH), Timor-Leste (TLS/TL), Togo (TGO/TG), Tonga (TON/TO), Tunisia (TUN/TN), Turkey (TUR/TR), Turkmenistan (TKM/TM), Tuvalu (TUV/TV), Uganda (UGA/UG), Ukraine (UKR/UA), United States (USA/US), Uruguay (URY/UY), Uzbekistan (UZB/UZ), Vanuatu (VUT/VU), Venezuela (VEN/VE), Vietnam (VNM/VN), Western Sahara (ESH/EH), Yemen (YEM/YE), Zambia (ZMB/ZM), Zimbabwe (ZWE/ZW)
1.0

Supporting HMG’s Climate Change Ambitions (… or, “A GCO’s tales from Cancun”)

Document

Document Date: 2011-02-01Release Date: 2014-11-01
This joint GCHQ/MI6 presentation from February 2011 documents the process of international climate change negotiations becoming a “serious intelligence priority” for the UK: see the Dagbladet Information article Snowden documents reveal British climate espionage – Copenhagen climate summit targeted, 1 November 2014.  
GCHQ SECRET INTELLIGENCE SERVICE Supporting HMG’s Climate Change Ambitions (...or, “A GCO’s tales from Cancún”) 27 November - 10 December 2010 GCHQ SECRET INTELLI...
1.0

Bad guys are everywhere, good guys are somewhere!

Document

Release Date: 2014-09-14
This undated NSA presentation sets out the network-mapping tool Treasure Map, and supplies information on some of the agency’s collection access points: see the Intercept article New Zealand Launched Mass Surveillance Project While Publicly Denying It, 15 September 2014.
Bad guys are everywhere, good guys are somewhere! NSA/CSS Threat Operations Center (NTOC) NTOC Technology Development TS//SI//REL TO USA, FVEY (U) NTOC • (U//FOUO) Operates under bot...
1.0

PCS Harvesting at Scale

Document

Document Date: 2010-04-27Release Date: 2015-02-19
This April 2010 GCHQ report proposes an automated approach to seizing large numbers of mobile phone encryption keys: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
TOP SECRET STRAP 1 Reference: OPC-TDSD/TECH/21 Date: 27th April 2010 PCS Harvesting at Scale (OPC-TDSD) (OPC-TDSD) (OPC-CAP) (OPC-TDSD) Summary This report explores the ...
1.0

NATO Civilian Intelligence Council – Cyber Panel – Talking Points

Document

Document Date: 2011-09-14Release Date: 2015-02-04
This US National Intelligence Council memo dated 14 September 2011 provides US talking points for a forthcoming NATO meeting and includes the assessment that the threat presented by Anonymous and hacktivist activity is “minimal”: see the Intercept article Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise, 4 February 2015.
SECRET//REL TO USA, NATO NIM/Cyber 14 September 2011 Talking Points Subject: (S//REL NATO) NATO Civilian Intelligence Council—Cyber Panel National Input A. Threat Overview (U) (U...
1.0

An Easy Way to Win: Using SIGINT to Learn about New Viruses (Project Camberdada)

Document

Document Date: 2010-01-01Release Date: 2015-06-22
This 2010 NSA presentation describes Project Camberdada, an attempt to subvert popular antivirus software by means of surveilling email traffic: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL An Eas Using S about P fwmuuuu IGINT to Learn iew Viruses Project CAMBERDADA ByHH, 1412 (IAD) V252|| Derived From: NSA/CSSM...
1.0

Operational Legalities

Document

Release Date: 2015-06-22
This 78-page GCHQ presentation, repeated with speaking notes, provides a full overview of the legal and oversight framework governing the agency’s activities: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015. operational-legalities-gchq-nov-28-2008
Operational Legalities Not for display • Beware: there are several hidden slides in this presentation. If you see this you will also see the other hidden ones. • To find which are hidde...
1.0

Discovery SIGINT Targeting Scenarios and Compliance

Document

Document Date: 2011-07-01Release Date: 2014-02-18
This page from the NSA intranet dated July 2011 supplies advice from the NSA Offices of General Counsel (OGC) and Oversight and Compliance (NOC) on the admissibility of targeting strategies against the users of popular websites (including WikLeaks and the Pirate Bay): see the Intercept article Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed […]
TOP SECRET//SI//REL TO USA, FVEY Navigation Main Page Community portal Recent changes Random page Help Toolbox What links here Related changes Upload file Special pages Printab...
1.0

Geopolitical trends for 2014-2019

Document

Release Date: 2013-12-02
Three redacted slides from an NSA presentation name several states as subjects of ongoing interest: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
slide1.jpg: slide2.jpg: TOP SECRET//SI//REL TO USA, FVEY U//JEQUOslide3.jpg: rTO USA, FYEY Geopolitical Trends: Global Drivers (S//REL) Geopolitical Trend driver»: • St re**orc to...
1.0

Boundless Informant heat maps

Document

Document Date: 2013-03-26Release Date: 2013-06-11
These undated heat maps show the number of pieces of communications data the NSA gathers per country in a particular 30 day period, divided into telephony (DNR) and internet (DNI) metadata. Details in the second map refer to a period in January 2013 and third to a period ending in February the same year: see […]
boundlessinformant.pdf: Page 93 BOUNDLESSINFORMANT Top 5 Countries (i»t 30 o«>» t-om «¡xu/i ■Ohm.pdf: BOUNDLESSINFORMANT im!MwamHMiM:rta.]a;ii]aaMaiM,(.yiii:am«.'.«M«iMiaiiiiiPH;i!i...
1.0

Intro to the VPN Exploitation Process

Document

Document Date: 2010-09-13Release Date: 2014-12-28
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
1.0

Cable Master List

Document

Document Date: 2009-07-27Release Date: 2014-11-25
These July 2009 documents provide a full list of the fibre-optic cables GCHQ had access to at that point, including details of location, bandwidth and corporate partners: see the Süddeutsche Zeitung article Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts, 25 November 2014. […]
partner_cables.pdf:  Partner Cable UK? REMEDY GERONTIC DACRON LITTLE PINNAGE STREET CAR VITREOUS Apolo UK IRU/LC DCO IRU/LC IRU/LC IRU/LC CANTAT 3 UK DCO IRU/LC Concerto UK D...
1.0

Quadrennial Intelligence Community Review Final Report, April 2009

Document

Document Date: 2009-04-01Release Date: 2014-09-05
This April 2009 report from the Office of the Director of National Intelligence considers the challenges the US intelligence community may face by 2025 and suggests that the competitive advantage of US firms may need to be supported by espionage: see the Intercept article The U.S. Government’s Secret Plans to Spy for American Corporations, 5 […]
SECRET//REL T FINAL REPORT '¿[\ns »' National Intelligenc Derived From: ODNI POL-08 Declassify On: 20340306 □ SECRET//REL TO USA, FVEY FINAL REPORT April 2009 □ SECR...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh