Filtered By
Mexico (MEX/MX)X
Countries Mentioned [filter]
Results
25 Total
1.0

NSA lends support to upcoming G8 and G20 meetings in Canada

Document

Document Date: 2010-06-23Release Date: 2013-11-28
This briefing from 23 June 2010 describes the NSA’s plans for the G8 and G20 summits in Toronto and the extent of Canadian cooperation. Note that redactions have been made to this document that were not present in a version broadcast on television: see the CBC News article New Snowden docs show U.S. spied during […]
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Web search Agenev-all Emails SID-all Emails NSA Rolodex SIDtodav Blog SIDtoda...
1.0

January 2007 Strategic Mission List

Document

Document Date: 2007-01-01Release Date: 2013-11-02
This nine-page briefing describes the NSA’s major missions and signals intelligence priorities for 2007: see the New York Times article No Morsel Too Minuscule for All-Consuming N.S.A., 2 November 2013.
nsa-mission-list-1.png: SECRET//COMINT//REL TO USA. ALS. CAN. GBR//20291123 United States S1GINT System January 2007 Strategic Mission List Introduction - Director’s Intent (S//SI) The ...
1.0

SSO dictionary – MYSTIC

Document

Release Date: 2014-05-19
This extract is taken from an undated dictionary produced by NSA Special Source Operations, providing glosses for several terms associated with MYSTIC operations. The name of one country has been redacted: see the Intercept article Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas, 19 May 2014. Download […]
BASECOAT (TS//SI//NF) MYSTIC acess; Bahamas A-link GSM. DEA access under LI that collects Counter-Narcotic (CN) targets. There are two sites located in the Bahamas. It is currently being used as a...
1.0

NSA Washington Mission

Document

Document Date: 2006-01-01Release Date: 2014-05-13
This excerpt from a 2006 NSA memo written by the global resources manager of the International Security Issues (ISI) mission underlines the importance of data on energy resources, production and international investment to the agency: see the book No Place To Hide, 13 May 2014.
Page 138 (U) NSA Washington Mission (U) Regional (TS//SI) ISI is responsible for 13 individual nation states in three continents. One significant tie that binds all these countries togethe...
1.0

Finding Nuggests — Quickly — in a Heap of Voice Collection, From Mexico to Afghanistan

Document

Document Date: 2011-05-25Release Date: 2015-05-05
This 25 May 2011 post from the NSA internal newsletter SIDToday describes the agency’s development of speech to text technology: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
(S//SI//REL) Finding Nuggets -- Quickly — in a Heap of Voice Collection, From Mexico to Afghanistan FROM: (U//FOUO)^^^^^^| Senior Technical Development Program — Class of 2010, and Intell...
1.0

Worldwide SIGINT/Defense Cryptologic Platform

Document

Document Date: 2012-01-01Release Date: 2013-11-23
This slide from a 2012 presentation shows the distribution of NSA collection points worldwide, including 80+ Special Collection Services (SCS) points based at embassies and consulates; 50,000 gained by Computer Network Exploitation (CNE) malware attacks and 20 “major accesses” from undersea cables: see the NRC Handelsblad article NSA infected 50,000 computer networks with malicious software, […]
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL EL TO FVEY (High Speed Optical Cable Covert, Clandestine or Coorperative Large Accesses 20 Access Programs Worldwide Driver 1: W...
1.0

Close Access Sigads

Document

Document Date: 2010-09-10Release Date: 2013-10-21
This NSA document from 10 September 2010 details operations against foreign embassies, concluding with a glossary of tools and tactics. Earlier versions of this docoument that only contained some of the operations conducted were published in l’Espresso on 5 December 2013 and in Le Monde on 21 October 2013: see the book No Place to […]
Page 145 10 Sep 2010 CLOSE ACCESS SIGADS CLOSE ACCESS SIGADS All Close Access domestic collection uses the US-3136 SIGAD with a unique two-letter suffix for each target location and m...
1.0

The International Security Issues Build-Out

Document

Document Date: 2012-11-09Release Date: 2013-12-02
This update from the NSANet intranet shows that the International Security Issues section of the agency shows a growing emphasis on gathering economic and financial information on the 13 countries under its remit: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Friday. 09 Nov 2012 • Web search • Agency-all Emails • SID-all Emai...
1.0

MYSTIC fact sheet

Document

Release Date: 2014-05-19
This undated NSA Special Source Operations memo explains MYSTIC a collaboration between various US agencies that collects signals from telecoms networks by means of devices have been installed for ostenisbly “legitimate commercial services”: see the Intercept article Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas, 19 May […]
(U) General Information MYSTIC Year Established Description Intelligence Value Major Targets Major Benefactors & users of Information (U) 2009 (TS//SI//NF) MYSTIC is an SS...
1.0

Intelligently filtering your data: Brazil and Mexico case studies

Document

Release Date: 2013-12-02
A selection of slides from a Secure and Trustworthy Cyberspace (SaTC) presentation gives case studies on the use of graph analysis in relation to the political leadership of Mexico and Brazil: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
glenn1-30.jpg: ?86 H6MTW£8MllflfHi® T8 Bifc SIS: SHI; ESH; H5t I(TS//SI//REL) Intelligently filtering your data Brazil and Mexico case studies SATC i86 ieff«E8fHHWB£l: ?8 HIS; 886; SH...
1.0

Silent Success: SIGINT Synergy Helps Shape US Foreign Policy

Document

Document Date: 2010-08-30Release Date: 2013-08-02
This August 2010 post from the internal NSA newsletter SIDtoday shows how the agency aided US diplomacy on the issue of Iran sanctions – by surveilling the communications of other members of the UN Security Council: see the Época article Spies of the digital age, 2 August 2013.
investiga_1.jpg: I Öl» Si cret comint SOI ORN .•«tv 1Ic\ps Sh*P* ^ ^ • SK.IV» Svncie l,c* (llWW.0> Silent sue««: SK j| ■ Koreift*» l*ol»c> A, the outset of these .engihy uegottati...
1.0

Your target is using a BlackBerry? Now what?

Document

Release Date: 2013-09-09
This slide, from an undated NSA presentation, shows that the agency is able to defeat BlackBerry encryption technology – using an email from a Mexican government official as an example: see the Der Spiegel article iSpy: How the NSA Accesses Smartphone Data, 9 September 2013.
TOPSECRET//COMNÏ//RH TO USA, FVEY (U) Post Processed BES collection t Type Data Type Mensaje original De: Enviado el: Para: Asunto: RE: URGENTE: Gracias. TOP SE...
1.0

DAPINO GAMMA Target Personalisation Centres

Document

Document Date: 2011-01-01Release Date: 2015-02-19
This 2011 Wiki page details aspects of GCHQ’s DAPINO GAMMA operation against mobile SIM manufacturer Gemalto: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
[edit] Target Personalisation centres ( non 5 eyes): [edit] France • La Ciotat • Meudon - On outskirts of Paris • PontAudemer [edit] Poland Tczew [edit] Czech Republic [edit]...
1.0

Broadcast/Intenet Radio Exploitation and Analysis

Document

Document Date: 2009-11-06Release Date: 2015-09-25
This GCHQ research paper from 6 November 2009 outlines what kinds of data the agency can extract from internet radio stations and their listenership, grouped by country: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
broadcast-analysis-p1-normal.gif: UK TOP SECRET//COMINT//REL FVEY Broadcast/lnternet Radio Exploitation and Analysis 6th November 2009 OPD-NAC Distribution (via email) (ST2) BS...
1.0

PRISM/US-984XN Overview

Document

Document Date: 2013-04-01Release Date: 2013-06-06
Nineteen slides from a 41-slide April 2013 NSA presentation describing the PRISM collection of data via internet service providers, “the SIGAD most used in NSA reporting.” Slides have been published gradually by several media organisations: see the Washington Post article NSA slides explain the PRISM data-collection program, 6 June 2013.
01.jpg: PRISM/U S-984XN Overview OR The SIGAD Used Most in NS A Reporting Overview April 2013 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20360901 OP SECRET/...
1.0

Tailored Access Operations – Texas Cryptologic Center

Document

Release Date: 2013-12-29
This NSA presentation describes the staffing and activities of the Tailored Access Operations sectio based in San Antonia Texas. These included operations against Mexico’s Secretariat of Public Security (codenamed WHITETAMALE), Cuba, Columbia, Venezuela and unspecified targets in the Middle East: see the Der Spiegel article Inside TAO: Documents Reveal Top NSA Hacking Unit, 29 December […]
image-584021-galleryV9-yenq.jpg: image-584022-galleryV9-qplk.jpg: TOP SECRET//COMINT//REL TO USA, FVEY Overview • Current People, Space, & Operations (FY2009) • Medina era Growth (FY20...
1.0

Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities

Document

Document Date: 2007-01-01Release Date: 2013-12-09
A 2007 proposal to the NSA from contractor SAIC, promoting the company’s ability to support “intelligence collection in the games space”: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 December 2013.
Games: A Look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities Table of Contents FORWARD......................................................................4 ...
1.0

NSA Intelligence Relationship with Canada’s Communications Security Establishment Canada (CSEC)

Document

Document Date: 2013-04-03Release Date: 2014-05-13
This largely redacted information paper from NSA’s Central Security Service dated 3 April 2013 details the current state of the agency’s cooperative relationship with its Canadian counterpart: see the book No Place To Hide, 13 May 2014.
TOP SECRET//SI//REL USA, FVEY National Security Agency/ 3 April 2013 Central Security Service Information Paper Subject: (U//FOUO) NSA Intelligence Relationship with Canada’s Commun...
1.0

Exhibit F

Document

Document Date: 2010-07-16Release Date: 2014-06-30
This document lists the 193 governments, intragovernmental organisations and other entities which the NSA was granted the legal authority to intercept communications “about” for foreign intelligence purposes in August 2010: see the Washington Post article Court gave NSA broad leeway in surveillance, 30 June 2014.
TOP SECRET//NOFORN EXHIBIT F IN THE MATTER OF FOREIGN GOVERNMENTS, FOREIGN FACTIONS Ns?F^yyiG#i 11- ENTITIES, AND FOREIGN-BASED POLITICAL ORGANIZATIONS >■,, f;f |:VV DNI/AG 70...
Afghanistan (AFG/AF), Albania (ALB/AL), Algeria (DZA/DZ), Andorra (AND/AD), Angola (AGO/AO), Antigua and Barbuda (ATG/AG), Argentina (ARG/AR), Armenia (ARM/AM), Austria (AUT/AT), Azerbaijan (AZE/AZ), Bahamas (BHS/BS), Bangladesh (BGD/BD), Barbados (BRB/BB), Belarus (BLR/BY), Belgium (BEL/BE), Belize (BLZ/BZ), Benin (BEN/BJ), Bhutan (BTN/BT), Bolivia (BOL/BO), Bosnia and Herzegovina (BIH/BA), Botswana (BWA/BW), Brazil (BRA/BR), Bulgaria (BGR/BG), Burkina Faso (BFA/BF), Burundi (BDI/BI), Cambodia (KHM/KH), Cameroon (CMR/CM), Central African Republic (CAF/CF), Chad (TCD/TD), Chile (CHL/CL), China (CHN/CN), Colombia (COL/CO), Comoros (COM/KM), Congo (COD/CD), Costa Rica (CRI/CR), Croatia (HRV/HR), Cuba (CUB/CU), Cyprus (CYP/CY), Czech Republic (CZE/CZ), Denmark (DNK/DK), Djibouti (DJI/DJ), Dominica (DMA/DM), Dominican Republic (DOM/DO), Ecuador (ECU/EC), Egypt (EGY/EG), El Salvador (SLV/SV), Equatorial Guinea (GNQ/GQ), Eritrea (ERI/ER), Estonia (EST/EE), Ethiopia (ETH/ET), Fiji (FJI/FJ), Finland (FIN/FI), France (FRA/FR), Gabon (GAB/GA), Gambia (GMB/GM), Georgia (GEO/GE), Germany (DEU/DE), Ghana (GHA/GH), Greece (GRC/GR), Grenada (GRD/GD), Guatemala (GTM/GT), Guinea (GIN/GN), Guinea-Bissau (GNB/GW), Guyana (GUY/GY), Haiti (HTI/HT), Vatican (VAT/VA), Honduras (HND/HN), Hungary (HUN/HU), Iceland (ISL/IS), India (IND/IN), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Ireland (IRL/IE), Israel (ISR/IL), Italy (ITA/IT), Jamaica (JAM/JM), Japan (JPN/JP), Jordan (JOR/JO), Kazakhstan (KAZ/KZ), Kenya (KEN/KE), Kiribati (KIR/KI), Korea (KOR/KR), Kuwait (KWT/KW), Kyrgyzstan (KGZ/KG), Latvia (LVA/LV), Lebanon (LBN/LB), Lesotho (LSO/LS), Liberia (LBR/LR), Libya (LBY/LY), Liechtenstein (LIE/LI), Lithuania (LTU/LT), Luxembourg (LUX/LU), Macedonia (MKD/MK), Madagascar (MDG/MG), Malawi (MWI/MW), Malaysia (MYS/MY), Maldives (MDV/MV), Mali (MLI/ML), Malta (MLT/MT), Marshall Islands (MHL/MH), Mauritania (MRT/MR), Mauritius (MUS/MU), Mexico (MEX/MX), Micronesia (FSM/FM), Moldova (MDA/MD), Monaco (MCO/MC), Mongolia (MNG/MN), Montenegro (MNE/ME), Morocco (MAR/MA), Mozambique (MOZ/MZ), Myanmar (MMR/MM), Namibia (NAM/NA), Nauru (NRU/NR), Nepal (NPL/NP), Netherlands (NLD/NL), Nicaragua (NIC/NI), Niger (NER/NE), Nigeria (NGA/NG), Norway (NOR/NO), Oman (OMN/OM), Pakistan (PAK/PK), Palau (PLW/PW), Panama (PAN/PA), Papua New Guinea (PNG/PG), Paraguay (PRY/PY), Peru (PER/PE), Philippines (PHL/PH), Poland (POL/PL), Portugal (PRT/PT), Qatar (QAT/QA), Romania (ROU/RO), Russia (RUS/RU), Rwanda (RWA/RW), Saint Kitts and Nevis (KNA/KN), Saint Lucia (LCA/LC), Samoa (WSM/WS), San Marino (SMR/SM), Sao Tome and Principe (STP/ST), Senegal (SEN/SN), Serbia (SRB/RS), Seychelles (SYC/SC), Sierra Leone (SLE/SL), Singapore (SGP/SG), Slovakia (SVK/SK), Slovenia (SVN/SI), Somalia (SOM/SO), South Africa (ZAF/ZA), Spain (ESP/ES), Sri Lanka (LKA/LK), Sudan (SDN/SD), Suriname (SUR/SR), Swaziland (SWZ/SZ), Sweden (SWE/SE), Switzerland (CHE/CH), Taiwan (TWN/TW), Tajikistan (TJK/TJ), Tanzania (TZA/TZ), Thailand (THA/TH), Timor-Leste (TLS/TL), Togo (TGO/TG), Tonga (TON/TO), Tunisia (TUN/TN), Turkey (TUR/TR), Turkmenistan (TKM/TM), Tuvalu (TUV/TV), Uganda (UGA/UG), Ukraine (UKR/UA), United States (USA/US), Uruguay (URY/UY), Uzbekistan (UZB/UZ), Vanuatu (VUT/VU), Venezuela (VEN/VE), Vietnam (VNM/VN), Western Sahara (ESH/EH), Yemen (YEM/YE), Zambia (ZMB/ZM), Zimbabwe (ZWE/ZW)
1.0

Supporting HMG’s Climate Change Ambitions (… or, “A GCO’s tales from Cancun”)

Document

Document Date: 2011-02-01Release Date: 2014-11-01
This joint GCHQ/MI6 presentation from February 2011 documents the process of international climate change negotiations becoming a “serious intelligence priority” for the UK: see the Dagbladet Information article Snowden documents reveal British climate espionage – Copenhagen climate summit targeted, 1 November 2014.  
GCHQ SECRET INTELLIGENCE SERVICE Supporting HMG’s Climate Change Ambitions (...or, “A GCO’s tales from Cancún”) 27 November - 10 December 2010 GCHQ SECRET INTELLI...
1.0

GCSB XKeyScore fingerprint – May 2013

Document

Document Date: 2013-05-06Release Date: 2015-03-23
This XKeyScore fingerprint, last modified on 6 May 2013, shows that New Zealand’s GCSB monitored candidates for the post of WTO director general: see the New Zealand Herald article How spy agency homed in on Groser’s rivals, 23 March 2015.
Classification: 5-eyes releasable Top Secret COMINT Last modified: 2013-05-06 NOTE WELL that the contents of this file are managed by the GUI. Any manual updates to this file will be o...
1.0

Computer-Network Exploitation Successes South of the Border

Document

Document Date: 2010-11-15Release Date: 2013-10-20
This extract from a 15 November 2010 NSA memo reveals that the agency has been able to access Mexican President Felipe Calderon’s email account: see the Der Spiegel article NSA Accessed Mexican President’s Email, 20 October 2013.
(TS//SI//REL) Computer-Network Exploitation Successes South of the Border I FROM: .* BA. Chief, NSA-Texas TAO/Requiremcnts & Targeting (FTS327) Run Date: 11/15/2010 rS//SI//REL) TAO-en...
1.0

Exploiting Foreign Lawful Intercept (LI) Roundtable

Document

Document Date: 2012-01-01Release Date: 2015-09-29
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif: TOP SECRET//SI//REL TO USA, FVEY (S//SI//REL) Exploiting Foreign Lawful Intercept (LI) Roundtable S31122 TOP SECRET//SI//REL TO USA, FVEY...
1.0

Geopolitical trends for 2014-2019

Document

Release Date: 2013-12-02
Three redacted slides from an NSA presentation name several states as subjects of ongoing interest: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
slide1.jpg: slide2.jpg: TOP SECRET//SI//REL TO USA, FVEY U//JEQUOslide3.jpg: rTO USA, FYEY Geopolitical Trends: Global Drivers (S//REL) Geopolitical Trend driver»: • St re**orc to...
1.0

Intro to the VPN Exploitation Process

Document

Document Date: 2010-09-13Release Date: 2014-12-28
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh