Filtered By
North Korea (PRK/KP)X
Countries Mentioned [filter]
Results
18 Total
1.0

January 2007 Strategic Mission List

Document

Document Date: 2007-01-01Release Date: 2013-11-02
This nine-page briefing describes the NSA’s major missions and signals intelligence priorities for 2007: see the New York Times article No Morsel Too Minuscule for All-Consuming N.S.A., 2 November 2013.
nsa-mission-list-1.png: SECRET//COMINT//REL TO USA. ALS. CAN. GBR//20291123 United States S1GINT System January 2007 Strategic Mission List Introduction - Director’s Intent (S//SI) The ...
1.0

CSEC Cyber Threat Capabilities

Document

Document Date: 2011-01-01Release Date: 2015-03-23
This CSE presentation from 2011 describes some of the cyber warfare tools at the agency’s disposal: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.
■ ^ ■ Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY Establishment Canada des télécommunications Canada CSEC Cyber Threat Capabilities SIGINT and ITS: an en...
1.0

MG Q, Where Are You?

Document

Document Date: 2003-06-25Release Date: 2016-05-16
The SIGINT director went with the NSA director to the Palliser Conference, an annual meeting of the five-eyes SIGINT and HUMINT agencies.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) MG Q, Where Are You?<br>FROM: SIGINT Communications<br>Unknown<br>Run Date: 06/2...
1.0

Classification Guide for SIGINT Material Dating from 16 August 1945 – 31 December 1967

Document

Document Date: 2011-11-21Release Date: 2014-06-18
This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
TOP SECRET//SjyTK//NOFÜRN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR SIGINT Material Dating from 16 August 1945 *31 December 1967 Effects Dale: 21 De...
1.0

NIOC Maryland Advanced Computer Network Operations Course

Document

Document Date: 2012-04-18Release Date: 2015-01-17
This April 2012 training presentation produced by Navy Information Operations Command Maryland states that “the next major conflict will start in cyberspace”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
NIOC MARYLAND ADVANCED COMPUTER NETWORK OPERATIONS COURSE Coordinated by -- NAVIOCOM Maryland Center of Excellence for Non-Kinetic Options — 1 SECRET//REL TO USA, / Title • C...
1.0

1999 Agreement between the US and Israel

Document

Document Date: 1999-07-15Release Date: 2014-08-04
This agreement, dated 15 July 1999, includes a preamble describing the development of signals intelligence cooperation between the US and Israel since the 1950s: see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
TOP S E C R E T/HVCCO 1. (S) preamblei in 1968 President Johnson and Prime Minister Eshkol agreed that an intelligence exchange would take place between the United States and Israel. This und...
1.0

Black Budget – Israel

Document

Document Date: 2012-02-01Release Date: 2013-08-29
These three short extracts from the 2013 Intelligence Community Budget Justification (“the Black Budget”) shows that Israel was seen as a counter-intelligence target: see the Intercept article Netanyahu’s Spying Denials Contradicted by Secret NSA Documents, 25 March 2015.
1Isr-540x258.png: (U> Penetrate Hostile Foreign Intelligence Services (S//NF) The ability to detect and engage foreign intelligence services and non state actors that target U.S. interests is...
1.0

Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations

Document

Document Date: 2011-03-10Release Date: 2015-04-02
These extracts from a GCHQ paper dated 10 March 2011 provide an indication of the agency’s ongoing effects (misinformation) and “online HUMINT” operations: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.s
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations PhD Human Systems Group, Information Management ...
1.0

NSA Intelligence Relationship with New Zealand

Document

Document Date: 2013-04-01Release Date: 2015-03-10
This NSA information paper from April 2013 describes the state of the agency’s intelligence relationship with its New Zealand counterpart: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY National Security Agency April 2013 Central Security Service Information Paper (U) Subject: NSA Intelligence Relationship with New Zealand (U) Execu...
1.0

North Korea Rock Drill Held This Week

Document

Document Date: 2003-06-20Release Date: 2016-05-16
A North Korea “rock drill” featuring experts from across the cryptologic community was held to prepare the cryptologic system to better support policymakers and war fighters.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) North Korea Rock Drill Held This Week<br>FROM: the North Korean Issue Manage...
1.0

Uncovering North Korea Nuclear Programs

Document

Document Date: 2003-04-09Release Date: 2016-05-16
Based on NSA SIGINT, the State Department confronted North Korean officials with evidence they were developing a uranium enrichment capability.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) Uncovering North Korea Nuclear Programs<br>FROM: Frances J. Fleisch<br>Deput...
1.0

Is there “fifth party” collection?

Document

Document Date: 2011-01-01Release Date: 2015-01-17
This undated post from an NSA discussion board describes “fourth party collection” – piggybacking on another state’s computer network exploitation operation: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
(TS//SI//REL) Is there "fifth party" collection? | Round Table Dynamic Page - Highest Possible Classification is TOP SECRET // SI / TK // REL TO USA, FVEY (TS//SI//REL) Is there "fifth part...
1.0

Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations

Document

Document Date: 2011-03-22Release Date: 2015-06-22
This 42-page report from 10 March 2011 provides an overview of GCHQ’s information operations unit and the behavioural science theories that underpin its activities: see the Intercept article Controversial GCHQ Unit is Deeply Engaged in Law Enforcement, 22 June 2015.
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations Mandeep K. Dhami, PhD Human Systems Group, Infor...
1.0

Dynamic Methods of Interaction with New and Existing Customers

Document

Document Date: 2003-04-22Release Date: 2016-05-16
After 9/11, SID suddenly got an influx of requests from previously minor customers (like the departments of Interior and Agriculture), acquired many new customers, and had to interact differently with law enforcement. In response, CRD designed new products to be more flexible with secret documents (allowing them to be accessed outside of SCIFs, on mobile devices, etc.).
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Dynamic Methods of Interaction with New and Existing Customers<br>FROM:<br>Actin...
1.0

When Meeting Customer Needs Means Defending the Nation

Document

Document Date: 2003-04-16Release Date: 2016-05-16
Introduction to SID’s Customer Relationships Directorate series and summary of future articles.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) When Meeting Customer Needs Means Defending the Nation<br>FROM:<br>Acting Chief,...
1.0

2013 Intelligence Community budget justification

Document

Document Date: 2012-02-01Release Date: 2013-08-29
Congressional Budget Justification summary for fiscal year 2013 from the Office of the Director of National Intelligence (ODNI): see the Washington Post article U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary, 29 August 2013.
TOP SECRET//SI/TK//NOFORN FY 2013 Congressional Budget Justification Volume I NATIONAL INTELLIGENCE PROGRAM SUMMARY February 2012 TOP SECRET//SI/TK//NOFORN TOP SECRET//SI/TK//...
1.0

2008-13 Strategic Plan

Document

Document Date: 2007-10-03Release Date: 2013-11-02
This eleven page document describes how the NSA sees its own mission, internal culture and the challenges it faces: see the New York Times article No Morsel Too Minuscule for All-Consuming N.S.A., 2 November 2013.
nsa-mission-plan-1.png: TOP SECRET//COMINT//REL TO USA, FVEY//20320108 (U) SIGINT Mission Strategic Plan FY2008-2013 3 October 2007 Release ¡Signals Intelligence Derived From: N...
1.0

Intro to the VPN Exploitation Process

Document

Document Date: 2010-09-13Release Date: 2014-12-28
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh