Filtered By
Pakistan (PAK/PK) X
Countries Mentioned [filter]
Results
75 Total
0.0

HIMR Data Mining Research Problem Book

Document

Release Date: 2016-02-02 Document Date: 2011-09-20
This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The […]
UK TOP SECRET STRAP1 COMINT AUS/CAN/NZ/UK/US EYES ONLY Reference: OPC-M/TECH.A/455 (v1.0, r206) Date: 20 September 2011 Copy no: HIMR Data Mining Research Problem Book OPC-MCR, G...
0.0

Events Product Centre

Document

Release Date: 2015-09-25 Document Date: 2010-11-01
This GCHQ presentation from November 2010 shows that the agency was logging 30 billion metadata records per day by that year: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
operational-engineering-nov-2010-p1-normal.gif: •¿events Events Product Centre W: CHQ SECRET STRAP1operational-engineering-nov-2010-p2-normal.gif: »¿events Agenda «Welcome «Im...
0.0

Tech Strings in Documents (aka Tech Extractor) 2009

Document

Release Date: 2015-07-01 Document Date: 2009-12-01
This December 2009 NSA presentation explains how keyword selection works within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-tech-extractor-2009-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. AUS, CAN, GBR. NZU/20291123 Tech Strings in Documents (aka Tech Extractor) December 2009xks-tech-extractor-2009-p2...
0.0

HTTP Activity in XKEYSCORE

Document

Release Date: 2015-07-01 Document Date: 2009-03-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HTTP Activity in XKEYSCORE March 2009 Derived From: NSA/QSSM 1-52 Dated: 200701 (T Declassify On: 202911 ...
0.0

ISA-94: Application for renewal of warrant GPW/1160 in respect of activities which involve the modification of commercial software

Document

Release Date: 2015-06-22 Document Date: 2008-06-13
This GCHQ application for warrant renewal from June 2008 shows that the agency has been engaged in the reverse engineering of commercial antivirus software for the purposes of facilitating its hacking operations: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET STRAP2 UK EYES ONLY Date: 13 June 2008 GCHQ Reference: A/9014/9105/55 Sian MacLeod Mariot Leslie Foreign Secretary ISA-94: APPLICATION FOR RENEWAL OF WARRANT GPW/1160 IN...
0.0

PCS Harvesting at Scale

Document

Release Date: 2015-02-19 Document Date: 2010-04-27
This April 2010 GCHQ report proposes an automated approach to seizing large numbers of mobile phone encryption keys: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
TOP SECRET STRAP 1 Reference: OPC-TDSD/TECH/21 Date: 27th April 2010 PCS Harvesting at Scale (OPC-TDSD) (OPC-TDSD) (OPC-CAP) (OPC-TDSD) Summary This report explores the ...
0.0

DEFIANTWARRIOR and the NSA’s Use of Bots

Document

Release Date: 2015-01-17 Document Date: 2010-05-24
This 24 May 2010 NSA presentation describes the ways the agency uses botnets (“bot herding”): see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL USA, FVEY DEFIANTWARRIO R 7 / //and the ; NSA's Uè^ojÆotá/ Overall Classification: TOP SECRET//COMINT//REL FVEY Current As Of: 24 May 2010 Derived From: NSA/CSS...
0.0

India: Support to Terrorist Attacks in Mumbai

Document

Release Date: 2014-12-21
This extract from an undated NSA document claims that GCHQ surveillance of Lashkar-e-Taiba operative Zarrar Shah “yielded a complete operations plan” for the 2008 Mumbai terrorist attacks – but only after the plot had succeeded: see the New York Times article In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted Puzzle, 21 December […]

0.0

Classification Guide for SIGINT Material Dating from 16 August 1945 – 31 December 1967

Document

Release Date: 2014-06-18 Document Date: 2011-11-21
This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
TOP SECRET//SjyTK//NOFÜRN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR SIGINT Material Dating from 16 August 1945 *31 December 1967 Effects Dale: 21 De...
0.0

Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities

Document

Release Date: 2013-12-09 Document Date: 2007-01-01
A 2007 proposal to the NSA from contractor SAIC, promoting the company’s ability to support “intelligence collection in the games space”: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 December 2013.
Games: A Look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities Table of Contents FORWARD......................................................................4 ...
0.0

January 2007 Strategic Mission List

Document

Release Date: 2013-11-02 Document Date: 2007-01-01
This nine-page briefing describes the NSA’s major missions and signals intelligence priorities for 2007: see the New York Times article No Morsel Too Minuscule for All-Consuming N.S.A., 2 November 2013.
nsa-mission-list-1.png: SECRET//COMINT//REL TO USA. ALS. CAN. GBR//20291123 United States S1GINT System January 2007 Strategic Mission List Introduction - Director’s Intent (S//SI) The ...
0.0

IMT Members Make Trip to Afghanistan, Pakistan

Document

Release Date: 2016-12-07 Document Date: 2004-06-09
Two members of the Middle East/North Africa/South Asia Issue Managers Team who traveled to Afghanistan and Pakistan in May 2004 share a brief update and photos from their trip.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) IMT Members Make Trip to Afghanistan, Pakistan<br>FROM: SIGINT Communicatio...
0.0

Interview with... Charlie Meals, Signals Intelligence Deputy Director

Document

Release Date: 2017-04-24 Document Date: 2004-10-13
In an interview, the deputy director describes his early days in the NSA's "weather shop," decrypting Soviet weather reports.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) Interview with... Charlie Meals, Signals Intelligence<br>Deputy Director<...
0.0

The Only Game in Town (part 1)

Document

Release Date: 2017-04-24 Document Date: 2004-12-15
An intelligence analysis intern describes her tour as NSA counterterrorism representative at the CIA station in Islamabad, where she witnessed the arrests of several dozen terrorists.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) The Only Game in Town (part 1)<br>FROM:<br>Intelligence Analysis (IA) Intern<br...
0.0

The Geographic Resource Center Has Info You Need: Maps, Data and Research

Document

Release Date: 2017-04-24 Document Date: 2004-10-29
The Geographic Resource Center is NSA's map library, which provides hard-copy and digital maps and geographic data to analysts at NSA headquarters and around the world.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) The Geographic Resource Center Has Info You Need: Maps, Data<br>and Research<br...
0.0

SIGINT Obtains Details of Usama bin Laden Message to Top al-Qa’ida Leader in Iraq

Document

Release Date: 2015-05-18 Document Date: 2007-07-18
This 18 July 2007 article from internal NSA newsletter SIDToday describes the interception of a message from Osama bin Laden, which was not transmitted through electronic channels: see the Intercept article What the Snowden Files Say About the Osama Bin Laden Raid, 18 May 2015.
DYNAMIC PAGE - HIGHES I P0SS1BLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Friday, 09 Nov 2012 • Web search • Agcncv-all Emails • SID-all Emails ...
0.0

Exploiting Foreign Lawful Intercept (LI) Roundtable

Document

Release Date: 2015-09-29 Document Date: 2012-01-01
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif: TOP SECRET//SI//REL TO USA, FVEY (S//SI//REL) Exploiting Foreign Lawful Intercept (LI) Roundtable S31122 TOP SECRET//SI//REL TO USA, FVEY...
0.0

Tech Strings in Documents (aka Tech Extractor) 2010

Document

Release Date: 2015-07-01 Document Date: 2010-04-01
This April 2010 NSA presentation explains how keyword selection works within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-tech-extractor-2010-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. AUS, CAN. GBR, NZL Tech Strings in Documents (aka Tech Extractor) TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZLx...
0.0

X-KEYSCORE as a SIGDEV tool

Document

Release Date: 2015-07-01 Document Date: 2009-01-01
This 2009 NSA presentation describes some of the plug ins available and the way the tool relates to other NSA methods for searching internet metadata, with XKeyScore having the broadest capability: see the book No Place To Hide, 13 May 2014.
xks-as-a-sigdev-tool-p1-normal.gif: X-KEYSCORE as a SIGDEV tool 2009 ■EBTxks-as-a-sigdev-tool-p2-normal.gif: What is X-KEYSCORE?xks-as-a-sigdev-tool-p3-normal.gif: TOP SECRET//COMINT//ORC...
0.0

Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations

Document

Release Date: 2015-04-02 Document Date: 2011-03-10
These extracts from a GCHQ paper dated 10 March 2011 provide an indication of the agency’s ongoing effects (misinformation) and “online HUMINT” operations: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.s
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations PhD Human Systems Group, Information Management ...
0.0

Black Budget entry on Computer Network Operations GENIE project

Document

Release Date: 2015-01-17 Document Date: 2012-02-18
This extract from the US Intelligence Community’s Congressional Budget Justification for the Fiscal Year 2013 (the “Black Budget”) provides the budget for GENIE the project “which underpins NSA/CSS’ Computer Network Operations (CNO) Endpoint capabilities conducted by the Tailored Access Operations (TAO) Group: see the Der Spiegel article The Digital Arms Race: NSA Preps America for […]
TOP SECRET//SI/TK//NOFORN (U) COMPUTER NETWORK OPERATIONS (U) GENIE This Exhibit is SECRET//NOFORN FY 20111 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 2013 Base...
0.0

Joint Prioritized Effects List

Document

Release Date: 2014-12-28 Document Date: 2011-01-01
This anonymised version of the Joint Prioritized Effects list highlights aspects of NATO’s targeted killing operations in Afghanistan: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
JPEL TARGETS 669 RESTRICTE NATO SECRET REL ISAF JPEL NEXTJTWG: 08AUG10 NEXT JPEL APPROVAL: 09 AUG10 REGION TRIBAL AFFILIATION PROV TGTNOM LEAD AGENCY/SERV AGENCY OP NAME OBJ ...
0.0

SIGINT Helps Hobble the Taleban by Cutting Off Their Livelihood

Document

Release Date: 2014-12-28 Document Date: 2009-02-03
A post from the internal NSA newsletter SIDToday shows that, as of 2008, “narcotics traffickers were added to the Joint Prioritized Effects List (JPEL) for the first time”: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
SIDToday - SIGINT Helps Hobble the Taleban by Cutting Off Their Livelihood DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL • SIDtodav A...
0.0

Profiling SSL and Attributing Private Networks

Document

Release Date: 2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL PROFILING SSL AND ATTRIBUTING PRIVATE NETWORKS An introduction to FLYING PIG and HUSH PUPPY ICTR - Network Exploitation GCHQ T R J...
0.0

Bad guys are everywhere, good guys are somewhere!

Document

Release Date: 2014-09-14
This undated NSA presentation sets out the network-mapping tool Treasure Map, and supplies information on some of the agency’s collection access points: see the Intercept article New Zealand Launched Mass Surveillance Project While Publicly Denying It, 15 September 2014.
Bad guys are everywhere, good guys are somewhere! NSA/CSS Threat Operations Center (NTOC) NTOC Technology Development TS//SI//REL TO USA, FVEY (U) NTOC • (U//FOUO) Operates under bot...
0.0

Muhammad Tahir Shahzad AKA Abu Hamza

Document

Release Date: 2014-07-05 Document Date: 2011-01-22
These two slides from a 22 January 2011 NSA PowerPoint presentation constitute the first document drawing on intercepted communications content to be made public. The subject of this presentation was captured in Abbottabad, Pakistan on 23 January 2011: see the Washington Post article In NSA-intercepted data, those not targeted far outnumber the foreigners who are, […]
Muhammad Tahir Shahzad AKA Abu Hamza 22 JANUARY 2011 OVERALL CLASSIFICATION OF DOCUMENT: (U//FOUO) The following information has not been fully analyzed and may be incomplete and sub...
0.0

Boundless Informant heat maps

Document

Release Date: 2013-06-11 Document Date: 2013-03-26
These undated heat maps show the number of pieces of communications data the NSA gathers per country in a particular 30 day period, divided into telephony (DNR) and internet (DNI) metadata. Details in the second map refer to a period in January 2013 and third to a period ending in February the same year: see […]
boundlessinformant.pdf: Page 93 BOUNDLESSINFORMANT Top 5 Countries (i»t 30 o«>» t-om «¡xu/i ■Ohm.pdf: BOUNDLESSINFORMANT im!MwamHMiM:rta.]a;ii]aaMaiM,(.yiii:am«.'.«M«iMiaiiiiiPH;i!i...
0.0

SIDtoday Soundbites -- Conclusion

Document

Release Date: 2016-12-07 Document Date: 2004-04-01
Memorable quotes from the first year of SIDtoday.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) SIDtoday Soundbites -- Conclusion<br>FROM: SIGINT Communications<br>Unkno...
0.0

The Jemaah Islamiyah: A Continuing Threat

Document

Release Date: 2016-12-07 Document Date: 2004-04-28
Jemaah Islamiyah, a terrorist group, was responsible for the Bali and Jakarta bombings in 2002-2003 and remains a threat in southeast Asia. Collection information from the NSA about the group is passed on to the Australian Defence Signals Directorate.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) The Jemaah Islamiyah: A Continuing Threat<br>FROM:<br>Deputy SINIO for East Asi...
0.0

Ambassador Wendy Sherman Speaks on North Korea

Document

Release Date: 2016-12-07 Document Date: 2004-05-04
Ambassador Sherman believes that North Korea will continue its nuclear program or may have already succeeded in developing weapons. SIGINT on the issue was "absolutely indispensable" and "critical for arms control and verification."
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Ambassador Wendy Sherman Speaks on North Korea<br>FROM: SIGINT Communications<b...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh