Filtered By
NSA X
Agency [filter]
Afghanistan (AFG/AF) X
Countries Mentioned [filter]
Mexico (MEX/MX) X
Countries Mentioned [filter]
Results
5 Total
0.0

Exploiting Foreign Lawful Intercept (LI) Roundtable

Document

Release Date: 2015-09-29 Document Date: 2012-01-01
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif: TOP SECRET//SI//REL TO USA, FVEY (S//SI//REL) Exploiting Foreign Lawful Intercept (LI) Roundtable S31122 TOP SECRET//SI//REL TO USA, FVEY...
0.0

Tailored Access Operations – Texas Cryptologic Center

Document

Release Date: 2013-12-29
This NSA presentation describes the staffing and activities of the Tailored Access Operations sectio based in San Antonia Texas. These included operations against Mexico’s Secretariat of Public Security (codenamed WHITETAMALE), Cuba, Columbia, Venezuela and unspecified targets in the Middle East: see the Der Spiegel article Inside TAO: Documents Reveal Top NSA Hacking Unit, 29 December […]
image-584021-galleryV9-yenq.jpg: image-584022-galleryV9-qplk.jpg: TOP SECRET//COMINT//REL TO USA, FVEY Overview • Current People, Space, & Operations (FY2009) • Medina era Growth (FY20...
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

Finding Nuggests — Quickly — in a Heap of Voice Collection, From Mexico to Afghanistan

Document

Release Date: 2015-05-05 Document Date: 2011-05-25
This 25 May 2011 post from the NSA internal newsletter SIDToday describes the agency’s development of speech to text technology: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
(S//SI//REL) Finding Nuggets -- Quickly — in a Heap of Voice Collection, From Mexico to Afghanistan FROM: (U//FOUO)^^^^^^| Senior Technical Development Program — Class of 2010, and Intell...
0.0

Army Values Ingrained in Every New Recruit

Document

Release Date: 2017-09-13 Document Date: 2005-05-19
For Army Day, Maj. Gen. Richard Quirk delivers lengthy remarks about the history and ethos of the U.S. Army, and urges Signals Intelligence Directorate staff to "recommit yourself to the Country, the mission, and your fellow soldiers."
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Army Values Ingrained in Every New Recruit FROM: MG Richard Quirk, USA Signals Intelligen...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh