Filtered By
NSA X
Agency [filter]
China (CHN/CN) X
Countries Mentioned [filter]
Russia (RUS/RU) X
Countries Mentioned [filter]
Results
29 Total
0.0

DEFIANTWARRIOR and the NSA’s Use of Bots

Document

Release Date: 2015-01-17 Document Date: 2010-05-24
This 24 May 2010 NSA presentation describes the ways the agency uses botnets (“bot herding”): see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL USA, FVEY DEFIANTWARRIO R 7 / //and the ; NSA's Uè^ojÆotá/ Overall Classification: TOP SECRET//COMINT//REL FVEY Current As Of: 24 May 2010 Derived From: NSA/CSS...
0.0

Coming Soon! A Tool that Enables Non-Linguists to Analyse Foreign-TV News Programs

Document

Release Date: 2015-05-05 Document Date: 2008-10-23
This October 2008 article from an NSA internal newsletter SIDToday Enhanced Video Text and Audio Processing (eViTAP), a tool that provides automatic translations of news broadcasts in English, Russian, Spanish, Arabic, Mandarin and Farsi: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015. sidtoday-non-linguists-final
(U//FOUO) Coming Soon! A Tool that Enables Non-Linguists to Analyze Foreign-TV News ______________________ Programs FROM: Center for Time-Sensitive Information (S2413) Run Date: 10/23/20...
0.0

Apportionment of Strategic Efforts -- Our Plan of Attack

Document

Release Date: 2018-03-01 Document Date: 2006-02-15
U.S. Signals Intelligence System resources are allocated in the following areas: 35 percent are dedicated to the global war on terrorism; 35 percent are dedicated to China, North Korea, Iran, and Russia; 20 percent go to remaining strategic focus areas; and 10 percent are set aside for development in data acquisition, signals development, or analysis and production.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) Apportionment of Strategic Efforts -- Our Plan of Attack FROM: SIGINT Communication...
0.0

SIGINT Monitors Global Spread of Avian Flu

Document

Release Date: 2016-12-07 Document Date: 2005-10-28
NSA closely monitored the 2004 spread of avian influenza in preparation for a possible pandemic. "As our IC colleagues have said, containing the threat of infectious disease comes down to 'detection, detection, detection. SIGINT is probably going to get it first,'" the author writes.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) SIGINT Monitors Global Spread of Avian Flu<br>FROM:<br>Assistant SINIO for ...
0.0

About the Virtual Private Network SIGDev Working Group...

Document

Release Date: 2017-09-13 Document Date: 2005-05-12
A brief description of a working group focused on monitoring and helping to exploit virtual private networks, or VPNs. Established in 2004, the working group publishes regular "VPN Target Activity Reports" on dozens of countries and organizations around the world. "These reports may help you exploit targets' VPNs more successfully," the chair of the working group writes.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (TS//SI) About the Virtual Private Network SIGDev Working Group... FROM: Chair NSA VPN WG, Ad...
0.0

GCHQ Perspective on Annual Bilat

Document

Release Date: 2017-09-13 Document Date: 2005-02-11
Topics at an annual meeting between the Signals Intelligence Directorate and its GCHQ counterpart included the relative paucity of GCHQ efforts in China, the need to devote sufficient resources to Russia and weapons of mass destruction in the face of counterterrorism mandates, and the need to better geolocate targets, writes GCHQ's director for signals intelligence operations.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) GCHQ Perspective on Annual Bilat FROM: Iain Lobban Director of SIGINT Operations, GCHQ Ru...
0.0

A&P; Leadership Changes

Document

Release Date: 2016-08-10 Document Date: 2003-10-22
Leadership changes in Analysis and Production are announced.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) A&amp;P; Leadership Changes<br>FROM: Jim Allen<br>Deputy Director for Analysis a...
0.0

Exploiting Foreign Lawful Intercept (LI) Roundtable

Document

Release Date: 2015-09-29 Document Date: 2012-01-01
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif: TOP SECRET//SI//REL TO USA, FVEY (S//SI//REL) Exploiting Foreign Lawful Intercept (LI) Roundtable S31122 TOP SECRET//SI//REL TO USA, FVEY...
0.0

Bad guys are everywhere, good guys are somewhere!

Document

Release Date: 2014-09-14
This undated NSA presentation sets out the network-mapping tool Treasure Map, and supplies information on some of the agency’s collection access points: see the Intercept article New Zealand Launched Mass Surveillance Project While Publicly Denying It, 15 September 2014.
Bad guys are everywhere, good guys are somewhere! NSA/CSS Threat Operations Center (NTOC) NTOC Technology Development TS//SI//REL TO USA, FVEY (U) NTOC • (U//FOUO) Operates under bot...
0.0

NSA Intelligence Relationship with Israel

Document

Release Date: 2014-08-04 Document Date: 2013-04-19
This internal NSA information paper, dated 19 April 2013, describes a “far reaching technical and analytic relationship” with Israel’s SIGINT National Unit (ISNU): see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
TOP SECRET//SI//NOFORN National Security Agency/Central 19 April 2013 Security Service Information Paper (TS//REL TO USA, ISR) Subject: NSA Intelligence Relationship with Israel (U) I...
0.0

Venezuela's President Chavez: Castro's Ideological Successor

Document

Release Date: 2017-09-13 Document Date: 2005-03-18
The NSA's signals intelligence national intelligence officer for Latin America explains why the Bush administration has identified Venezuelan President Hugo Chávez as a threat to democracy.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Venezuela's President Chavez: Castro's Ideological Successor<br>FROM:<br>SINIO ...
0.0

China: Modernizing and Mobilizing Its Strategic Strike Capabilities

Document

Release Date: 2016-12-07 Document Date: 2004-04-13
After two decades of development, China is on the brink of mass-producing mobile ICBMs with the range to target the entire U.S. "China is seeking to establish a credible and survivable nuclear deterrent, and will likely adhere to its long-standing 'no first use' policy."
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S) China: Modernizing and Mobilizing Its Strategic Strike Capabilities<br>FROM:<br...
0.0

UN Peacekeeping in Sub-Saharan Africa: A Growth Industry

Document

Release Date: 2016-12-07 Document Date: 2004-03-16
An article describes the current state of U.N. peacekeeping operations in sub-Saharan Africa and predicts growth in missions and personnel. There is no mention of NSA or SID participation.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) UN Peacekeeping in Sub-Saharan Africa: A Growth Industry<br>FROM:<br>Deputy SIN...
0.0

Introducing Carl Johnson as Assistant Deputy Director for Customer Relationships

Document

Release Date: 2016-05-16 Document Date: 2003-06-26
The assistant deputy director for customer relationships describes his first month on the job.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Introducing Carl Johnson as Assistant Deputy Director for<br>Customer Relationsh...
0.0

SIGINT in Nebraska

Document

Release Date: 2016-08-10 Document Date: 2003-08-14
The NSA provides the U.S. Strategic Command with “intelligence on space control and surveillance operations, information operations, computer network operations and space campaign planning.”
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) SIGINT in Nebraska<br>FROM:<br>NSA/CSS STRATCOM<br>Run Date: 08/14/2003<br...
0.0

EP-3E Collision: Cryptologic Damage Assessment and Incident Review

Document

Release Date: 2017-04-10 Document Date: 2001-07-01
A joint US Navy and NSA report, prepared three months after a US spy plane was forced to crash land in China, assesses the degree to which surveillance secrets were compromised: see the Intercept article Burn After Reading: Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident, 10 April 2017. […]
TOP SECRET//COMINT//NOFORN//X1 EP-3E Collision: Cryptologic Damage Assessment and Incident Review Final Report Prepared by the EP-3 Cryptologic Assessment Team July 2001 Classifie...
0.0

An Easy Way to Win: Using SIGINT to Learn about New Viruses (Project Camberdada)

Document

Release Date: 2015-06-22 Document Date: 2010-01-01
This 2010 NSA presentation describes Project Camberdada, an attempt to subvert popular antivirus software by means of surveilling email traffic: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL An Eas Using S about P fwmuuuu IGINT to Learn iew Viruses Project CAMBERDADA ByHH, 1412 (IAD) V252|| Derived From: NSA/CSSM...
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

Final Agenda SWEDUSA

Document

Release Date: 2013-12-11 Document Date: 2013-04-23
The agenda for the SWEDUSA 2013 Strategic Planning Conference on 24-26 April 2013, showing extensive discussion between the NSA and FRA at the most senior level: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
TOP SECRET//SI//NOFORN As of: 23 April//1000 Protocol Rep: Visit manager: Date/Time of Visit: (U) 24-26 April 2013 24 April 2013//0745-1600; 25 April 2013//0845-1545; 26 April...
0.0

What Does the Future Hold? SINIO Forecast for 2006-2010

Document

Release Date: 2016-12-07 Document Date: 2004-01-08
The SIGINT National Intelligence Officers Council predicted the most critical intelligence issues for the U.S. and SIGINT between 2006 and 2010. Most alarming was risk of a terrorist attack using weapons of mass destruction.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) What Does the Future Hold? SINIO Forecast for 20062010<br>FROM: Marilyn J...
0.0

XKEYSCORE for Counter-CNE

Document

Release Date: 2015-07-01 Document Date: 2011-03-01
This NSA presentation from March 2011 discusses the use of the XKeyScore tool for countering foreign CNE attacks: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-for-counter-cne-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, FVEY Using the XKS CNE dataset and a DISGRUNTLEDDUCK fingerprint, we now see at least 21 TAO boxes with evidence of this in...
0.0

Content Extraction Enhancements for Target Analytics

Document

Release Date: 2014-01-16 Document Date: 2011-06-09
This NSA presentation from 9 June 2011 shows the scale of the agency’s collection of SMS messages (codenamed Dishfire) and describes the operation of the Prefer analysis tool: see the Guardian article, NSA collects millions of text messages daily in ‘untargeted’ global sweep, 16 January 2014.
TOP SECRET//COMINT//REL TO USA, FVEY//20320108 Content Extraction Enhancements For Target Analytics: SMS Text Messages: A Goldmine to Exploit 9 June, 2011 Presenters: With Wor...
0.0

Visit Precis: SWEDUSA

Document

Release Date: 2013-12-11
This briefing document, produced ahead of the SWEDUSA Strategic Planning Conference of 24-26 April, outlines General Keith Alexander’s talking points for the event: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
TOP SECRET//COMINT//NOFORN VISIT PRÉCIS SWEDUSA 2013 STRATEGIC PLANNING CONFERENCE (SPC) MR. INGVAR ÀKESSON DIRECTOR GENERAL FORSVARETS RADIOANSTALT (FRA) SWEDEN 24-26 APRIL 2013 ...
0.0

Is NSA Correctly Postured Against the Most Critical Missions?

Document

Release Date: 2017-09-13 Document Date: 2005-06-09
Signals Intelligence Directorate leadership decides where to expend the most resources based on the SIGINT Mission List. The list includes 15 critical functional missions -- each of which has an area of focus and an area in which SID decides not to devote as much attention, thus accepting some amount of risk. China, North Korea, Iraq, Iran, and Russia are "regarded as 'trump cards'" and can take priority over any one of these missions.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Is NSA Correctly Postured Against the Most Critical Missions? FROM: MG Richard Quirk, USA...
0.0

Pacific SIGINT Development Conference

Document

Release Date: 2016-12-07 Document Date: 2004-05-13
Report from the April 2004 SIGDEV conference, held in Hawaii.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) Pacific SIGINT Development Conference<br>FROM:<br>GCHQ Integree, SIGINT S...
0.0

FOXACID SOP for Operational Management of FOXACID Infrastructure

Document

Release Date: 2016-08-19
This draft NSA report on using the agency’s FOXACID system confirms that malware code released by the ShadowBrokers did, in fact, originate from the NS see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL D R A F T NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND FOXACID SOP FOR OPERATIONAL MANAGEMENT...
0.0

1999 Agreement between the US and Israel

Document

Release Date: 2014-08-04 Document Date: 1999-07-15
This agreement, dated 15 July 1999, includes a preamble describing the development of signals intelligence cooperation between the US and Israel since the 1950s: see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
TOP S E C R E T/HVCCO 1. (S) preamblei in 1968 President Johnson and Prime Minister Eshkol agreed that an intelligence exchange would take place between the United States and Israel. This und...
0.0

Venezuela's President Chavez: Castro's Ideological Successor

Document

Release Date: 2016-12-07 Document Date: 2005-03-18
President Bush considers Venezuelan President Hugo Chavez a "threat to democracy in the region and a threat to U.S. interests in particular." But "from a SIGINT perspective, Venezuela poses a particularly difficult challenge. With Castro as his mentor, Chavez has learned the importance of communications security and has made sure that his subordinates understand this as well."
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Venezuela's President Chavez: Castro's Ideological Successor<br>FROM:<br>SINIO ...
0.0

'Key Reads' Effort Expands, Scores Successes

Document

Release Date: 2018-03-01 Document Date: 2005-09-26
The “key reads” process, first developed for Central Command needs in Operation Iraqi Freedom, has been expanded to more topics and customers. Key reads respond to specific customer requests in less than three days. 
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (C//SI) 'Key Reads' Effort Expands, Scores Successes FROM: Requirements Analysis Center (S114...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh