Filtered By
NSA X
Agency [filter]
Iran (IRN/IR) X
Countries Mentioned [filter]
China (CHN/CN) X
Countries Mentioned [filter]
Results
23 Total
0.0

Coming Soon! A Tool that Enables Non-Linguists to Analyse Foreign-TV News Programs

Document

Release Date: 2015-05-05 Document Date: 2008-10-23
This October 2008 article from an NSA internal newsletter SIDToday Enhanced Video Text and Audio Processing (eViTAP), a tool that provides automatic translations of news broadcasts in English, Russian, Spanish, Arabic, Mandarin and Farsi: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015. sidtoday-non-linguists-final
(U//FOUO) Coming Soon! A Tool that Enables Non-Linguists to Analyze Foreign-TV News ______________________ Programs FROM: Center for Time-Sensitive Information (S2413) Run Date: 10/23/20...
0.0

Apportionment of Strategic Efforts -- Our Plan of Attack

Document

Release Date: 2018-03-01 Document Date: 2006-02-15
U.S. Signals Intelligence System resources are allocated in the following areas: 35 percent are dedicated to the global war on terrorism; 35 percent are dedicated to China, North Korea, Iran, and Russia; 20 percent go to remaining strategic focus areas; and 10 percent are set aside for development in data acquisition, signals development, or analysis and production.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) Apportionment of Strategic Efforts -- Our Plan of Attack FROM: SIGINT Communication...
0.0

About the Virtual Private Network SIGDev Working Group...

Document

Release Date: 2017-09-13 Document Date: 2005-05-12
A brief description of a working group focused on monitoring and helping to exploit virtual private networks, or VPNs. Established in 2004, the working group publishes regular "VPN Target Activity Reports" on dozens of countries and organizations around the world. "These reports may help you exploit targets' VPNs more successfully," the chair of the working group writes.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (TS//SI) About the Virtual Private Network SIGDev Working Group... FROM: Chair NSA VPN WG, Ad...
0.0

Using XKEYSCORE to Enable TAO

Document

Release Date: 2015-07-01 Document Date: 2009-07-16
This NSA presentation from 16 July 2009 explains how the XKeyScore system supports the agency’s Tailored Access Operations: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
using-xks-to-enable-tao-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. AUS, CAN. GBR. NZL//20291123 Ait* tuv. Using XKEYSCORE to Enable TAO Booz I AJIen l Hamilton SDS Analyst 16 July ...
0.0

Exploiting Foreign Lawful Intercept (LI) Roundtable

Document

Release Date: 2015-09-29 Document Date: 2012-01-01
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif: TOP SECRET//SI//REL TO USA, FVEY (S//SI//REL) Exploiting Foreign Lawful Intercept (LI) Roundtable S31122 TOP SECRET//SI//REL TO USA, FVEY...
0.0

NSA Intelligence Relationship with Israel

Document

Release Date: 2014-08-04 Document Date: 2013-04-19
This internal NSA information paper, dated 19 April 2013, describes a “far reaching technical and analytic relationship” with Israel’s SIGINT National Unit (ISNU): see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
TOP SECRET//SI//NOFORN National Security Agency/Central 19 April 2013 Security Service Information Paper (TS//REL TO USA, ISR) Subject: NSA Intelligence Relationship with Israel (U) I...
0.0

Venezuela's President Chavez: Castro's Ideological Successor

Document

Release Date: 2017-09-13 Document Date: 2005-03-18
The NSA's signals intelligence national intelligence officer for Latin America explains why the Bush administration has identified Venezuelan President Hugo Chávez as a threat to democracy.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Venezuela's President Chavez: Castro's Ideological Successor<br>FROM:<br>SINIO ...
0.0

Ambassador Wendy Sherman Speaks on North Korea

Document

Release Date: 2016-12-07 Document Date: 2004-05-04
Ambassador Sherman believes that North Korea will continue its nuclear program or may have already succeeded in developing weapons. SIGINT on the issue was "absolutely indispensable" and "critical for arms control and verification."
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Ambassador Wendy Sherman Speaks on North Korea<br>FROM: SIGINT Communications<b...
0.0

EP-3E Collision: Cryptologic Damage Assessment and Incident Review

Document

Release Date: 2017-04-10 Document Date: 2001-07-01
A joint US Navy and NSA report, prepared three months after a US spy plane was forced to crash land in China, assesses the degree to which surveillance secrets were compromised: see the Intercept article Burn After Reading: Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident, 10 April 2017. […]
TOP SECRET//COMINT//NOFORN//X1 EP-3E Collision: Cryptologic Damage Assessment and Incident Review Final Report Prepared by the EP-3 Cryptologic Assessment Team July 2001 Classifie...
0.0

MONKEYROCKET Achieves Initial Operational Capability

Document

Release Date: 2018-03-20 Document Date: 2012-07-24
This extract from the internal NSA newsletter SSO News dated 24 July 2012 describes the start of MONEYROCKET collection, at which point it was recording around 2000 events a day, from a user base concentrated in India and China: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 […]
(TS//SI//NF) MONKEYROCKET Achieves Initial Operational Capability By REDACTED on 2012-07-24 1442 (TS//SI//NF) Special Source Operations-OAKSTAR program MONKEYROCKET, a non- Western Internet an...
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

Final Agenda: Herr Dietmar B.

Document

Release Date: 2014-06-18 Document Date: 2013-04-29
This internal document prepares for a visit of senior officers from Germany’s BND: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
SECRËT//NOFORN Date/Time of Visit: Visitor: Title: Countr y/Organ ¡¿a tjon; Equivalency: Accompanied by: FINAL AGENDA a 2013/II 417 Protocol Rep: Visit manager: (U) 30...
0.0

Shotgiant

Document

Release Date: 2014-03-22 Document Date: 2010-01-01
Selected slides, some with speaking notes, drawn from a 2010 NSA presention, describe the aims of the agency’s operations against Chinese company Huawei: see the New York Times article N.S.A. Breached Chinese Servers Seen as Security Threat, 22 March 2014.
(U) Why We Care (TS//SI//REL TO USA, FVEY) S2 - many of our targets communicate over Huawei produced products (TS//SI//REL TO USA, FVEY) S3 - design, deployment & market expansion imp...
0.0

T3C Open House -- March 17th

Document

Release Date: 2017-09-13 Document Date: 2005-03-10
The Target Technology Trends Center will hold an open house to demonstrate 14 important technologies that impact signals intelligence.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) T3C Open House -- March 17th FROM: Target Technology Trends Center (S3TSD) Run Date: 03/...
0.0

XKEYSCORE for Counter-CNE

Document

Release Date: 2015-07-01 Document Date: 2011-03-01
This NSA presentation from March 2011 discusses the use of the XKeyScore tool for countering foreign CNE attacks: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-for-counter-cne-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, FVEY Using the XKS CNE dataset and a DISGRUNTLEDDUCK fingerprint, we now see at least 21 TAO boxes with evidence of this in...
0.0

NSA Intelligence Relationship with New Zealand

Document

Release Date: 2015-03-10 Document Date: 2013-04-01
This NSA information paper from April 2013 describes the state of the agency’s intelligence relationship with its New Zealand counterpart: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY National Security Agency April 2013 Central Security Service Information Paper (U) Subject: NSA Intelligence Relationship with New Zealand (U) Execu...
0.0

Area Studies Seminar: U.S. Foreign and Security Policy

Document

Release Date: 2017-09-13 Document Date: 2005-04-06
Africa south of the Sahara will be the focus of a seminar offered by the NSA Cryptologic School.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) Area Studies Seminar: U.S. Foreign and Security Policy FROM: SINIO Council Unknown ...
0.0

Is NSA Correctly Postured Against the Most Critical Missions?

Document

Release Date: 2017-09-13 Document Date: 2005-06-09
Signals Intelligence Directorate leadership decides where to expend the most resources based on the SIGINT Mission List. The list includes 15 critical functional missions -- each of which has an area of focus and an area in which SID decides not to devote as much attention, thus accepting some amount of risk. China, North Korea, Iraq, Iran, and Russia are "regarded as 'trump cards'" and can take priority over any one of these missions.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Is NSA Correctly Postured Against the Most Critical Missions? FROM: MG Richard Quirk, USA...
0.0

Internet Anonymity 2011

Document

Release Date: 2014-12-28
This NSA presentation from 2011 gives an overview of anonymising technologies, including Tor: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
 • NSA (S31323) TOP SECRET//COMINT REL TO USA,FVEY ÊF 1 M r- (U) Many Possible Meanings/lnterpretations (S//REL) Simply Not Using Real Name for Email (S//REL) Private Forum w...
0.0

1999 Agreement between the US and Israel

Document

Release Date: 2014-08-04 Document Date: 1999-07-15
This agreement, dated 15 July 1999, includes a preamble describing the development of signals intelligence cooperation between the US and Israel since the 1950s: see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
TOP S E C R E T/HVCCO 1. (S) preamblei in 1968 President Johnson and Prime Minister Eshkol agreed that an intelligence exchange would take place between the United States and Israel. This und...
0.0

Draft Agenda: Herr Dietmar B.

Document

Release Date: 2014-06-18 Document Date: 2013-04-22
This April 2013 agenda prepares for a visit of senior officials from the German BND. Subjects to be disussed include Special Source Operations: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
SLCRLT//NOK }R N Direct or S JG J NT Analysis and Production Gerraan Fédéral Intelligence Service 30 April-1 May 2013 30 April 2013 Time Presentation Title and Presenter 0350 (U//FOU...
0.0

Venezuela's President Chavez: Castro's Ideological Successor

Document

Release Date: 2016-12-07 Document Date: 2005-03-18
President Bush considers Venezuelan President Hugo Chavez a "threat to democracy in the region and a threat to U.S. interests in particular." But "from a SIGINT perspective, Venezuela poses a particularly difficult challenge. With Castro as his mentor, Chavez has learned the importance of communications security and has made sure that his subordinates understand this as well."
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Venezuela's President Chavez: Castro's Ideological Successor<br>FROM:<br>SINIO ...
0.0

NSAers Receive DCI Denial & Deception Awards

Document

Release Date: 2017-04-24 Document Date: 2004-10-18
The Denial and Deception Awards for 2004 are announced.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) NSAers Receive DCI Denial &amp; Deception Awards<br>FROM: MG Richard Quirk, USA...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh