Filtered By
NSA X
Agency [filter]
Iran (IRN/IR) X
Countries Mentioned [filter]
Pakistan (PAK/PK) X
Countries Mentioned [filter]
Results
16 Total
0.0

What does the death of Usama bin Laden mean?

Document

Release Date: 2015-05-18 Document Date: 2011-05-17
In this 17 May 2011 article from the internal newsletter SIDToday, the NSA Signals Intelligence Directorate’s Associate Deputy Director for Counterterrorism, Jon Darby, decribes how the NSA played a “critical” role in the raid in bon Laden’s Abbottabad compound: see the Intercept article What the Snowden Files Say About the Osama Bin Laden Raid, 18 […]
DYNAMIC PAGE - HIGHES I P0SS1BLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Friday, 09 Nov 2012 • Web search • Agcncv-all Emails • SID-all Emails ...
0.0

HTTP Activity in XKEYSCORE

Document

Release Date: 2015-07-01 Document Date: 2009-03-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HTTP Activity in XKEYSCORE March 2009 Derived From: NSA/QSSM 1-52 Dated: 200701 (T Declassify On: 202911 ...
0.0

The New Breed of SIGINT Reporting

Document

Release Date: 2018-03-01 Document Date: 2005-10-25
First Instance Reporting is a new type of reporting that allows “forward-deployed” signals intelligence personnel “to push information out much earlier in the production cycle.” So far, there have been 3,300 such reports, including information about the inspection of uranium processing activities in Iran, Russian government knowledge of a terrorist plot, and others.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) The New Breed of SIGINT Reporting FROM: D/Chief, Field Operations Office, Special Collec...
0.0

SIGINT Obtains Details of Usama bin Laden Message to Top al-Qa’ida Leader in Iraq

Document

Release Date: 2015-05-18 Document Date: 2007-07-18
This 18 July 2007 article from internal NSA newsletter SIDToday describes the interception of a message from Osama bin Laden, which was not transmitted through electronic channels: see the Intercept article What the Snowden Files Say About the Osama Bin Laden Raid, 18 May 2015.
DYNAMIC PAGE - HIGHES I P0SS1BLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Friday, 09 Nov 2012 • Web search • Agcncv-all Emails • SID-all Emails ...
0.0

Exploiting Foreign Lawful Intercept (LI) Roundtable

Document

Release Date: 2015-09-29 Document Date: 2012-01-01
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif: TOP SECRET//SI//REL TO USA, FVEY (S//SI//REL) Exploiting Foreign Lawful Intercept (LI) Roundtable S31122 TOP SECRET//SI//REL TO USA, FVEY...
0.0

Meet the Central Command

Document

Release Date: 2018-03-01 Document Date: 2005-10-21
NSA personnel are integrated with U.S. Central Command at the Tampa headquarters and in deployment to Iraq, Afghanistan, Pakistan, Qatar, and other locations. Gen. John Abizaid says the NSA relationship with CENTCOM is “excellent.”
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Meet the Central Command FROM: CENTCOM Account Manager (S113) Run Date: 10/21/2005 (U) C...
0.0

Boundless Informant heat maps

Document

Release Date: 2013-06-11 Document Date: 2013-03-26
These undated heat maps show the number of pieces of communications data the NSA gathers per country in a particular 30 day period, divided into telephony (DNR) and internet (DNI) metadata. Details in the second map refer to a period in January 2013 and third to a period ending in February the same year: see […]
boundlessinformant.pdf: Page 93 BOUNDLESSINFORMANT Top 5 Countries (i»t 30 o«>» t-om «¡xu/i ■Ohm.pdf: BOUNDLESSINFORMANT im!MwamHMiM:rta.]a;ii]aaMaiM,(.yiii:am«.'.«M«iMiaiiiiiPH;i!i...
0.0

Ambassador Wendy Sherman Speaks on North Korea

Document

Release Date: 2016-12-07 Document Date: 2004-05-04
Ambassador Sherman believes that North Korea will continue its nuclear program or may have already succeeded in developing weapons. SIGINT on the issue was "absolutely indispensable" and "critical for arms control and verification."
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Ambassador Wendy Sherman Speaks on North Korea<br>FROM: SIGINT Communications<b...
0.0

EP-3E Collision: Cryptologic Damage Assessment and Incident Review

Document

Release Date: 2017-04-10 Document Date: 2001-07-01
A joint US Navy and NSA report, prepared three months after a US spy plane was forced to crash land in China, assesses the degree to which surveillance secrets were compromised: see the Intercept article Burn After Reading: Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident, 10 April 2017. […]
TOP SECRET//COMINT//NOFORN//X1 EP-3E Collision: Cryptologic Damage Assessment and Incident Review Final Report Prepared by the EP-3 Cryptologic Assessment Team July 2001 Classifie...
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

Shotgiant

Document

Release Date: 2014-03-22 Document Date: 2010-01-01
Selected slides, some with speaking notes, drawn from a 2010 NSA presention, describe the aims of the agency’s operations against Chinese company Huawei: see the New York Times article N.S.A. Breached Chinese Servers Seen as Security Threat, 22 March 2014.
(U) Why We Care (TS//SI//REL TO USA, FVEY) S2 - many of our targets communicate over Huawei produced products (TS//SI//REL TO USA, FVEY) S3 - design, deployment & market expansion imp...
0.0

HTTP Activity vs. User Activity

Document

Release Date: 2015-07-01 Document Date: 2009-06-19
This NSA presentation from 19 June 2009 explains the metadata capabilities of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL m V HTTP Activity vs User Activity 19 June 2009 Derived From: NSA/CSSM 1-52 Bated :l2007i MM TOP SEC...
0.0

NSA Intelligence Relationship with New Zealand

Document

Release Date: 2015-03-10 Document Date: 2013-04-01
This NSA information paper from April 2013 describes the state of the agency’s intelligence relationship with its New Zealand counterpart: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY National Security Agency April 2013 Central Security Service Information Paper (U) Subject: NSA Intelligence Relationship with New Zealand (U) Execu...
0.0

Full Log vs. HTTP

Document

Release Date: 2015-07-01 Document Date: 2009-06-11
This NSA presentation from 11 June 2009 explains the scope of metadata collection within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Log vs. HTTP 11 June 2009 * WHv:i DERIV TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//...
0.0

What Your Mother Never Told You About SIGDEV Analysis

Document

Release Date: 2014-12-28
This undated presentation from NSA’s Network Analysis Center describes agency techniques for overcoming Virtual Private Networks (VPNs): see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
(s//si//rel) What Your Mother Never Told You About SIGDEV Analysis^^^^^^^ SSG21 Net Pursuit Network Analysis Center Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 2037040...
0.0

Draft Agenda: Herr Dietmar B.

Document

Release Date: 2014-06-18 Document Date: 2013-04-22
This April 2013 agenda prepares for a visit of senior officials from the German BND. Subjects to be disussed include Special Source Operations: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
SLCRLT//NOK }R N Direct or S JG J NT Analysis and Production Gerraan Fédéral Intelligence Service 30 April-1 May 2013 30 April 2013 Time Presentation Title and Presenter 0350 (U//FOU...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh