Filtered By
NSA X
Agency [filter]
China (CHN/CN) X
Countries Mentioned [filter]
Top Secret X
Classification [filter]
Results
30 Total
0.0

DEFIANTWARRIOR and the NSA’s Use of Bots

Document

Release Date: 2015-01-17 Document Date: 2010-05-24
This 24 May 2010 NSA presentation describes the ways the agency uses botnets (“bot herding”): see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL USA, FVEY DEFIANTWARRIO R 7 / //and the ; NSA's Uè^ojÆotá/ Overall Classification: TOP SECRET//COMINT//REL FVEY Current As Of: 24 May 2010 Derived From: NSA/CSS...
0.0

BYZANTINE HADES: An Evolution of Collection

Document

Release Date: 2015-01-17 Document Date: 2010-06-01
This June 2010 NSA presentation for the SIGDEV conference describes efforts to trace a suspected Chinese cyber attack: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (S//REL)BYZANTINE HADES: An Evolution of Collection NTOC, V225 SIGINT Development Conference June 2010 TOP SECRET//COMINT//REL TO...
0.0

GCSB has identified an MFA data link

Document

Release Date: 2015-04-19 Document Date: 2013-04-01
This short extract from an April 2013 NSA document describes a “verbal agreement” between GCSB and NSA to proceed with the FROSTBITE / BASILHAYDEN project to infiltrate a Chinese diplomatic data link: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
(TS//SI//NF) New Zealand: GCSB has identified an MFA data link between the Chinese Consulate and Chinese Visa Office in Auckland. NSA and GCSB have verbally agreed to move forward with a coopera...
0.0

SUSLOW monthly report for March 2013

Document

Release Date: 2015-04-19 Document Date: 2013-03-01
This monthly report from the NSA’s Special US Liaison Officer in Wellington outlines progress on FROSTBITE (BASILHAYDEN) – a project to infiltrate the Chinese diplomatic computer network: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
| TOP SECRET//SI//REL TO USA, FVEY (U//FOUO) SUSLOW Monthly Report for March 2013 (U) March highlights: (U) Intelligence update: o (S//SI//REL TO USA, FVEY) GCSB project FROSTBITE / TA...
0.0

Classification Guide for SIGINT Material Dating from 16 August 1945 – 31 December 1967

Document

Release Date: 2014-06-18 Document Date: 2011-11-21
This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
TOP SECRET//SjyTK//NOFÜRN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR SIGINT Material Dating from 16 August 1945 *31 December 1967 Effects Dale: 21 De...
0.0

CNO Core Secrets

Document

Release Date: 2014-10-10
This undated selection of seven NSA slides highlights the activities the agency regards as its “core secrets”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN NSA/CSS and JFCC-NW National Initiative Task - Security Framework SAP Authority NSA/CSS/JFCC-NW SAPS DNI CNE DoD CND CNA wm Information Released to...
0.0

DIA - Swimming Upstream in the SIGINT System

Document

Release Date: 2016-08-10 Document Date: 2003-11-06
NSA collects “medical SIGINT” from the communications of NGOs and treaty-monitoring organizations and is collaborating with the DIA’s Armed Forces Medical Intelligence Center at the Army’s bioweapons research facility at Fort Detrick for expertise in epidemiology.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) DIA - Swimming Upstream in the SIGINT System<br>FROM:<br>Account Manager f...
0.0

A Visit to the USUN

Document

Release Date: 2016-12-07 Document Date: 2004-01-09
Staffers from the China Foreign Affairs Branch visited the NSA representatives at the United Nations. They were told the U.N. is a "tactical SIGINT environment." Reporting from SIGINT to U.N. changed history on Iraq War resolution.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) A Visit to the USUN<br>FROM:<br>and <br>China Foreign Affairs Branch (S2B34...
0.0

Case Studies of Integrated Cyber Operation Techniques

Document

Release Date: 2014-03-12
This undated NSA SIGINT presentation describes nine varieties of QUANTUM malware attack, their operational status and success in the field: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL USA, FVEY Case Studies of Integrated Cyber Operation Techniques NSA/CSS Threat Operations Center VS TOP SECRET//COMINT//REL USA, FVEY (U//FOUO) TUiT0t.EÄ,©i...
0.0

Computer Network Exploitation (CNE) Classification Guide / 2-59

Document

Release Date: 2014-10-10 Document Date: 2010-03-01
This 2010 NSA classication guide outlines the sensitivity of aspects of the agency’s hacking activities: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2010.
TOP SECRET//SI//REL TO USA, FVEY (U) CLASSIFICATION GUIDE TITLE/NUMBER: Computer Network Exploitation (CNE) Classification Guide / 2-59 (U) PUBLICATION DATE: 1 March 2010 (U) OFFICE OF O...
0.0

Sentry Eagle National Initiative – Security Framework

Document

Release Date: 2014-10-10
This group of three undated NSA slides provides a graphical representation of the sensitivity of aspects of the agency’s SENTRY EAGLE programme: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN SENTRY EAGLE National Initiative - Security Framework DERIVED FROM: NSA/CSS Manual 1-52. Dated: 20041123. Declassify On: 20291123 TOP SECRET//COMINT//NOFORN ...
0.0

NSA Intelligence Relationship with Israel

Document

Release Date: 2014-08-04 Document Date: 2013-04-19
This internal NSA information paper, dated 19 April 2013, describes a “far reaching technical and analytic relationship” with Israel’s SIGINT National Unit (ISNU): see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
TOP SECRET//SI//NOFORN National Security Agency/Central 19 April 2013 Security Service Information Paper (TS//REL TO USA, ISR) Subject: NSA Intelligence Relationship with Israel (U) I...
0.0

EP-3E Collision: Cryptologic Damage Assessment and Incident Review

Document

Release Date: 2017-04-10 Document Date: 2001-07-01
A joint US Navy and NSA report, prepared three months after a US spy plane was forced to crash land in China, assesses the degree to which surveillance secrets were compromised: see the Intercept article Burn After Reading: Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident, 10 April 2017. […]
TOP SECRET//COMINT//NOFORN//X1 EP-3E Collision: Cryptologic Damage Assessment and Incident Review Final Report Prepared by the EP-3 Cryptologic Assessment Team July 2001 Classifie...
0.0

An Easy Way to Win: Using SIGINT to Learn about New Viruses (Project Camberdada)

Document

Release Date: 2015-06-22 Document Date: 2010-01-01
This 2010 NSA presentation describes Project Camberdada, an attempt to subvert popular antivirus software by means of surveilling email traffic: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL An Eas Using S about P fwmuuuu IGINT to Learn iew Viruses Project CAMBERDADA ByHH, 1412 (IAD) V252|| Derived From: NSA/CSSM...
0.0

MONKEYROCKET Achieves Initial Operational Capability

Document

Release Date: 2018-03-20 Document Date: 2012-07-24
This extract from the internal NSA newsletter SSO News dated 24 July 2012 describes the start of MONEYROCKET collection, at which point it was recording around 2000 events a day, from a user base concentrated in India and China: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 […]
(TS//SI//NF) MONKEYROCKET Achieves Initial Operational Capability By REDACTED on 2012-07-24 1442 (TS//SI//NF) Special Source Operations-OAKSTAR program MONKEYROCKET, a non- Western Internet an...
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

National Information Assurance Research Laboratory (NIARL) Newsletter – September 2008

Document

Release Date: 2014-12-28 Document Date: 2008-09-01
This September 2008 newsletter from the National Information Assurance Research Laboratory (NIARL), an unit within the NSA’s Research Directorate gives an indication of the agency’s progress with cryptanalysis – which, with “only a handful of in-house techniques” – appears to be modest: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet […]
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 September 2008 Edition ■ (U) Message from the NIARL Director: (U//FOUO) Welcome to the September 2008 edition of the National ...
0.0

Final Agenda SWEDUSA

Document

Release Date: 2013-12-11 Document Date: 2013-04-23
The agenda for the SWEDUSA 2013 Strategic Planning Conference on 24-26 April 2013, showing extensive discussion between the NSA and FRA at the most senior level: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
TOP SECRET//SI//NOFORN As of: 23 April//1000 Protocol Rep: Visit manager: Date/Time of Visit: (U) 24-26 April 2013 24 April 2013//0745-1600; 25 April 2013//0845-1545; 26 April...
0.0

CANYONDUST Goes Global

Document

Release Date: 2016-08-10 Document Date: 2003-09-25
A “ground-based INMARSAT geolocation capability” originally deployed for Western Hemisphere narcotics targets will be expanded globally.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) CANYONDUST Goes Global<br>FROM: SIGINT Communications<br>Unknown<br>Run Da...
0.0

NSA Intelligence Relationship with New Zealand

Document

Release Date: 2015-03-10 Document Date: 2013-04-01
This NSA information paper from April 2013 describes the state of the agency’s intelligence relationship with its New Zealand counterpart: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY National Security Agency April 2013 Central Security Service Information Paper (U) Subject: NSA Intelligence Relationship with New Zealand (U) Execu...
0.0

Content Extraction Enhancements for Target Analytics

Document

Release Date: 2014-01-16 Document Date: 2011-06-09
This NSA presentation from 9 June 2011 shows the scale of the agency’s collection of SMS messages (codenamed Dishfire) and describes the operation of the Prefer analysis tool: see the Guardian article, NSA collects millions of text messages daily in ‘untargeted’ global sweep, 16 January 2014.
TOP SECRET//COMINT//REL TO USA, FVEY//20320108 Content Extraction Enhancements For Target Analytics: SMS Text Messages: A Goldmine to Exploit 9 June, 2011 Presenters: With Wor...
0.0

Classification guide for ECI Whipgenie

Document

Release Date: 2014-10-10 Document Date: 2004-05-21
This NSA classification guide from 2004 outlines the sensitivity of various aspects of the agency’s WHIPGENIE relationships with US corporate partners: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U//FOUO) CLASSIFICATION GUIDE FOR ECI WfflPGENIE 02-05 Effective Date: 2...
0.0

National Initiative Protection Program – Sentry Eagle

Document

Release Date: 2014-10-10 Document Date: 2004-11-23
This document, produced by the NSA and the US military’s Joint Functional Component Command – Network Wardare, provides a briefing on, and classification guide to, the highly sensitive group of “core computer network operations secrets” codenamed SENTRY EAGLE: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN//20310524 DRAFT (S) National Security Agency/Central Security' Service (NSA/CSS) and U.S. Strategic Command Joint Functional Component Command - Net...
0.0

Visit Precis: SWEDUSA

Document

Release Date: 2013-12-11
This briefing document, produced ahead of the SWEDUSA Strategic Planning Conference of 24-26 April, outlines General Keith Alexander’s talking points for the event: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
TOP SECRET//COMINT//NOFORN VISIT PRÉCIS SWEDUSA 2013 STRATEGIC PLANNING CONFERENCE (SPC) MR. INGVAR ÀKESSON DIRECTOR GENERAL FORSVARETS RADIOANSTALT (FRA) SWEDEN 24-26 APRIL 2013 ...
0.0

Passing on Target Expertise... IT Support... Averting an Assassination -- An Interview with REDACTED

Document

Release Date: 2017-04-24 Document Date: 2004-12-13
The chief of intelligence security issues describes an exciting career, which began with averting an assassination attempt against a congressional delegation by narco-insurgents in Asia. In the chief's opinion, the NSA needs better IT tools and functionalities, from web access to better PCs.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Passing on Target Expertise... IT Support... Averting an<br>Assassination -- An...
0.0

In-Flight GSM

Document

Release Date: 2016-12-07 Document Date: 2009-01-01
This 2009 NSA presentation, based on an internal agency newsletter article from 20 March that year, describes the growth in airlines offering onboard mobile phone services, which the Agency had alreadyu been actively collecting for at least a year: see the Intercept article American and British Spy Agencies Targeted In-flight Mobile Phone Use, 7 December […]
TOP SECRET//COMINT//RELTO USA, FVEY \\ (U//FOUO) In-Flight GSM S32423/S3T1 The overall classification of this briefing is TOP SECRET//COMTNT//REI, TOP SECRET//COMINT//REL TO USA, FVE...
0.0

FOXACID SOP for Operational Management of FOXACID Infrastructure

Document

Release Date: 2016-08-19
This draft NSA report on using the agency’s FOXACID system confirms that malware code released by the ShadowBrokers did, in fact, originate from the NS see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL D R A F T NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND FOXACID SOP FOR OPERATIONAL MANAGEMENT...
0.0

Classification guide for ECI Pawleys (PAW)

Document

Release Date: 2014-10-10 Document Date: 2006-11-14
This 2006 NSA classification guide outlines the sensitivity of the agency’s clandestine human and electronic access to systems in order to “obtain cryptographic information and material”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE 0^ftUJDt54 SD7 AôEWf b<Kf' DTBb3LP HDEYI D0<XS«X 0*YR Jfi! (55^ BUH 5654 ...
0.0

Exceptionally Controlled Information (ECI) as of 12 September 2003

Document

Release Date: 2014-10-10 Document Date: 2003-09-12
This document outlines the NSA activities designated as “exceptionally controlled information”, which are only made known to a small number of US officials: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//ORCON//NOFORN//X1 NATIONAL SECURITY AGENCY/CENTRAL SERCURITY SERVICE EXCEPTIONALLY CONTROLLED INFORMATION (ECI) AS OF 12 SEPTEMBER 2003 CLASSIFIED BYNSA/CSS MANUAL 12...
0.0

1999 Agreement between the US and Israel

Document

Release Date: 2014-08-04 Document Date: 1999-07-15
This agreement, dated 15 July 1999, includes a preamble describing the development of signals intelligence cooperation between the US and Israel since the 1950s: see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
TOP S E C R E T/HVCCO 1. (S) preamblei in 1968 President Johnson and Prime Minister Eshkol agreed that an intelligence exchange would take place between the United States and Israel. This und...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh