DocumentRelease Date: 2014-06-18
This undated NSA slide provides the locations of FORNSAT sites run by the agency and its Five Eyes partners worldwide: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
.fc-L' 11K: ¿UribtA I---. :RET//CDMINT//REL TO USA, AUS, CAN, GBR, and NZLy/Xl JIMKKNIPB Yakima TI M BE RU N E S ugar Grove CORALINE Sabena Seca, Geraldto S...
CARBOY, CORALINE, GARLICK, IRONSAND (IS), JACKKNIFE, LADYLOVE, LEMONWOOD, MOONPENNY, SCAPEL, SNICK, SOUNDER, STELLAR, TIMBERLINE, SUGAR
Cyprus (CYP/CY), Germany (DEU/DE), Kenya (KEN/KE), New Zealand (NZL/NZ), Oman (OMN/OM), Thailand (THA/TH), United Kingdom (GBR/GB), United States (USA/US)
DocumentRelease Date: 2018-03-01 Document Date: 2005-11-22
Staffers remember Thanksgiving meals they had while deployed in Kenya, Somalia, Philippines, and Germany.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) A Remembrance of NSA Thanksgivings Past... FROM: SIGINT Communications Unknown Run Date: ...
DocumentRelease Date: 2014-05-19
This extract is taken from an undated dictionary produced by NSA Special Source Operations, providing glosses for several terms associated with MYSTIC operations. The name of one country has been redacted: see the Intercept article Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas, 19 May 2014. Download […]
BASECOAT (TS//SI//NF) MYSTIC acess; Bahamas A-link GSM. DEA access under LI that collects Counter-Narcotic (CN) targets. There are two sites located in the Bahamas. It is currently being used as a...
DocumentRelease Date: 2014-03-22 Document Date: 2010-01-01
Selected slides, some with speaking notes, drawn from a 2010 NSA presention, describe the aims of the agency’s operations against Chinese company Huawei: see the New York Times article N.S.A. Breached Chinese Servers Seen as Security Threat, 22 March 2014.
(U) Why We Care (TS//SI//REL TO USA, FVEY) S2 - many of our targets communicate over Huawei produced products (TS//SI//REL TO USA, FVEY) S3 - design, deployment & market expansion imp...
DocumentRelease Date: 2014-12-28
This undated presentation from NSA’s Network Analysis Center describes agency techniques for overcoming Virtual Private Networks (VPNs): see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
(s//si//rel) What Your Mother Never Told You About SIGDEV Analysis^^^^^^^ SSG21 Net Pursuit Network Analysis Center Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 2037040...
USJ-7S9A, DS-2Q0B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-2Q0B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-2003, DS-200E
Armenia (ARM/AM), Hong Kong (HKG/HK), Iran (IRN/IR), Kenya (KEN/KE), Korea (KOR/KR), Malaysia (MYS/MY), Pakistan (PAK/PK), Romania (ROU/RO), Somalia (SOM/SO), Turkey (TUR/TR), United States (USA/US)
DocumentRelease Date: 2014-05-19
This undated NSA Special Source Operations memo explains MYSTIC a collaboration between various US agencies that collects signals from telecoms networks by means of devices have been installed for ostenisbly “legitimate commercial services”: see the Intercept article Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas, 19 May […]
(U) General Information MYSTIC Year Established Description Intelligence Value Major Targets Major Benefactors & users of Information (U) 2009 (TS//SI//NF) MYSTIC is an SS...
DocumentRelease Date: 2014-03-20 Document Date: 2012-01-01
A series of casual posts written by a single author stationed in the NSA’s Signals Intelligence Directorate and posted on the agency’s intranet in 2012. Several posts written in December of that year describe the rationale and methodology of targeting systems administrators: see the Intercept article Inside the NSA’s Secret Efforts to Hunt and Hack […]
UHCLASSIFIED//FOUO Copyright! (U) utility of "security conferences" HsFiH(hide) 2012.02.08- 09:53 am Do not reuse this image! (U//F0U0) Caveat: it's been a couple years since I have a...