Results
7 Total
0.0
Primary FORNSAT Collection Operations
Document
Release Date:
2014-06-18
This undated NSA slide provides the locations of FORNSAT sites run by the agency and its Five Eyes partners worldwide: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
.fc-L' 11K:
¿UribtA
I---.
:RET//CDMINT//REL TO USA, AUS, CAN, GBR, and NZLy/Xl
JIMKKNIPB
Yakima
TI M BE RU N E
S ugar Grove
CORALINE
Sabena
Seca,
Geraldto
S...
0.0
A Remembrance of NSA Thanksgivings Past...
Document
Release Date:
2018-03-01
Document Date:
2005-11-22
Staffers remember Thanksgiving meals they had while deployed in Kenya, Somalia, Philippines, and Germany.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(U) A Remembrance of NSA Thanksgivings Past...
FROM: SIGINT Communications
Unknown
Run Date: ...
0.0
SSO dictionary – MYSTIC
Document
Release Date:
2014-05-19
This extract is taken from an undated dictionary produced by NSA Special Source Operations, providing glosses for several terms associated with MYSTIC operations. The name of one country has been redacted: see the Intercept article Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas, 19 May 2014. Download […]
BASECOAT (TS//SI//NF) MYSTIC acess; Bahamas A-link GSM. DEA access under LI that collects Counter-Narcotic (CN) targets. There are two sites located in the Bahamas. It is currently being used as a...
0.0
Shotgiant
Document
Release Date:
2014-03-22
Document Date:
2010-01-01
Selected slides, some with speaking notes, drawn from a 2010 NSA presention, describe the aims of the agency’s operations against Chinese company Huawei: see the New York Times article N.S.A. Breached Chinese Servers Seen as Security Threat, 22 March 2014.
(U) Why We Care
(TS//SI//REL TO USA, FVEY) S2 - many of our targets
communicate over Huawei produced
products
(TS//SI//REL TO USA, FVEY) S3 - design, deployment &
market expansion imp...
0.0
What Your Mother Never Told You About SIGDEV Analysis
Document
Release Date:
2014-12-28
This undated presentation from NSA’s Network Analysis Center describes agency techniques for overcoming Virtual Private Networks (VPNs): see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
(s//si//rel) What Your
Mother Never Told
You About SIGDEV
Analysis^^^^^^^
SSG21 Net Pursuit
Network Analysis Center
Derived From: NSA/CSSM 1-52
Dated: 20070108
Declassify On: 2037040...
USJ-7S9A, DS-2Q0B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-2Q0B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-2003, DS-200E
0.0
MYSTIC fact sheet
Document
Release Date:
2014-05-19
This undated NSA Special Source Operations memo explains MYSTIC a collaboration between various US agencies that collects signals from telecoms networks by means of devices have been installed for ostenisbly “legitimate commercial services”: see the Intercept article Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas, 19 May […]
(U) General Information
MYSTIC
Year Established
Description
Intelligence Value
Major Targets
Major Benefactors
& users of Information
(U) 2009
(TS//SI//NF) MYSTIC is an SS...
0.0
I Hunt Sys Admins
Document
Release Date:
2014-03-20
Document Date:
2012-01-01
A series of casual posts written by a single author stationed in the NSA’s Signals Intelligence Directorate and posted on the agency’s intranet in 2012. Several posts written in December of that year describe the rationale and methodology of targeting systems administrators: see the Intercept article Inside the NSA’s Secret Efforts to Hunt and Hack […]
UHCLASSIFIED//FOUO
Copyright! (U) utility of "security conferences" HsFiH(hide)
2012.02.08- 09:53 am
Do not reuse
this image!
(U//F0U0) Caveat: it's been a couple years since I have a...