DocumentRelease Date: 2016-08-19
This undated presentation from the NSA’s Expeditionary Access Operations discusses how malware techniques are used in the field: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
EXPEDITIONARY ACCESS OPERATIONS NSA’s Close Access Network Exploitation Program Expeditionary Access Operations (S//SI//REL) S3283 is the expeditionary arm of TAO which conducts worldwide...
DocumentRelease Date: 2018-03-01 Document Date: 2005-08-29
Assessment Reports bundle all available signals intelligence alongside an analyst’s interpretation of these intercepts as evidence. A report produced by the NSA’s Libya team in 2002 zeroed in on a Libyan intelligence officer, Mohamed Ismail. Years later, the report proved crucial when he was implicated in a plot to assassinate the Saudi crown prince, which in turn led to the conviction of an American co-conspirator, Abdurahman al-Amoudi.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) 'Leadership and Intelligence' SIGINT Assessments - A Breakthrough Waiting to Happen FROM:...
DocumentRelease Date: 2016-12-07 Document Date: 2010-05-18
This 18 May 2010 article from the NSA internal newsletter SIDToday outlines how the agency is reacting to the growth of mobile phone services on board commercial aircraft: see the Intercept article American and British Spy Agencies Targeted In-flight Mobile Phone Use, 7 December 2016.
TOP SECRET//COMINT//RELTO USA, FVEY \\ (U//FOUO) In-Flight GSM S32423/S3T1 The overall classification of this briefing is TOP SECRET//COMTNT//REI, TOP SECRET//COMINT//REL TO USA, FVE...
France (FRA/FR), Germany (DEU/DE), Jordan (JOR/JO), Kuwait (KWT/KW), Libya (LBY/LY), Malaysia (MYS/MY), Pakistan (PAK/PK), Portugal (PRT/PT), Saudi Arabia (SAU/SA), United States (USA/US)
DocumentRelease Date: 2014-06-18 Document Date: 2006-09-11
This internal NSA post from September 2006 describes the evolution of the European Security Operations Center and the focus of the US-German collaboration in signals intelligence: see the Der Spiegel article Terrorverdächtige: NSA nutzte Erkenntnisse aus Deutschland-Filiale für Tötungen, 15 June 2014.
(U//FOUOKTh^European. Security Center to Become the 'ESOC' FROM: A&P‘s Director, Enterprise Management (S2) Run Date: 09/11/2006 (S//SI) NSA to help build up capabilities of the intell...
DocumentRelease Date: 2014-12-04 Document Date: 2012-06-06
This 26-page NSA document, originally presented at 2012’s Five Eyes SIGDEV conference, gives a detailed overview of the agency’s information gathering on world mobile phone networks. Some intercepted technical and contact details have been redacted: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//SI//REL TO FVEY (U//FOUO) AURORAGOLD Working Group (S//SI//REL) Shaping understanding of the global GSm/uMTS/LTE landscape SIGDEV Conference - 6 June 2012 This briefing is cl...
DocumentRelease Date: 2018-03-01 Document Date: 2005-08-09
A plot by Libyan dictator Moammar Gadhafi to assassinate the Saudi Crown Prince was revealed by an alleged terrorist during interrogation and corroborated using signals intelligence.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) The Saudi Assassination Plot -- How It Was Thwarted FROM: Deputy Chief, Customer Account ...
DocumentRelease Date: 2017-11-30 Document Date: 2005-08-09
In this 2005 article from the internal NSA newsletter SIDToday, an NSA employee credits the agency with securing the conviction of Abdurahman Alamoudi in the Eastern District of Virgina: see the Intercept article NSA Secretly Helped Convict Defendants in U.S. Courts, 30 November 2017.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) The Saudi Assassination Plot -- How It Was Thwarted FROM :| DeputyChiefTCustomer...
DocumentRelease Date: 2014-08-04 Document Date: 1999-07-15
This agreement, dated 15 July 1999, includes a preamble describing the development of signals intelligence cooperation between the US and Israel since the 1950s: see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
TOP S E C R E T/HVCCO 1. (S) preamblei in 1968 President Johnson and Prime Minister Eshkol agreed that an intelligence exchange would take place between the United States and Israel. This und...
Albania (ALB/AL), Armenia (ARM/AM), Azerbaijan (AZE/AZ), Belarus (BLR/BY), Bulgaria (BGR/BG), China (CHN/CN), Georgia (GEO/GE), Iran (IRN/IR), Iraq (IRQ/IQ), Israel (ISR/IL), Kazakhstan (KAZ/KZ), North Korea (PRK/KP), Korea (KOR/KR), Kyrgyzstan (KGZ/KG), Lebanon (LBN/LB), Libya (LBY/LY), Romania (ROU/RO), Russia (RUS/RU), Slovakia (SVK/SK), Tajikistan (TJK/TJ), Turkmenistan (TKM/TM), Ukraine (UKR/UA), United States (USA/US), Uzbekistan (UZB/UZ), Vietnam (VNM/VN)
DocumentRelease Date: 2014-06-18
This undated presentation from the NSA’s European Cryptologic Center explains some of the activities of the agency’s main European base: see the Der Spiegel article Terrorverdächtige: NSA nutzte Erkenntnisse aus Deutschland-Filiale für Tötungen, 15 June 2014.
(Uj Running btrategic Analytics Affecting Europe and Africa The overall classification of this briefing is: TOP SECRET//COM INT//REL USA, FVEYS//2D291 Region: Europe, Middle East (Isra...