This 21 May 2009 presentation from the NSA’s Center for Content Extraction includes a slide that shows that the communications of 122 heads of government were stored in the agency’s central “Target Knowledge Base”, 11 of whom are named. The collection for most of these targets was automated: see the Der Spiegel article ‘A’ for […]
Human Language technology Center for Content Extraction Content Extraction Analytics SIGDEV End-to-End Demo 21 May 2009 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassily On:...
CYBERTRANS, GOLDENRETRIEVER, HERESYITCH, JOURNEYMAN, LEXHOUND, MARINA, NYMROD, PAINTBALL, SOCIOPATH, SYNAPSE, THUNDERCLOUD
DocumentRelease Date: 2017-09-13 Document Date: 2005-03-01
Ethiopia, a Third Party partner since February 2002, is "ideally located" in the Horn of Africa for unique access to targets. In 2005 the Deployed SIGINT Operation Center aka "Lion's Pride" in Addis Ababa has grown to 103 Ethiopians and eight U.S. military personnel.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) LION'S PRIDE - Fighting Terrorism on the Horn of Africa FROM: Captain Katie Pierce, USA O...
DocumentRelease Date: 2016-06-28
This undated 81-page NSA presentation and accompanying handdrawn diagram, both produced by the author of ‘I hunt sys admins’ explains how a country’s entire network traffic could be fed into agency systems: see the Intercept article The Hunter, 28 June 2016.
Network-Shaping-101.pdf: TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 Network Shaping 101 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 TOP SECRET...
DocumentRelease Date: 2015-07-01 Document Date: 2010-11-22
This 67-page NSA presentation from November 2010 explains how to create the “Fingerprints” which enable analysts to trace individuals within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
writing-xks-fingerprints-p1-normal.gif: Writing XKS Fingerprints November 2010 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZLwriting-xks-fingerprints-p2-normal.gif: Agenda • Naming...
DocumentRelease Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
AGILITY, BLEAKINQUIRY, CADENCE, CORALREEF, FOURSCORE, MAILORDER, PINWALE, SCISSORS, TOYGRIPPE, TURTLEPOWER, XKEYSCORE (XKS)
Afghanistan (AFG/AF), China (CHN/CN), India (IND/IN), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Japan (JPN/JP), North Korea (PRK/KP), Korea (KOR/KR), Mexico (MEX/MX), Nigeria (NGA/NG), Pakistan (PAK/PK), Russia (RUS/RU), Saudi Arabia (SAU/SA), Somalia (SOM/SO), Turkey (TUR/TR), United States (USA/US)
DocumentRelease Date: 2018-03-01 Document Date: 2005-11-22
Staffers remember Thanksgiving meals they had while deployed in Kenya, Somalia, Philippines, and Germany.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) A Remembrance of NSA Thanksgivings Past... FROM: SIGINT Communications Unknown Run Date: ...
DocumentRelease Date: 2017-11-30 Document Date: 2010-03-11
In this 11 March 2000 article from the NSA’s internal newsletter SIDToday, an agency employee celebrates “a watershed period in the fight against terrorism and radical extremist groups,” noting that NSA discovered Zazi’s email connections to Al Qaeda operatives in Pakistan had ultimately resulted in a criminal conviction: see the Intercept article NSA Secretly Helped […]
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL • Web search • Agency-all Emails • SID-all Emails • NSA Rolodex • SCQAWK: The ...
DocumentRelease Date: 2014-03-05
Two images from an NSA presentation describe Dutch-US cooperation in an international mission against Somali pirates in which signals intelligence was used to map contacts and support a naval mission. Identifying and technical details have been redacted: see the NRC Handelsblad article The secret role of the Dutch in the American war on terror, 5 […]
Sheet1.jpg: SECRET//SI//REL TO USA, N LD Mission Management Success Stories (S//SI//RELTO USA, NLP) Collection of Somali) operation to board a Pakistani vessel hijacked by Somali pirat...
DocumentRelease Date: 2013-12-02
Three redacted slides from an NSA presentation name several states as subjects of ongoing interest: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
slide1.jpg: slide2.jpg: TOP SECRET//SI//REL TO USA, FVEY U//JEQUOslide3.jpg: rTO USA, FYEY Geopolitical Trends: Global Drivers (S//REL) Geopolitical Trend driver»: • St re**orc to...
DocumentRelease Date: 2014-06-18 Document Date: 2007-12-13
This internal NSA post, dated 13 December 2007, discussed the US-German Joint Sigint Activity mission’s operations against African targets: see the Der Spiegel article rrorverdächtige: NSA nutzte Erkenntnisse aus Deutschland-Filiale für Tötungen, 15June 2014. africa
(S//SI//REL) US, German SIGINTers Increase Cooperation on African _________________________ Targets FROM: (S//SI//REL)^^^^^^^ SIGDEV Analyst, Joi^^^^^^^^S/ity (H52G1) Run Date; 12/13/200...
DocumentRelease Date: 2016-08-10 Document Date: 2003-09-08
Linguists who are not fully cleared are housed in a separate facility. Part 1 explains the history of security procedures for native speakers.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Rodehouse: SID's Offsite Language Processing Center<br>(Part I)<br>FROM:<b...
DocumentRelease Date: 2015-08-11 Document Date: 2012-01-11
This 11 January 2012 article from the internal NSA newsletter SIDToday gives a first person account of how a Korean-language analyst went about learning Tigrinya, one of the languages spoken in Eritrea: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 • Web search • Agency-all Emails • SID-all Emai...
Capability Provided to Dutch Assists in Capture of Somali Pirates and Mapping of Piracy-Related Network
DocumentRelease Date: 2014-03-05 Document Date: 2013-01-25
This extract from an NSA briefing document dated 25 January 2013 – framed as an example of how to write up such reports from the agency’s Foreign Affairs Division (FAD) – describes how The Netherlands’ MIVD sought to cover a gap in the NSA’s signals intelligence capability: see the NRC Handelsblad article The secret role […]
TOP SECRET//SI//NOFORN FAD Success Stories Sample Each FAD success story should have the 4 sections: Title, Problem, Solution, and Impact. See below for sample. (U) Title: (TS 'SI//NF)...
DocumentRelease Date: 2014-12-28
This undated presentation from NSA’s Network Analysis Center describes agency techniques for overcoming Virtual Private Networks (VPNs): see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
(s//si//rel) What Your Mother Never Told You About SIGDEV Analysis^^^^^^^ SSG21 Net Pursuit Network Analysis Center Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 2037040...
USJ-7S9A, DS-2Q0B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-2Q0B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-2003, DS-200E
Armenia (ARM/AM), Hong Kong (HKG/HK), Iran (IRN/IR), Kenya (KEN/KE), Korea (KOR/KR), Malaysia (MYS/MY), Pakistan (PAK/PK), Romania (ROU/RO), Somalia (SOM/SO), Turkey (TUR/TR), United States (USA/US)