DocumentRelease Date: 2018-03-01 Document Date: 2005-11-04
The U.S. Navy worked with the NSA to find a handset traveling with a shipment of narcotics in the Arabian Sea. The French navy boarded the vessel, seizing 3.5 tons of hashish. But the handset was no longer on board; it was subsequently located on the vessel from which the drugs had been transferred, and the crew of that vessel was also taken into custody.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) All-Source Victory on the High Seas!! FROM: SIGINT Communications and LCDR Victor Spears ...
DocumentRelease Date: 2014-02-10 Document Date: 2012-03-01
Extracts from a March 2012 NSA document in which an operator describes a CIA/NSA effort to map the wi-fi “of every major town in Yemen”: see the Intercept article The NSA’s Secret Role in the U.S. Assassination Program, 10 February 2014.
DT-1.png: (S//SI//REL) Testing the New Technique on a UAV (TS//SI//REL) As part of the GILGAMESH (PREDATOR-based active geolocation) effort, this team used some advanced mathematics to develo...
DocumentRelease Date: 2014-07-25 Document Date: 2013-04-08
This NSA information paper dated 8 April 2013 details the agency’s deepening signals intelligence relationship with Saudi Arabia: see the Intercept article The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police, 25 July 2014.
TOP SECRET//SI//NOFORN National Security 8 April 2013 Agency/Central Security Service Information Paper (S//SI//REL TO USA, SAU) Subject: NSA Intelligence Relationship with Saudi Ara...
DocumentRelease Date: 2017-09-13 Document Date: 2005-05-12
A brief description of a working group focused on monitoring and helping to exploit virtual private networks, or VPNs. Established in 2004, the working group publishes regular "VPN Target Activity Reports" on dozens of countries and organizations around the world. "These reports may help you exploit targets' VPNs more successfully," the chair of the working group writes.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (TS//SI) About the Virtual Private Network SIGDev Working Group... FROM: Chair NSA VPN WG, Ad...
Bahrain (BHR/BH), China (CHN/CN), Egypt (EGY/EG), France (FRA/FR), Germany (DEU/DE), India (IND/IN), Iran (IRN/IR), Iraq (IRQ/IQ), Israel (ISR/IL), Italy (ITA/IT), Jordan (JOR/JO), Korea (KOR/KR), Kuwait (KWT/KW), Lebanon (LBN/LB), Oman (OMN/OM), Qatar (QAT/QA), Russia (RUS/RU), Saudi Arabia (SAU/SA), Turkey (TUR/TR), United States (USA/US), Yemen (YEM/YE)
DocumentRelease Date: 2017-09-13 Document Date: 2005-06-16
Five individuals received awards from the Crypto-Linguistic Association for supporting Operation Iraqi Freedom, the Sudanese peace talks, investigations into the Khobar Towers bombing in Saudi Arabia, and the CLA itself.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Top Linguists Take Home CLA Awards FROM: Crypto-Linguistic Association Run Date: 06/16/2...
DocumentRelease Date: 2017-09-13 Document Date: 2005-03-01
Ethiopia, a Third Party partner since February 2002, is "ideally located" in the Horn of Africa for unique access to targets. In 2005 the Deployed SIGINT Operation Center aka "Lion's Pride" in Addis Ababa has grown to 103 Ethiopians and eight U.S. military personnel.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) LION'S PRIDE - Fighting Terrorism on the Horn of Africa FROM: Captain Katie Pierce, USA O...
DocumentRelease Date: 2015-09-29 Document Date: 2012-01-01
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif: TOP SECRET//SI//REL TO USA, FVEY (S//SI//REL) Exploiting Foreign Lawful Intercept (LI) Roundtable S31122 TOP SECRET//SI//REL TO USA, FVEY...
DocumentRelease Date: 2016-06-28
This undated 81-page NSA presentation and accompanying handdrawn diagram, both produced by the author of ‘I hunt sys admins’ explains how a country’s entire network traffic could be fed into agency systems: see the Intercept article The Hunter, 28 June 2016.
Network-Shaping-101.pdf: TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 Network Shaping 101 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 TOP SECRET...
DocumentRelease Date: 2018-01-19 Document Date: 2010-06-02
This February 2010 post from the internal NSA newsletter SIDToday draws attention to voice-masking technology used by subjects of surveillance to frustrate the agency’s voice-recognition efforts: see the Intercept article Finding Your Voice, 19 January 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI//REL) Alvin, Simon, and... Al Qaeda? Finding Modified Voice in SIGINT Traffic F...
DocumentRelease Date: 2013-12-02
Three redacted slides from an NSA presentation name several states as subjects of ongoing interest: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
slide1.jpg: slide2.jpg: TOP SECRET//SI//REL TO USA, FVEY U//JEQUOslide3.jpg: rTO USA, FYEY Geopolitical Trends: Global Drivers (S//REL) Geopolitical Trend driver»: • St re**orc to...
DocumentRelease Date: 2015-07-01 Document Date: 2009-04-01
This NSA presentation from April 2009 explains how analysts can make use of document metadata available through XKeyScore, together with worked examples and screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Finding and Querying on Document Metadata tooz|/ 1 Booz|Allen| Hamilton Sigint Development Support / SIGINT Technica...