Filtered By
NSA X
Agency [filter]
Results
1985 Total
0.0

Computer-Network Exploitation Successes South of the Border

Document

Release Date: 2013-10-20 Document Date: 2010-11-15
This extract from a 15 November 2010 NSA memo reveals that the agency has been able to access Mexican President Felipe Calderon’s email account: see the Der Spiegel article NSA Accessed Mexican President’s Email, 20 October 2013.
(TS//SI//REL) Computer-Network Exploitation Successes South of the Border I FROM: .* BA. Chief, NSA-Texas TAO/Requiremcnts & Targeting (FTS327) Run Date: 11/15/2010 rS//SI//REL) TAO-en...
0.0

Roger Dingledine at NSA NOV 2007

Document

Release Date: 2013-10-04 Document Date: 2007-11-01
This NSA memo summarises a talk given by Roger Dingledine of the Tor Project on 1 November 2007: see the Secret NSA documents show campaign against Tor encrypted network, 4 October 2013.
TOP SECRET // COMINT // REL TO USA, AUS, CAN, GBR, NZL Roger Dingledine at NSA NOV 2007 From PE Contents * 1 (U) Talk by Roger Dingledine at NSA, 11/01/2007 at R&E (Sponsored by NSA RT) o 1...
0.0

New Contact-Chaining Procedures to Allow Better, Faster Analysis

Document

Release Date: 2013-09-28 Document Date: 2011-01-03
This NSA memo, dated 3 January 2011, draws analysts’ attention to a rule change, allowing “contact chaining, and other analysis, from and through any selector, irrespective of nationality and location, in order to follow or discover valid foreign intelligence targets”: see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, […]
(S//SI//REL) New Contact-Chaining Procedures to Allow Better, Faster Analysis FROM: Run Date: 01/03/2011 (U//FOUO) Editor’s note: A briefing will be held on 7 January from 1000-1130 in ...
0.0

The Alice Springs Resolution

Document

Release Date: 2018-03-01 Document Date: 2004-06-25
This NSA document contains the short text of the Alice Springs Resolution, a 2014 agreement designed to allow common metadata sharing between the Five Eyes intelligence alliance: see the Intercept article How London’s 7/7 Bombings Led to “Unprecedented” Surveillance Tactics, 1 March 2018.
The Alice Springs Resolution In view of the increasing importance of the analysis of metadata to the genera tion of into! licence, particularly against I he Icrnorift target, Elic SIC; IN I Age...
0.0

SIGINT Seniors Making History – in a Good Way

Document

Release Date: 2018-03-01 Document Date: 2005-08-02
This 2005 article from the internal NSA newsletter SIDToday describes the conclusions of a meeting of the SIGINT Seniors group – the participants committed the 12 nations to deploy a tactical communications system in Afghanistan and build on the successful partnership during the Athens Olympics Games in advance of the 2006 Winter Olympics in Italy […]
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) SIGINT Seniors Making History - in a Good Way FROM: FAD's MultiNational/Second P...
0.0

Global Collaboration Environment (GCE)

Document

Release Date: 2018-03-01 Document Date: 2013-04-10
This set of NSA talking points, dated 10 April 2013, outlines a plan for continuing the GCE intelligence-sharing arrangement beyond the Afghan war, which NSA and GCHQ would collaborate on closely: see the Intercept article The Powerful Global Spy Alliance You Never Knew Existed, 1 March 2018.
SECRET//SI//REL TO USA, GBR (U) Topic: Global Collaboration Environment (GCE) (U//FOUO) Director's Talking Points: • (S//REL TO USA, GBR) Thank GCHQ for giving full support to GCE, and for...
0.0

SIGINT Partnership Agrees to Greater Sharing

Document

Release Date: 2018-03-01 Document Date: 2010-08-12
This 12 August 2010 post from the NSA’s internal newsletter SIDToday describes the outcomes of the annual Sigint Seniors Europe (SSEURP) conference, which agreed in principle to increase information sharing: see the Intercept article The Powerful Global Spy Alliance You Never Knew Existed, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI//REL) SIGINT Partnership Agrees to Greater Sharing on Afghanistan, CT, Piracy, and ...
0.0

GSM Temporary Selectors – Breakthroughs in Automated Identification

Document

Release Date: 2018-03-01 Document Date: 2005-07-27
This 2005 post from the NSA’s internal newsletter SIDToday explains how the agency overcame the obfuscation of IMSI codes by mobile phone companies: see the Intercept article NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (TS//SI) GSM Temporary Selectors - Breakthroughs in Automated Identification Target An...
0.0

Can ‘Motor City’ Manufacture Some Arabic Language Assistance for NSA?

Document

Release Date: 2018-03-01 Document Date: 2005-12-15
This December 2005 post from the NSA’s internal newsletter SIDToday describes the agency’s efforts to recruit Arabic-language specialists; a Detroit-based recruitment effort “unearthed significant issues”: see the Intercept article NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI) Can 'Motor City' Manufacture Some Arabic Language Assistance for NSA? FROM: Ci...
0.0

Now You’re Speaking My Language: NSA’s Linguistic Resources (Part I)

Document

Release Date: 2018-03-01 Document Date: 2004-06-29
This post from the NSA’s internal newsletter SIDToday introduces a series on the agency’s struggle to find qualified language experts: see the Intercept article NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Now You're Speaking My Language: NSA's Linguistic Resources (Part I) FROM: SIGINT ...
0.0

OAKSTAR Travel Handbook: A Guide for Traveling

Document

Release Date: 2018-03-20 Document Date: 2013-03-01
This internal document for NSA employees dated 1 March 2013 provides a guide for visiting facilities related with the OAKSTAR programme,which are largely based in the United States, save for the MONKEYROCKET source, which has information forwarded to the European Technical Center in Germany: see the Intercept article The NSA Worked To “track Down” Bitcoin […]
TOP SECRET//COMINT//NOFORN (U) OAKSTAR Travel Handbook: A Guide for Traveling Initials Revision 20060925 Initial draft template 20061124 Initial draft for site 20061130 ...
0.0

OAKSTAR Weekly Update – 5 April 2013

Document

Release Date: 2018-03-20 Document Date: 2012-04-01
This internal NSA technical update from March 2013 provides metrics about the information from the access point codenamed MONEYROCKET, which was the NSA’s source for tracking Bitcoin users: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
TOP SECRET//COMINT//NOFORN OAKSTAR Weekly Update Program Highlights Week of: March 30-April 5, 2013 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 TOP SECRET//CO...
0.0

OAKSTAR Weekly Update – 15 March 2013

Document

Release Date: 2018-03-20 Document Date: 2013-03-01
This internal NSA technical newsletter states that the source of information codenamed MONEYROCKET is collecting information on “senders and receivers of bitcoin” and users Liberty Reserve: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
TOP SECRET//COMINT//NOFORN OAKSTAR Weekly Update Program Highlights Week of: March 9-15, 2013 ETS: Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 TOP SECRET//C...
0.0

The International Security Issues Build-Out

Document

Release Date: 2017-04-24 Document Date: 2006-05-17
This section of a 17 May 2006 article from an internal NSA newsletter makes it clear that Japanese foreign policy and trade activities are surveillance targets for the agency: see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017.
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI TK 7 REL TO USA AUS CAN GBR NZL (C) The International Seemin’ Issues Build-Out Global Capabilities Manager. ISI (S2C) Ru...
0.0

Advanced HTTP Activity Analysis

Document

Release Date: 2015-07-01 Document Date: 2009-01-01
This 114-page NSA training presentation from 2009 explains how agency analysts can exploit HTTP traffic within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
Advanced HTTP Activity Analysis 2009 Goal The goal of this training is to get you familiar with basic HTTP traffic and understand how to target and expliot it using X-KEYSCORE Ag...
0.0

Coming Soon! A Tool that Enables Non-Linguists to Analyse Foreign-TV News Programs

Document

Release Date: 2015-05-05 Document Date: 2008-10-23
This October 2008 article from an NSA internal newsletter SIDToday Enhanced Video Text and Audio Processing (eViTAP), a tool that provides automatic translations of news broadcasts in English, Russian, Spanish, Arabic, Mandarin and Farsi: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015. sidtoday-non-linguists-final
(U//FOUO) Coming Soon! A Tool that Enables Non-Linguists to Analyze Foreign-TV News ______________________ Programs FROM: Center for Time-Sensitive Information (S2413) Run Date: 10/23/20...
0.0

GCSB has identified an MFA data link

Document

Release Date: 2015-04-19 Document Date: 2013-04-01
This short extract from an April 2013 NSA document describes a “verbal agreement” between GCSB and NSA to proceed with the FROSTBITE / BASILHAYDEN project to infiltrate a Chinese diplomatic data link: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
(TS//SI//NF) New Zealand: GCSB has identified an MFA data link between the Chinese Consulate and Chinese Visa Office in Auckland. NSA and GCSB have verbally agreed to move forward with a coopera...
0.0

SUSLOW monthly report for March 2013

Document

Release Date: 2015-04-19 Document Date: 2013-03-01
This monthly report from the NSA’s Special US Liaison Officer in Wellington outlines progress on FROSTBITE (BASILHAYDEN) – a project to infiltrate the Chinese diplomatic computer network: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
| TOP SECRET//SI//REL TO USA, FVEY (U//FOUO) SUSLOW Monthly Report for March 2013 (U) March highlights: (U) Intelligence update: o (S//SI//REL TO USA, FVEY) GCSB project FROSTBITE / TA...
0.0

NSA Activities in Progress 2013

Document

Release Date: 2015-03-05 Document Date: 2013-01-01
This single redacted slide from a 2013 NSA presentation confirms that New Zealand participates in Five Eyes cable access operations and reports the existence of a joint plan to infiltrate a Chinese diplomatic data connection: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 March […]
Snowden3.png: Key Activities In Progress: Access New Zealand: Joint effort to exploit Chinese MFA link. New Zealand: Partner cable access program achieves Phase 1. TOP SECRET//COMINT//NO...
0.0

XKEYSCORE, Cipher Detection, and You!

Document

Release Date: 2013-12-11 Document Date: 2008-08-21
This presentation from NSA’s Mathematics Research Group, dated 21 August 2008 provides an introduction to the XKeyScore system’s data sources and fingerprinting capabilities: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
xks-cipher-detection-and-you-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, FVEY , Cipher Detection, and You! Mathematics Research Group 21 August 2008 TOP SECRET//COMINT//REL TO USA, F...
0.0

TRAFFICTHIEF Configuration Readme

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration information for TRAFFICTHIEF, the live alerts element of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
trafficthief-readme-p1-normal.gif: SECRET//REL TO USA, FVEY (U//FOUO) TRAFFICTHIEF Configuration Read Me (U) Overview (S//REL) TRAFFICTHIEF (TT) is the NSA corporate alerting and tippin...
0.0

Tracking Targets on Online Social Networks

Document

Release Date: 2014-05-13 Document Date: 2009-09-01
This September 2009 NSA presentation outline some of the insights that analysts can gather from online social networks (OSNs) and show the XKeyScore interface for performing such searches: see the book No Place To Hide, 13 May 2014.
TOP SECRET//COMINT//REL TO USA, FVEY (S//SI//REL) Tracking Targets on Online Social Networks The overall classification of this briefing to TOP SECRET//COMINT//REL TO USA, FVEY Online...
0.0

HTTP Activity in XKEYSCORE

Document

Release Date: 2015-07-01 Document Date: 2009-03-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HTTP Activity in XKEYSCORE March 2009 Derived From: NSA/QSSM 1-52 Dated: 200701 (T Declassify On: 202911 ...
0.0

Email Address vs User Activity

Document

Release Date: 2015-07-01 Document Date: 2009-06-24
This NSA presentation from 24 June 2009 explains how to use the email search functionality within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 vs User Activity 24 June 2009 "»Ol 01 t » «4 Ha#f* IWt De rived From: NSA/CSSM 1-52 ...
0.0

DEEPDIVE Configuration Read Me

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration instructions for DEEPDIVE, a system that can be integrated with XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CONFIDENTIAL (U//FOUO) DEEPDIVE Configuration Read Me (U) Overview (C) The purpose of this document is to provide procedures to configure an XKEYSCORE server as a DEEPDIVE server. DEEPD...
0.0

Special-Delivery SIGINT: How NSA Got Reports to US Negotiators In Time for Them To Be of Value

Document

Release Date: 2017-04-24 Document Date: 2007-07-13
This 13 July 2007 article from the internal NSA newsletter SIDToday describes how the agency surveilled the Japanese delegation at the 59th annual meeting of the International Whaling Commission, with the help of their New Zealand partner: see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017. […]
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI//REL) Special-Delivery SIGINT: How NSA Got Reports to US Negotiators In Time for Th...
0.0

Back in Time: The KAL-007 Shootdown

Document

Release Date: 2017-04-24 Document Date: 2006-07-19
This 19 July 2006 article from the internal NSA newsletter Foreign Affairs digest explains the ramifications of the Soviet attack on Korean Airlines flight 007 in 1983 for US-Japanese intelligence cooperation: see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017.
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Back in Time: The KAL-007 Shootdown FROM: the Foreign Affairs Digest Unknown Run...
0.0

QUANTUMTHEORY success at SARATOGA

Document

Release Date: 2016-08-19 Document Date: 2011-04-15
This 15 April 2011 article from the NSA’s internal newsletter Special Source Operations News discusses the delivery of malware to a target in Pakistan while they were using Facebook: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
(TS//SI//NF) DGO Enables Endpoint Implants via QUANTUMTHEORY By [[REDACTED]] on 2011-09-26 1548 (TS//SI//NF) In another example of the emerging collaboration between the Endpoint and Midpoint ...
0.0

SIGINT Development Support II Program Management Review

Document

Release Date: 2016-08-19 Document Date: 2013-04-24
Four slides taken from a 24 April 2013 NSA presentation detail how SECONDDATE man-in-the-middle attacks were used against targets in Pakistan and Lebanon: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//SI//NOFORN The overall classification of this brief is (U) SIGINT Development Support II Program Management Review ► 24 April 2013 TOP SECRET//COMINT//NOFORN Derived Fro...
0.0

SSO Web > (U) Blarney

Document

Release Date: 2016-11-16
This screenshot from the NSA’s internal SSO Web provides an introduction to BLARNEY: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
f' SSO Web > (U) BLARNEY Home - Windows Internet Explorer -siOJjsJ H ft *t A Live Search P ’ File Edit View Favorites lools Help Links 0_ (U) Shortened URL Service 0 , PRISM 0 S...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh