Filtered By
NSA X
Agency [filter]
Results
1985 Total
0.0

DNI Processing of RINGBILL Access

Document

Release Date: 2016-11-16 Document Date: 2013-04-23
This NSA technical memo from April 2013 describes deployments of agency personnel to the facility codenamed TITANPOINTE: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
TOP SECRET//COMINT//REL TO USA, FVEY (Report generated on:4/23/2013 7:00:17AM ) Blarney-40-12 Work in Progress ECP Lead: Title of Change: DNI Processing of RINGBILL Access Site(s): TIT...
0.0

FAIRVIEW TDY Handbook

Document

Release Date: 2016-11-16 Document Date: 2013-02-06
This internal document for NSA employees dated 6 February 2013 provides a guide for visiting facilities related with the FAIRVIEW programme, including the TITANPOINTE building in New York City: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20301121 FAIRVIEW TDY Handbook (U) A guide for traveling to Site Last Updated: 6 February 2013 POC: I Derived From: NSA/CSSM 1-52 Date...
0.0

How Is Human Language Technology Progressing?

Document

Release Date: 2018-01-19 Document Date: 2011-09-06
This article from the NSA internal newsletter SIDToday discusses the progress of the agency’s voice recognition efforts, particularly in Spanish and the languages spoken in Afghanistan: see the Intercept article Finding Your Voice, 19 January 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI//REL) How Is Human Language Technology (HLT) Progressing? FROM: (U//FOUO) La...
0.0

RT10 Initiative Overview

Document

Release Date: 2018-01-19 Document Date: 2006-11-09
This 2006 NSA technical presentation discusses the agency’s Voice RT system for real-time voice recognition and the role voice recordings from US conflict theatres played in developing the system: see the Intercept article Finding Your Voice, 19 January 2018.
TOP SECRET//COMINT//REL RT10 Initiative Overview Dr. James Heath Program Management & Advisors: COL Bob Harms / COL Barb Trent / Michelle Gerhard Architects: / Mark Ross Prese...
0.0

Perseverance Pays Off: Eight-Year SIGINT Effort Culminates in Arrest of Elusive Colombian Terrorist

Document

Release Date: 2017-11-30 Document Date: 2008-05-16
In this 2008 post from the NSA’s internal SIDToday newsletter the agency claims responsibility for the arrest of FARC member Doris Adriana: see the Intercept article NSA Secretly Helped Convict Defendants in U.S. Courts, 30 November 2017.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI/REL) Perseverance Pays Off: Eight-Year SIGINT Effort Culminates in Arrest of Elusiv...
0.0

FISA: Teaming with the FBI in the Global War on Terrorism

Document

Release Date: 2017-11-30 Document Date: 2005-08-17
This 2005 article from the NSA internal newsletter SIDToday makes it clear that, at that time, 40% of all the agency’s counterterrorism information was drawn from FISA sources, in collaboration with the FBI: see the Intercept article NSA Secretly Helped Convict Defendants in U.S. Courts, 30 November 2017.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) FISA: Teaming with the FBI in the Global War on Terrorism FROM: Special Source O...
0.0

Protocol note for Japan visit

Document

Release Date: 2018-05-19 Document Date: 2013-01-01
This undated NSA protocol note provides a short briefing for a visit to the agency’s Deputy Director of Foreign Affairs by his Japanese counterpart, due to happen sometime after January 2013: see the Intercept article The Untold Story of Japan’s Secret Spy Agency, 19 May 2018.
SECRET//NOFORN Clearances: Accompanying NSA/CSS Senior: Photographer: Memento Presented: Uniform of the Day: Purpose of Visit: Justification for Directorate Involvement: Ex...
0.0

Current State of and Proposed Future Cooperation with Japan

Document

Release Date: 2018-05-19 Document Date: 2013-01-14
This internal assessment from the NSA dated 14 January 2013 analyses Japan’s progress towards its cyber defense goals and domestic barriers to progress ahead of a planned US-Japanese Memorandum of Understanding due to be signed that year: see the Intercept article The Untold Story of Japan’s Secret Spy Agency, 19 May 2018.
SECRET//SI//NOFORN TOPIC: (S//SI//REL TO USA, JPN) Current State of and Proposed Future Cooperation with Japan on SIGINT-enabled Cyber Defense and the development of a Japanese National Cyber ...
0.0

SPIN 15 VPN Story

Document

Release Date: 2014-12-28
This undated NSA document gives information on ongoing development of attacks against VPNs: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 DRAFT SPIN 15 VPN Story VPN has two thrusts, one has high mission impacts and the other has high performance and functionalit...
0.0

POISONNUT

Document

Release Date: 2014-12-28
This undated page from NSA’s internal WikiInfo describes POISONNUT, “the Virtual Private Network Attack Orchestrator (VAO)”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
POISONNUT - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLP//nRmv/PRnPiN/BFi inn/RPi rn tt*;4 fvfv * TOP SECRETJ/SI//REL TO USA, FVEY (u) POISON...
0.0

VALIANTSURF

Document

Release Date: 2014-12-28
These three undated NSA slides provide an overview of the VALIANTSURF system: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, FVEY VALIANTSURF (VS): VALIANTSURF Capability Level Beneficiaries CES & LONGHAUL OTP & SSG TOPIs Link Access CES A Key Recovery, no on-site decrypti...
0.0

GALLANTWAVE

Document

Release Date: 2014-12-28
This undated presentation from NSA’s Digital Network Crypt Applications (DNCA) concerns the GALLANTWAVE tool, which decrypts VPN traffic within LONGHAUL: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL GALLANTWAVE@scale GALLANTWAVE @ volume Requirements @Scale Deploy more widely - Leverage peering with partner @Volume Increas...
0.0

VALIDATOR and OLYMPUSFIRE

Document

Release Date: 2014-01-01 Document Date: 2004-01-01
These two pages from a 2004 NSA briefing document describes two trojan implants used with the FOXACID system: see the Der Spiegel article NSA-Totalausspähung: FDP-Politiker Baum setzt auf Generalbundesanwalt, 1 January 2014.
image-583936-galleryV9-hpue.jpg: TOP SECRET//COMINT//MR VALIDATOR VALIDATOR is a part of a backdoor access system under the FOXACID project. The VALIDATOR is a client/server-based system t...
0.0

Intelligently filtering your data: Brazil and Mexico case studies

Document

Release Date: 2013-12-02
A selection of slides from a Secure and Trustworthy Cyberspace (SaTC) presentation gives case studies on the use of graph analysis in relation to the political leadership of Mexico and Brazil: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
glenn1-30.jpg: ?86 H6MTW£8MllflfHi® T8 Bifc SIS: SHI; ESH; H5t I(TS//SI//REL) Intelligently filtering your data Brazil and Mexico case studies SATC i86 ieff«E8fHHWB£l: ?8 HIS; 886; SH...
0.0

MHS and GCHQ “Get in the Game with Target Development for World of Warcraft Online Gaming”

Document

Release Date: 2013-12-09 Document Date: 2008-01-01
An NSA document from 2008 shows that efforts to collect data from players of World of Warcraft started that year with the development of specialised exploits by GCHQ. The operation was based at Menwith Hill in the UK: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 […]
TOP SECRET//COMINT//REL TO USA, FVEY (TS//SI//REL) MHS and GCHQ “Get in the Game” with Target Development for World of Warcraft Online Gaming (TS//SI//REL) Although online gaming may seem...
0.0

Apportionment of Strategic Efforts -- Our Plan of Attack

Document

Release Date: 2018-03-01 Document Date: 2006-02-15
U.S. Signals Intelligence System resources are allocated in the following areas: 35 percent are dedicated to the global war on terrorism; 35 percent are dedicated to China, North Korea, Iran, and Russia; 20 percent go to remaining strategic focus areas; and 10 percent are set aside for development in data acquisition, signals development, or analysis and production.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) Apportionment of Strategic Efforts -- Our Plan of Attack FROM: SIGINT Communication...
0.0

Acronyms Anonymous (repost)

Document

Release Date: 2018-03-01 Document Date: 2005-12-30
Repost: A recently hired technical writer, tongue in cheek, describes complicated acronyms and the NSA writing style as “language barriers.” And she reveals how she is often lost in NSA parking lots.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Acronyms Anonymous (repost) FROM: Antoinette Punzavitz Data Acquisition Staff (S3) Run Da...
0.0

Classification Guide for SIGINT Material Dating from 16 August 1945 – 31 December 1967

Document

Release Date: 2014-06-18 Document Date: 2011-11-21
This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
TOP SECRET//SjyTK//NOFÜRN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR SIGINT Material Dating from 16 August 1945 *31 December 1967 Effects Dale: 21 De...
0.0

United States – Collection Information

Document

Release Date: 2014-06-18
This undated Boundless Informant slide supplies collection data for a number of NSA projects: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
United States - Collection Information Summary :+ Project Name Validator ID 1 Day Count 3 Day Count 3C Day Count 1 t IP CHOCOLATES HIP 611002101 0 3 393 50.115.118.140 A SCREAMINGHARPY...
0.0

Dragons, Shrimp, and XKEYSCORE: Tales from the Land of Brothers Grimm

Document

Release Date: 2014-06-18 Document Date: 2012-04-13
This internal NSA post dated 13 April 2012 from the European Cryptologic Center in Darmstadt, Germany recounts an “XKS training blitz”: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) Dragons, Shrimp, and XKEYSCORE; Tales from the Land of Brothers Grimm European Cryptologic Center, SIGDEV (F22) Run Date: 04/13/2012 (S//REL) The European Cryptologic Center ...
0.0

Internal NSA presentation on BND organisation

Document

Release Date: 2014-06-18 Document Date: 2013-01-01
This 2013 NSA document presents an organisational chart of the German foreign intelligence service, the BND: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
 Ei.ndssraa-irichltnd 2131 Bundesnachrichtendienst Structure of the BND PRESIDENT WCf PRESIDENT (FTvtldential D*p^tyJ virr president for MILITARY AfFAIRS VICE FSE5I3...
0.0

Provision of XKeyScore software to the BfV

Document

Release Date: 2014-06-18
This short extract from an NSA document shows that cooperation with Germany’s intelligence services went as far as providing the country’s domestic intelligence service, the Federal Office for the Protection of the Constitution (BfV), with access to XKeyScore: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
exchange. [TS//SI//NF) Germany: Provision of XKEYSCORE software to the ES1V will expand their ability to support NSA as we jointly prosecute CT targets. Technical support forXKEYSCGRE will be...
0.0

On the Road Again: SID Team Visits Germany

Document

Release Date: 2014-06-18 Document Date: 2006-02-01
This internal NSA post from 1 February 2006 describes the visit several agency personnel to bases in Germany: see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.
(U//FOUO) On. the Road Again: SID Team Visits Germany Assistant Deputy Director for Analysis & Production (S2) Run Date: 02/01/2006 (U//FOUO) After staying around headquarters for the las...
0.0

Content Extraction Analytics

Document

This 21 May 2009 presentation from the NSA’s Center for Content Extraction includes a slide that shows that the communications of 122 heads of government were stored in the agency’s central “Target Knowledge Base”, 11 of whom are named. The collection for most of these targets was automated: see the Der Spiegel article ‘A’ for […]
Human Language technology Center for Content Extraction Content Extraction Analytics SIGDEV End-to-End Demo 21 May 2009 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassily On:...
0.0

A Little Bad Aibling Nostalgia

Document

This post from the NSA intranet dated 6 April 2001 gives the reactions of staff to the announced closure of the Bad Aibling station in Bavaria (in the event, the NSA retained a presence at the base): see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.
(U//FOUO) A Little Bad Aibling Nostalgia FROM: Some DA Veterans Unknown Run Date: 06/04/2004 (U//FOUO) Once the closure of Bad Aibling Station (located in southern Bavaria in Germany) b...
0.0

National Security Agency: Overview Briefing

Document

Release Date: 2014-05-13
This slide, taken from an undated NSA presentation, outlines what the agency considers to the ‘the threat today’: see the book No Place To Hide, 13 May 2014.
Page 168 ërrorists UNCLASSIFIED THE THREAT TODAY Internet ions Wireless Criminal Elements Hackers High-Speed Circuits Insiders Pagers Facsimile Traditi...
0.0

BLARNEY Exploits the Social Network via Expanded Facebook Collection

Document

Release Date: 2014-05-13 Document Date: 2011-03-14
This NSA intranet post dated 14 March 2011 describes how Facebook collection capabilities have been augmented with the help of corporate partner BLARNEY (AT&T) and the FBI: see the book No Place To Hide, 13 May 2014.
Page 160 (TS//SI//NF) blarney Exploits the Social Network via Expanded Facebook Collection By [ NAMCRfDACTeo | on 2011-03-14 0737 (TS//SI//NF) SSO HIGHLIGHT - BLARNEY Exploits the Social...
0.0

Tier B allies

Document

Release Date: 2014-05-13
This undated internal NSA document illustrates the degrees of cooperation in the agency’s relationships with different foreign powers. “Tier A” and “Tier B” are elsewhere referred to as Second and Third Parties: see the book No Place To Hide, 13 May 2014.
Page 123 CONFIDENT1AL//NOFORN//20291123 TIER A Comprehensive Cooperation Australia Canada New Zealand United Kingdom TIERB Focused Cooperation Austria Belgium Czech Republic Denmark G...
0.0

SILVERZEPHYR

Document

Release Date: 2014-05-13 Document Date: 2009-11-06
This internal NSA document dated 6 November 2009 describes work the agency has done with a corporate partner codenamed SILVERZEPHYR to develop collection capabilities in Brazil and Columbia: see the book No Place To Hide, 13 May 2014.
Page 106 SILVERZEPHYR FAA DNI Access Initiated at NSAW (TS//SI//NF) By NAME REDACTED ---------------m on 2009-11-06 0918 (TS//SI//NF) On Thursday, 11/5/09, the SSO-OAKSTAR SILVE...
0.0

NSA Washington Mission

Document

Release Date: 2014-05-13 Document Date: 2006-01-01
This excerpt from a 2006 NSA memo written by the global resources manager of the International Security Issues (ISI) mission underlines the importance of data on energy resources, production and international investment to the agency: see the book No Place To Hide, 13 May 2014.
Page 138 (U) NSA Washington Mission (U) Regional (TS//SI) ISI is responsible for 13 individual nation states in three continents. One significant tie that binds all these countries togethe...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh