Results
3 Total
0.0
National Initiative Protection Program – Sentry Eagle
Document
Release Date:
2014-10-10
Document Date:
2004-11-23
This document, produced by the NSA and the US military’s Joint Functional Component Command – Network Wardare, provides a briefing on, and classification guide to, the highly sensitive group of “core computer network operations secrets” codenamed SENTRY EAGLE: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN//20310524
DRAFT
(S) National Security Agency/Central Security'
Service
(NSA/CSS)
and
U.S. Strategic Command
Joint Functional Component Command - Net...
0.0
OSINT Fusion Project
Document
Release Date:
2015-07-01
This undated presentation from NSA’s UK-based Menwith Hill station describes the various uses of open source intelligence (OSINT) in computer network operations, including the monitoring of hacker forums and spotting opportunities for so-called “Fourth Party Collection”: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, FVEY
OSINT FUSION PROJECT
Lockheed Martin IS&GS Intelligence
LOCKHEED MARTIN
TOP SECRET//COMINT//REL TO USA, FVEY
TOP SECRET//COMINT//REL TO USA,...
0.0
CNO Legal Authorities
Document
Release Date:
2015-06-04
Document Date:
2010-01-01
This 2010 presentation and speaking notes from the NSA’s Office of Legal Counsel explains the legal authorities governing the agency’s computer network operations (CNO) activities: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
^îcvr/7
¿Musc*
(U//FOUO) CNO LEGAL AUTHORITIES
Office of General Counsel
Classification: SECRET//COMINT//Rel 4
EYES//20291123
1
Objectives for Today's Brief
• Overview of SIG...