DocumentRelease Date: 2016-11-16 Document Date: 2013-02-06
This internal document for NSA employees dated 6 February 2013 provides a guide for visiting facilities related with the FAIRVIEW programme, including the TITANPOINTE building in New York City: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20301121 FAIRVIEW TDY Handbook (U) A guide for traveling to Site Last Updated: 6 February 2013 POC: I Derived From: NSA/CSSM 1-52 Date...
DocumentRelease Date: 2014-10-10
This group of three undated NSA slides provides a graphical representation of the sensitivity of aspects of the agency’s SENTRY EAGLE programme: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN SENTRY EAGLE National Initiative - Security Framework DERIVED FROM: NSA/CSS Manual 1-52. Dated: 20041123. Declassify On: 20291123 TOP SECRET//COMINT//NOFORN ...
This NSA report dated 11 April 2014 describes the difficulties with the network switches the agency had compromised on Cisco devices in order to collect data from Cisco customers: see the book No Place To Hide, 13 May 2014.
Page 150 TOP SECRET//COMINT//REL TO USA, FVEY (Report generated on:4/11/2013 3:31:05PM ) NewCrossProgram | Active ECP Count: | i~~| CrossProgram-1-13 New ECP Lead: I name redacted"! ...
DocumentRelease Date: 2014-10-10
This undated sequence of ten NSA slides provides a graphical representation of the sensitivity of the agency’s “core secrets”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
CONFIDENTIAL TOP SECRET//COMINT//NOFORN NSA/CSS and JFCC-NW National Initiative Task - Security Framework UNCLASSIFIED - FOUO r ^ TOP SECRET ECl SID w CNE f COMIN...
DocumentRelease Date: 2014-10-10 Document Date: 2004-11-23
This document, produced by the NSA and the US military’s Joint Functional Component Command – Network Wardare, provides a briefing on, and classification guide to, the highly sensitive group of “core computer network operations secrets” codenamed SENTRY EAGLE: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN//20310524 DRAFT (S) National Security Agency/Central Security' Service (NSA/CSS) and U.S. Strategic Command Joint Functional Component Command - Net...
DocumentRelease Date: 2015-06-04 Document Date: 2010-01-01
This 2010 presentation and speaking notes from the NSA’s Office of Legal Counsel explains the legal authorities governing the agency’s computer network operations (CNO) activities: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
^îcvr/7 ¿Musc* (U//FOUO) CNO LEGAL AUTHORITIES Office of General Counsel Classification: SECRET//COMINT//Rel 4 EYES//20291123 1 Objectives for Today's Brief • Overview of SIG...
DocumentRelease Date: 2014-07-14 Document Date: 2012-07-01
This page from GCHQ’s internal GCWiki describes tools developed by the Joint Threat Research Intelligence Group and their status. The page was last edited in July 2012 and was accessed nearly 20,000 times: see the Intercept article Hacking Online Polls and Other Ways British Spies Seek to Control the Internet, 14 July 2014. jtrigall
navigation ■ Main Page ■ Help Pages ■ Wikipedia Mirror ■ Ask Me About... ■ Random page ■ Recent changes ■ Report a Problem ■ Contacts ■ GCWeb search toolbox ■ W...
AIRWOLF, EAGLE, GAMBIT, MIDDLEMAN, RADIANT, SHADOWCAT, SKYSCRAPER, SWAMP, ANGRY PIRATE, BIRDSTRIKE, BOMB BAY, BUMPERCAR, BUMPERCAR+, BURLESQUE, CLEAN SWEEP, CONCRETE DONKEY, GATEWAY, GESTATOR, GLASSBACK, GLOBAL SURGE, HACIENDA, HUSK, INTERACTION, JEDI, MINIATURE HERO, MOUTH, PHOTON TORPEDO, ROLLING THUNDER (RT), SCRAPHEAP CHALLENGE, SPRING BISHOP, SUNBLOCK, SWAMP DONKEY, UNDERPASS, WARPATH, SLIPSTREAM