DocumentDocument Date: 2011-03-21Release Date: 2014-06-18
This presentation, prepared for the Pacific SIGDEV Conference in March 2011 describes the organisation, operations and modernisation of the NSA’s Special Collection Service division, which works out of US embassies and consultates across the world, in tandem with the CI see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 […]
TOP SECRET // COMINT // REL TO USA, AUS, CAN, GBR, NZL Special Collection Service Pacific SIGDEV Conference March 2011 The Overall Classification of this Briefing: TOP SECRET//COMIN...
DocumentDocument Date: 2012-04-18Release Date: 2015-01-17
This April 2012 training presentation produced by Navy Information Operations Command Maryland states that “the next major conflict will start in cyberspace”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
NIOC MARYLAND ADVANCED COMPUTER NETWORK OPERATIONS COURSE Coordinated by -- NAVIOCOM Maryland Center of Excellence for Non-Kinetic Options — 1 SECRET//REL TO USA, / Title • C...
DocumentRelease Date: 2014-12-28
This undated NSA wiki page describes LONGHAUL, an “end-to-end attack orchestration and key recovery service for Data Network Cipher and Data Network Session Cipher traffic”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
LONG HAUL - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLE//ORCON/PROPIN /RELIDO/REL TO USA, FVEY * TOP SECRET//SI//REL TO USA, FVEY (U) ...
DocumentDocument Date: 2009-05-08Release Date: 2015-06-04
These classified annexes to the Obama administration’s Cyberspace Policy Review were not published with the rest of the report in May 2009 and acknowledge that cyber defence initiatives have civil liberties implications: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
SECRET//REL TO FVEY CYBERSPACE POLICY REVIEW (U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD-54/HSPD-23, Cybersecurity P...
DocumentDocument Date: 2012-06-06Release Date: 2014-12-28
This 40-page NSA presentation for the June 2012 SIGDEV conference includes a ranking of cryptographic protocols in order of ‘risk’ the they pose to the agency’s operations: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL FVEY//20340601 SIGDEV Conference 2012 (U) Making Things Measureable: Technology Trending Challenges and Approaches June 2012 TOP SECRET//COMINT//REL FVEY/...