Filtered By
Korea (KOR/KR) X
Countries Mentioned [filter]
Russia (RUS/RU) X
Countries Mentioned [filter]
Results
22 Total
0.0

Apportionment of Strategic Efforts -- Our Plan of Attack

Document

Release Date: 2018-03-01 Document Date: 2006-02-15
U.S. Signals Intelligence System resources are allocated in the following areas: 35 percent are dedicated to the global war on terrorism; 35 percent are dedicated to China, North Korea, Iran, and Russia; 20 percent go to remaining strategic focus areas; and 10 percent are set aside for development in data acquisition, signals development, or analysis and production.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) Apportionment of Strategic Efforts -- Our Plan of Attack FROM: SIGINT Communication...
0.0

SIGINT Monitors Global Spread of Avian Flu

Document

Release Date: 2016-12-07 Document Date: 2005-10-28
NSA closely monitored the 2004 spread of avian influenza in preparation for a possible pandemic. "As our IC colleagues have said, containing the threat of infectious disease comes down to 'detection, detection, detection. SIGINT is probably going to get it first,'" the author writes.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) SIGINT Monitors Global Spread of Avian Flu<br>FROM:<br>Assistant SINIO for ...
0.0

About the Virtual Private Network SIGDev Working Group...

Document

Release Date: 2017-09-13 Document Date: 2005-05-12
A brief description of a working group focused on monitoring and helping to exploit virtual private networks, or VPNs. Established in 2004, the working group publishes regular "VPN Target Activity Reports" on dozens of countries and organizations around the world. "These reports may help you exploit targets' VPNs more successfully," the chair of the working group writes.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (TS//SI) About the Virtual Private Network SIGDev Working Group... FROM: Chair NSA VPN WG, Ad...
0.0

A&P; Leadership Changes

Document

Release Date: 2016-08-10 Document Date: 2003-10-22
Leadership changes in Analysis and Production are announced.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) A&amp;P; Leadership Changes<br>FROM: Jim Allen<br>Deputy Director for Analysis a...
0.0

Profiling SSL and Attributing Private Networks

Document

Release Date: 2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL PROFILING SSL AND ATTRIBUTING PRIVATE NETWORKS An introduction to FLYING PIG and HUSH PUPPY ICTR - Network Exploitation GCHQ T R J...
0.0

Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations

Document

Release Date: 2015-04-02 Document Date: 2011-03-10
These extracts from a GCHQ paper dated 10 March 2011 provide an indication of the agency’s ongoing effects (misinformation) and “online HUMINT” operations: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.s
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations PhD Human Systems Group, Information Management ...
0.0

Introducing Carl Johnson as Assistant Deputy Director for Customer Relationships

Document

Release Date: 2016-05-16 Document Date: 2003-06-26
The assistant deputy director for customer relationships describes his first month on the job.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Introducing Carl Johnson as Assistant Deputy Director for<br>Customer Relationsh...
0.0

EP-3E Collision: Cryptologic Damage Assessment and Incident Review

Document

Release Date: 2017-04-10 Document Date: 2001-07-01
A joint US Navy and NSA report, prepared three months after a US spy plane was forced to crash land in China, assesses the degree to which surveillance secrets were compromised: see the Intercept article Burn After Reading: Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident, 10 April 2017. […]
TOP SECRET//COMINT//NOFORN//X1 EP-3E Collision: Cryptologic Damage Assessment and Incident Review Final Report Prepared by the EP-3 Cryptologic Assessment Team July 2001 Classifie...
0.0

Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations

Document

Release Date: 2015-06-22 Document Date: 2011-03-22
This 42-page report from 10 March 2011 provides an overview of GCHQ’s information operations unit and the behavioural science theories that underpin its activities: see the Intercept article Controversial GCHQ Unit is Deeply Engaged in Law Enforcement, 22 June 2015.
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations Mandeep K. Dhami, PhD Human Systems Group, Infor...
0.0

An Easy Way to Win: Using SIGINT to Learn about New Viruses (Project Camberdada)

Document

Release Date: 2015-06-22 Document Date: 2010-01-01
This 2010 NSA presentation describes Project Camberdada, an attempt to subvert popular antivirus software by means of surveilling email traffic: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL An Eas Using S about P fwmuuuu IGINT to Learn iew Viruses Project CAMBERDADA ByHH, 1412 (IAD) V252|| Derived From: NSA/CSSM...
0.0

Black Budget – Israel

Document

Release Date: 2013-08-29 Document Date: 2012-02-01
These three short extracts from the 2013 Intelligence Community Budget Justification (“the Black Budget”) shows that Israel was seen as a counter-intelligence target: see the Intercept article Netanyahu’s Spying Denials Contradicted by Secret NSA Documents, 25 March 2015.
1Isr-540x258.png: (U> Penetrate Hostile Foreign Intelligence Services (S//NF) The ability to detect and engage foreign intelligence services and non state actors that target U.S. interests is...
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

Final Agenda SWEDUSA

Document

Release Date: 2013-12-11 Document Date: 2013-04-23
The agenda for the SWEDUSA 2013 Strategic Planning Conference on 24-26 April 2013, showing extensive discussion between the NSA and FRA at the most senior level: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
TOP SECRET//SI//NOFORN As of: 23 April//1000 Protocol Rep: Visit manager: Date/Time of Visit: (U) 24-26 April 2013 24 April 2013//0745-1600; 25 April 2013//0845-1545; 26 April...
0.0

Cable Master List

Document

Release Date: 2014-11-25 Document Date: 2009-07-27
These July 2009 documents provide a full list of the fibre-optic cables GCHQ had access to at that point, including details of location, bandwidth and corporate partners: see the Süddeutsche Zeitung article Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts, 25 November 2014. […]
partner_cables.pdf:  Partner Cable UK? REMEDY GERONTIC DACRON LITTLE PINNAGE STREET CAR VITREOUS Apolo UK IRU/LC DCO IRU/LC IRU/LC IRU/LC CANTAT 3 UK DCO IRU/LC Concerto UK D...
0.0

Exhibit F

Document

Release Date: 2014-06-30 Document Date: 2010-07-16
This document lists the 193 governments, intragovernmental organisations and other entities which the NSA was granted the legal authority to intercept communications “about” for foreign intelligence purposes in August 2010: see the Washington Post article Court gave NSA broad leeway in surveillance, 30 June 2014.
TOP SECRET//NOFORN EXHIBIT F IN THE MATTER OF FOREIGN GOVERNMENTS, FOREIGN FACTIONS Ns?F^yyiG#i 11- ENTITIES, AND FOREIGN-BASED POLITICAL ORGANIZATIONS >■,, f;f |:VV DNI/AG 70...
Afghanistan (AFG/AF), Albania (ALB/AL), Algeria (DZA/DZ), Andorra (AND/AD), Angola (AGO/AO), Antigua and Barbuda (ATG/AG), Argentina (ARG/AR), Armenia (ARM/AM), Austria (AUT/AT), Azerbaijan (AZE/AZ), Bahamas (BHS/BS), Bangladesh (BGD/BD), Barbados (BRB/BB), Belarus (BLR/BY), Belgium (BEL/BE), Belize (BLZ/BZ), Benin (BEN/BJ), Bhutan (BTN/BT), Bolivia (BOL/BO), Bosnia and Herzegovina (BIH/BA), Botswana (BWA/BW), Brazil (BRA/BR), Bulgaria (BGR/BG), Burkina Faso (BFA/BF), Burundi (BDI/BI), Cambodia (KHM/KH), Cameroon (CMR/CM), Central African Republic (CAF/CF), Chad (TCD/TD), Chile (CHL/CL), China (CHN/CN), Colombia (COL/CO), Comoros (COM/KM), Congo (COD/CD), Costa Rica (CRI/CR), Croatia (HRV/HR), Cuba (CUB/CU), Cyprus (CYP/CY), Czech Republic (CZE/CZ), Denmark (DNK/DK), Djibouti (DJI/DJ), Dominica (DMA/DM), Dominican Republic (DOM/DO), Ecuador (ECU/EC), Egypt (EGY/EG), El Salvador (SLV/SV), Equatorial Guinea (GNQ/GQ), Eritrea (ERI/ER), Estonia (EST/EE), Ethiopia (ETH/ET), Fiji (FJI/FJ), Finland (FIN/FI), France (FRA/FR), Gabon (GAB/GA), Gambia (GMB/GM), Georgia (GEO/GE), Germany (DEU/DE), Ghana (GHA/GH), Greece (GRC/GR), Grenada (GRD/GD), Guatemala (GTM/GT), Guinea (GIN/GN), Guinea-Bissau (GNB/GW), Guyana (GUY/GY), Haiti (HTI/HT), Vatican (VAT/VA), Honduras (HND/HN), Hungary (HUN/HU), Iceland (ISL/IS), India (IND/IN), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Ireland (IRL/IE), Israel (ISR/IL), Italy (ITA/IT), Jamaica (JAM/JM), Japan (JPN/JP), Jordan (JOR/JO), Kazakhstan (KAZ/KZ), Kenya (KEN/KE), Kiribati (KIR/KI), Korea (KOR/KR), Kuwait (KWT/KW), Kyrgyzstan (KGZ/KG), Latvia (LVA/LV), Lebanon (LBN/LB), Lesotho (LSO/LS), Liberia (LBR/LR), Libya (LBY/LY), Liechtenstein (LIE/LI), Lithuania (LTU/LT), Luxembourg (LUX/LU), Macedonia (MKD/MK), Madagascar (MDG/MG), Malawi (MWI/MW), Malaysia (MYS/MY), Maldives (MDV/MV), Mali (MLI/ML), Malta (MLT/MT), Marshall Islands (MHL/MH), Mauritania (MRT/MR), Mauritius (MUS/MU), Mexico (MEX/MX), Micronesia (FSM/FM), Moldova (MDA/MD), Monaco (MCO/MC), Mongolia (MNG/MN), Montenegro (MNE/ME), Morocco (MAR/MA), Mozambique (MOZ/MZ), Myanmar (MMR/MM), Namibia (NAM/NA), Nauru (NRU/NR), Nepal (NPL/NP), Netherlands (NLD/NL), Nicaragua (NIC/NI), Niger (NER/NE), Nigeria (NGA/NG), Norway (NOR/NO), Oman (OMN/OM), Pakistan (PAK/PK), Palau (PLW/PW), Panama (PAN/PA), Papua New Guinea (PNG/PG), Paraguay (PRY/PY), Peru (PER/PE), Philippines (PHL/PH), Poland (POL/PL), Portugal (PRT/PT), Qatar (QAT/QA), Romania (ROU/RO), Russia (RUS/RU), Rwanda (RWA/RW), Saint Kitts and Nevis (KNA/KN), Saint Lucia (LCA/LC), Samoa (WSM/WS), San Marino (SMR/SM), Sao Tome and Principe (STP/ST), Senegal (SEN/SN), Serbia (SRB/RS), Seychelles (SYC/SC), Sierra Leone (SLE/SL), Singapore (SGP/SG), Slovakia (SVK/SK), Slovenia (SVN/SI), Somalia (SOM/SO), South Africa (ZAF/ZA), Spain (ESP/ES), Sri Lanka (LKA/LK), Sudan (SDN/SD), Suriname (SUR/SR), Swaziland (SWZ/SZ), Sweden (SWE/SE), Switzerland (CHE/CH), Taiwan (TWN/TW), Tajikistan (TJK/TJ), Tanzania (TZA/TZ), Thailand (THA/TH), Timor-Leste (TLS/TL), Togo (TGO/TG), Tonga (TON/TO), Tunisia (TUN/TN), Turkey (TUR/TR), Turkmenistan (TKM/TM), Tuvalu (TUV/TV), Uganda (UGA/UG), Ukraine (UKR/UA), United States (USA/US), Uruguay (URY/UY), Uzbekistan (UZB/UZ), Vanuatu (VUT/VU), Venezuela (VEN/VE), Vietnam (VNM/VN), Western Sahara (ESH/EH), Yemen (YEM/YE), Zambia (ZMB/ZM), Zimbabwe (ZWE/ZW)
0.0

NIOC Maryland Advanced Computer Network Operations Course

Document

Release Date: 2015-01-17 Document Date: 2012-04-18
This April 2012 training presentation produced by Navy Information Operations Command Maryland states that “the next major conflict will start in cyberspace”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
NIOC MARYLAND ADVANCED COMPUTER NETWORK OPERATIONS COURSE Coordinated by -- NAVIOCOM Maryland Center of Excellence for Non-Kinetic Options — 1 SECRET//REL TO USA, / Title • C...
0.0

Visit Precis: SWEDUSA

Document

Release Date: 2013-12-11
This briefing document, produced ahead of the SWEDUSA Strategic Planning Conference of 24-26 April, outlines General Keith Alexander’s talking points for the event: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
TOP SECRET//COMINT//NOFORN VISIT PRÉCIS SWEDUSA 2013 STRATEGIC PLANNING CONFERENCE (SPC) MR. INGVAR ÀKESSON DIRECTOR GENERAL FORSVARETS RADIOANSTALT (FRA) SWEDEN 24-26 APRIL 2013 ...
0.0

Is NSA Correctly Postured Against the Most Critical Missions?

Document

Release Date: 2017-09-13 Document Date: 2005-06-09
Signals Intelligence Directorate leadership decides where to expend the most resources based on the SIGINT Mission List. The list includes 15 critical functional missions -- each of which has an area of focus and an area in which SID decides not to devote as much attention, thus accepting some amount of risk. China, North Korea, Iraq, Iran, and Russia are "regarded as 'trump cards'" and can take priority over any one of these missions.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Is NSA Correctly Postured Against the Most Critical Missions? FROM: MG Richard Quirk, USA...
0.0

Pacific SIGINT Development Conference

Document

Release Date: 2016-12-07 Document Date: 2004-05-13
Report from the April 2004 SIGDEV conference, held in Hawaii.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) Pacific SIGINT Development Conference<br>FROM:<br>GCHQ Integree, SIGINT S...
0.0

Supporting HMG’s Climate Change Ambitions (… or, “A GCO’s tales from Cancun”)

Document

Release Date: 2014-11-01 Document Date: 2011-02-01
This joint GCHQ/MI6 presentation from February 2011 documents the process of international climate change negotiations becoming a “serious intelligence priority” for the UK: see the Dagbladet Information article Snowden documents reveal British climate espionage – Copenhagen climate summit targeted, 1 November 2014.  
GCHQ SECRET INTELLIGENCE SERVICE Supporting HMG’s Climate Change Ambitions (...or, “A GCO’s tales from Cancún”) 27 November - 10 December 2010 GCHQ SECRET INTELLI...
0.0

1999 Agreement between the US and Israel

Document

Release Date: 2014-08-04 Document Date: 1999-07-15
This agreement, dated 15 July 1999, includes a preamble describing the development of signals intelligence cooperation between the US and Israel since the 1950s: see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
TOP S E C R E T/HVCCO 1. (S) preamblei in 1968 President Johnson and Prime Minister Eshkol agreed that an intelligence exchange would take place between the United States and Israel. This und...
0.0

'Key Reads' Effort Expands, Scores Successes

Document

Release Date: 2018-03-01 Document Date: 2005-09-26
The “key reads” process, first developed for Central Command needs in Operation Iraqi Freedom, has been expanded to more topics and customers. Key reads respond to specific customer requests in less than three days. 
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (C//SI) 'Key Reads' Effort Expands, Scores Successes FROM: Requirements Analysis Center (S114...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh