Filtered By
Saudi Arabia (SAU/SA) X
Countries Mentioned [filter]
Turkey (TUR/TR) X
Countries Mentioned [filter]
Results
6 Total
0.0

HTTP Activity in XKEYSCORE

Document

Release Date: 2015-07-01 Document Date: 2009-03-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HTTP Activity in XKEYSCORE March 2009 Derived From: NSA/QSSM 1-52 Dated: 200701 (T Declassify On: 202911 ...
0.0

Classification Guide for SIGINT Material Dating from 16 August 1945 – 31 December 1967

Document

Release Date: 2014-06-18 Document Date: 2011-11-21
This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
TOP SECRET//SjyTK//NOFÜRN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR SIGINT Material Dating from 16 August 1945 *31 December 1967 Effects Dale: 21 De...
0.0

About the Virtual Private Network SIGDev Working Group...

Document

Release Date: 2017-09-13 Document Date: 2005-05-12
A brief description of a working group focused on monitoring and helping to exploit virtual private networks, or VPNs. Established in 2004, the working group publishes regular "VPN Target Activity Reports" on dozens of countries and organizations around the world. "These reports may help you exploit targets' VPNs more successfully," the chair of the working group writes.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (TS//SI) About the Virtual Private Network SIGDev Working Group... FROM: Chair NSA VPN WG, Ad...
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

Geopolitical trends for 2014-2019

Document

Release Date: 2013-12-02
Three redacted slides from an NSA presentation name several states as subjects of ongoing interest: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
slide1.jpg: slide2.jpg: TOP SECRET//SI//REL TO USA, FVEY U//JEQUOslide3.jpg: rTO USA, FYEY Geopolitical Trends: Global Drivers (S//REL) Geopolitical Trend driver»: • St re**orc to...
0.0

FY2013 Foreign Partner Review

Document

Release Date: 2014-05-13 Document Date: 2013-01-01
This slide, taken from the NSA’s annual review of its cooperation with foreign partners, shows an expansion in the agency’s international relationships: see the book No Place To Hide, 13 May 2014.
Page 123 TOP SECRET// COMINT //REL USA, AUS, CAN, GBR, NZL Approved SIGINT Partners ^ORTUtt^ Second Parties Third Parties Australia Algeria Israel Spain Canada Austria Italy Sweden...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh