Filtered By
United Kingdom (GBR/GB) X
Countries Mentioned [filter]
Iran (IRN/IR) X
Countries Mentioned [filter]
Results
19 Total
0.0

SNOWGLOBE: From Discovery to Attribution

Document

Release Date: 2015-01-17 Document Date: 2011-01-01
This 2011 CSEC presentation describes how the agency analysed SNOWGLOBE, which it considered “to be a state-sponsored CNO effort, put forth by a French intelligence agency”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Overall Classification: TOP SECRET II COMINT II REL TO CAN, AUS, GBR, NZL, USA ■ ■ Communications Security Establishment Canada SNOWGLOBE: From Discovery to Attribution CSEC CNT/Cyb...
0.0

PCS Harvesting at Scale

Document

Release Date: 2015-02-19 Document Date: 2010-04-27
This April 2010 GCHQ report proposes an automated approach to seizing large numbers of mobile phone encryption keys: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
TOP SECRET STRAP 1 Reference: OPC-TDSD/TECH/21 Date: 27th April 2010 PCS Harvesting at Scale (OPC-TDSD) (OPC-TDSD) (OPC-CAP) (OPC-TDSD) Summary This report explores the ...
0.0

CCNE Jan10-Mar10 Trial

Document

Release Date: 2015-02-19
These six slides from 2010 GCHQ presentation outline the results of a trial operation to acquire SIM encryption keys: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
where-are-these-keys.pdf: TOP SECRET STRAP 1 Where are these keys? Keys live on the SIM card in the phone They also need to be present on the mobile network; are kept carefully protecte...
0.0

Advanced HTTP Activity Analysis

Document

Release Date: 2015-07-01 Document Date: 2009-01-01
This 114-page NSA training presentation from 2009 explains how agency analysts can exploit HTTP traffic within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
Advanced HTTP Activity Analysis 2009 Goal The goal of this training is to get you familiar with basic HTTP traffic and understand how to target and expliot it using X-KEYSCORE Ag...
0.0

HTTP Activity in XKEYSCORE

Document

Release Date: 2015-07-01 Document Date: 2009-03-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HTTP Activity in XKEYSCORE March 2009 Derived From: NSA/QSSM 1-52 Dated: 200701 (T Declassify On: 202911 ...
0.0

Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities

Document

Release Date: 2013-12-09 Document Date: 2007-01-01
A 2007 proposal to the NSA from contractor SAIC, promoting the company’s ability to support “intelligence collection in the games space”: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 December 2013.
Games: A Look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities Table of Contents FORWARD......................................................................4 ...
0.0

Visit Precis: Sir Iain Lobban

Document

Release Date: 2014-04-30 Document Date: 2013-04-01
This internal NSA document from April 2013 gives background information to prepare for the then GCHQ Director’s visit on 30 April and 1 May; included topics include access to PRISM data, FLAME malware, Iran, Syria and Israel: see the Intercept article British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools, 30 April 2014. […]
TOPSECRET//SI//NOFORN VISIT PRÉCIS Sir Iain Lobban, KCMG, CB Director, Government Communications Headquarters (GCHQ) 30 April 2013 - 1 May 2013 GEN A Hosted Dinner: 30 April 2013//1...
0.0

Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations

Document

Release Date: 2015-04-02 Document Date: 2011-03-10
These extracts from a GCHQ paper dated 10 March 2011 provide an indication of the agency’s ongoing effects (misinformation) and “online HUMINT” operations: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.s
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations PhD Human Systems Group, Information Management ...
0.0

Iran – Current Topics, Interaction with GCHQ

Document

Release Date: 2015-02-10 Document Date: 2013-04-12
This NSA talking points memo dated 12 April 2013 notes that Iran “has demonstrated a clear ability to learn from the capabilities and actions of others”: see the Intercept article NSA Claims Iran Learned from Western Cyberattacks, 10 February 2015.
TOP SECRET//COMINT//NOFORN (U) Topic: Iran - Current Topics, Interaction with GCHQ (U) Director's Talking Points: * (TS//SI//REL TO USA, FVEY) Emphasize that we have successfully worked mu...
0.0

EP-3E Collision: Cryptologic Damage Assessment and Incident Review

Document

Release Date: 2017-04-10 Document Date: 2001-07-01
A joint US Navy and NSA report, prepared three months after a US spy plane was forced to crash land in China, assesses the degree to which surveillance secrets were compromised: see the Intercept article Burn After Reading: Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident, 10 April 2017. […]
TOP SECRET//COMINT//NOFORN//X1 EP-3E Collision: Cryptologic Damage Assessment and Incident Review Final Report Prepared by the EP-3 Cryptologic Assessment Team July 2001 Classifie...
0.0

Introduction to XKS Application IDs and Fingerprints

Document

Release Date: 2015-07-01 Document Date: 2009-08-27
This 60-page NSA presentation from 27 August 2009 explains the use of different kinds of metadata tags in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Application IDs and Fingerprints 27 August 2009 .... ‘s 01 Ol A l • DERIVED FROM: NSA/CSSM...
0.0

CNE Analysis in XKeyScore

Document

Release Date: 2015-07-01 Document Date: 2009-10-15
This NSA presentation from 15 October 2009 explains how analysts can exploit the products of the agency’s CNE hacking operations within XKeyScore and provides examples with screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CNE Analysis in XKEYSCORE 15 October 2009 xkeyscore@nsa.ic.gov l@nsa.ic.gov) y >M 1-5 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL DERIVED F ROM: Ñ WCSSM 1-52 DATED: 2...
0.0

GCHQ Ministry Stakeholder Relationships spreadsheets

Document

Release Date: 2015-06-22 Document Date: 2008-01-01
This collection of 13 spreadsheets illustrates the relationship between GCHQ and various ministries within the UK government and that agency’s work is by no means restricted to matters of national security, but also extends to domestic issues: see the Intercept article Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research, 22 June […]
 Bank of England GCO Name(s) 3CHQ Top level Aim with Customer BANK MISSION Contribute to Bank decision-making on issues affecting UK economic stability. To support UK economic stability. ...
0.0

Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations

Document

Release Date: 2015-06-22 Document Date: 2011-03-22
This 42-page report from 10 March 2011 provides an overview of GCHQ’s information operations unit and the behavioural science theories that underpin its activities: see the Intercept article Controversial GCHQ Unit is Deeply Engaged in Law Enforcement, 22 June 2015.
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations Mandeep K. Dhami, PhD Human Systems Group, Infor...
0.0

HTTP Activity vs. User Activity

Document

Release Date: 2015-07-01 Document Date: 2009-06-19
This NSA presentation from 19 June 2009 explains the metadata capabilities of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL m V HTTP Activity vs User Activity 19 June 2009 Derived From: NSA/CSSM 1-52 Bated :l2007i MM TOP SEC...
0.0

Broadcast/Intenet Radio Exploitation and Analysis

Document

Release Date: 2015-09-25 Document Date: 2009-11-06
This GCHQ research paper from 6 November 2009 outlines what kinds of data the agency can extract from internet radio stations and their listenership, grouped by country: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
broadcast-analysis-p1-normal.gif: UK TOP SECRET//COMINT//REL FVEY Broadcast/lnternet Radio Exploitation and Analysis 6th November 2009 OPD-NAC Distribution (via email) (ST2) BS...
0.0

NSA Intelligence Relationship with New Zealand

Document

Release Date: 2015-03-10 Document Date: 2013-04-01
This NSA information paper from April 2013 describes the state of the agency’s intelligence relationship with its New Zealand counterpart: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY National Security Agency April 2013 Central Security Service Information Paper (U) Subject: NSA Intelligence Relationship with New Zealand (U) Execu...
0.0

Full Log vs. HTTP

Document

Release Date: 2015-07-01 Document Date: 2009-06-11
This NSA presentation from 11 June 2009 explains the scope of metadata collection within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Log vs. HTTP 11 June 2009 * WHv:i DERIV TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//...
0.0

NAC 2Q 2011 Business Plan Review

Document

Release Date: 2015-04-02 Document Date: 2011-09-08
This short extract from a GCHQ Network Analysis Centre report covering the period July-September 2011 describes “offensive cyber operations” against Iran, Argentina and Libya: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET STRAP1 AUS/CAN/NZ/UK/US EYES ONLY \ 2Q NAC Business Plan Review July - September 2011 network >'N>n_,=*5i5 centre ,.A - . TOP SECRET STRAP1 AUS/CAN/NZ/UK/US EYES ONLY ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh