Filtered By
Afghanistan (AFG/AF) X
Countries Mentioned [filter]
Results
157 Total
0.0

Interview with an SID “Hacker” — Part 2: Hacker Culture and Worker Retention

Document

Release Date: 2015-06-11 Document Date: 2012-07-13
This 12 July 2012 post from the NSA newsletter SIDToday describes the internal culture of Tailored Access Operations (TAO) from the perspective of a practitioner: see the Intercept article What the Snowden Files Say About the Osama Bin Laden Raid, 18 May 2015.
sidtoday-interview-with-a-sid-hacker-p1-normal.gif: DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 •...
0.0

What does the death of Usama bin Laden mean?

Document

Release Date: 2015-05-18 Document Date: 2011-05-17
In this 17 May 2011 article from the internal newsletter SIDToday, the NSA Signals Intelligence Directorate’s Associate Deputy Director for Counterterrorism, Jon Darby, decribes how the NSA played a “critical” role in the raid in bon Laden’s Abbottabad compound: see the Intercept article What the Snowden Files Say About the Osama Bin Laden Raid, 18 […]
DYNAMIC PAGE - HIGHES I P0SS1BLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Friday, 09 Nov 2012 • Web search • Agcncv-all Emails • SID-all Emails ...
0.0

To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; US SIGINT Provides Key Support

Document

Release Date: 2014-12-28 Document Date: 2009-06-12
This 12 June 2009 post from NSA’s internal SIDToday newsletter recounts a German/Afghan targeted operation and its support from the agency: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
SIDToday - To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; U.S. SIGINT Prov... DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS C...
0.0

PCS Harvesting at Scale

Document

Release Date: 2015-02-19 Document Date: 2010-04-27
This April 2010 GCHQ report proposes an automated approach to seizing large numbers of mobile phone encryption keys: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
TOP SECRET STRAP 1 Reference: OPC-TDSD/TECH/21 Date: 27th April 2010 PCS Harvesting at Scale (OPC-TDSD) (OPC-TDSD) (OPC-CAP) (OPC-TDSD) Summary This report explores the ...
0.0

CCNE Jan10-Mar10 Trial

Document

Release Date: 2015-02-19
These six slides from 2010 GCHQ presentation outline the results of a trial operation to acquire SIM encryption keys: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
where-are-these-keys.pdf: TOP SECRET STRAP 1 Where are these keys? Keys live on the SIM card in the phone They also need to be present on the mobile network; are kept carefully protecte...
0.0

NATO Civilian Intelligence Council – Cyber Panel – Talking Points

Document

Release Date: 2015-02-04 Document Date: 2011-09-14
This US National Intelligence Council memo dated 14 September 2011 provides US talking points for a forthcoming NATO meeting and includes the assessment that the threat presented by Anonymous and hacktivist activity is “minimal”: see the Intercept article Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise, 4 February 2015.
SECRET//REL TO USA, NATO NIM/Cyber 14 September 2011 Talking Points Subject: (S//REL NATO) NATO Civilian Intelligence Council—Cyber Panel National Input A. Threat Overview (U) (U...
0.0

SIGINT Seniors Making History – in a Good Way

Document

Release Date: 2018-03-01 Document Date: 2005-08-02
This 2005 article from the internal NSA newsletter SIDToday describes the conclusions of a meeting of the SIGINT Seniors group – the participants committed the 12 nations to deploy a tactical communications system in Afghanistan and build on the successful partnership during the Athens Olympics Games in advance of the 2006 Winter Olympics in Italy […]
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) SIGINT Seniors Making History - in a Good Way FROM: FAD's MultiNational/Second P...
0.0

Global Collaboration Environment (GCE)

Document

Release Date: 2018-03-01 Document Date: 2013-04-10
This set of NSA talking points, dated 10 April 2013, outlines a plan for continuing the GCE intelligence-sharing arrangement beyond the Afghan war, which NSA and GCHQ would collaborate on closely: see the Intercept article The Powerful Global Spy Alliance You Never Knew Existed, 1 March 2018.
SECRET//SI//REL TO USA, GBR (U) Topic: Global Collaboration Environment (GCE) (U//FOUO) Director's Talking Points: • (S//REL TO USA, GBR) Thank GCHQ for giving full support to GCE, and for...
0.0

SIGINT Partnership Agrees to Greater Sharing

Document

Release Date: 2018-03-01 Document Date: 2010-08-12
This 12 August 2010 post from the NSA’s internal newsletter SIDToday describes the outcomes of the annual Sigint Seniors Europe (SSEURP) conference, which agreed in principle to increase information sharing: see the Intercept article The Powerful Global Spy Alliance You Never Knew Existed, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI//REL) SIGINT Partnership Agrees to Greater Sharing on Afghanistan, CT, Piracy, and ...
0.0

QUANTUMTHEORY success at SARATOGA

Document

Release Date: 2016-08-19 Document Date: 2011-04-15
This 15 April 2011 article from the NSA’s internal newsletter Special Source Operations News discusses the delivery of malware to a target in Pakistan while they were using Facebook: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
(TS//SI//NF) DGO Enables Endpoint Implants via QUANTUMTHEORY By [[REDACTED]] on 2011-09-26 1548 (TS//SI//NF) In another example of the emerging collaboration between the Endpoint and Midpoint ...
0.0

How Is Human Language Technology Progressing?

Document

Release Date: 2018-01-19 Document Date: 2011-09-06
This article from the NSA internal newsletter SIDToday discusses the progress of the agency’s voice recognition efforts, particularly in Spanish and the languages spoken in Afghanistan: see the Intercept article Finding Your Voice, 19 January 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI//REL) How Is Human Language Technology (HLT) Progressing? FROM: (U//FOUO) La...
0.0

Visit Precis: Sir Iain Lobban

Document

Release Date: 2014-04-30 Document Date: 2013-04-01
This internal NSA document from April 2013 gives background information to prepare for the then GCHQ Director’s visit on 30 April and 1 May; included topics include access to PRISM data, FLAME malware, Iran, Syria and Israel: see the Intercept article British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools, 30 April 2014. […]
TOPSECRET//SI//NOFORN VISIT PRÉCIS Sir Iain Lobban, KCMG, CB Director, Government Communications Headquarters (GCHQ) 30 April 2013 - 1 May 2013 GEN A Hosted Dinner: 30 April 2013//1...
0.0

Going After al-Qa'ida - All of It

Document

Release Date: 2018-03-01 Document Date: 2005-12-06
An order was signed by Secretary of Defense Donald Rumsfeld that broadened the war on terrorism beyond its focus on Al Qaeda senior leadership, granting U.S Special Operations Command the authority to target the entire Al Qaeda network within or outside of the Afghanistan and Iraq battlefields. 
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//REL) Going After al-Qa'ida - All of It FROM: NSA Liaison Officer to SOCOM (F1T) Run Date:...
0.0

Combat Search and Rescue: Menwith Hill Station's Role in Saving Lives

Document

Release Date: 2017-09-13 Document Date: 2005-03-23
The Menwith Hill Station takes a direct role in combat search and rescue (CSAR) operations, processing distress transmissions received from troops and sending them to rescue efforts. The station has successfully aided in the rescue of U.S. personnel in Afghanistan, Pakistan, and Iraq, and participates in CSAR trainings and simulations with U.K. Special Forces.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (C) Combat Search and Rescue: Menwith Hill Station's Role in Saving Lives FROM: MHS Operatio...
0.0

The 'Other' End-to-End SIGINT Site in the UK

Document

Release Date: 2017-09-13 Document Date: 2005-03-07
There is a U.S. signals intelligence presence at the Royal Air Force base at Digby, in the Lincolnshire countryside, where the writer, an NSA civilian, reports that there will soon be three additional positions available.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) The 'Other' End-to-End SIGINT Site in the UK FROM: NSA Liaison Officer at Digby SIGINT Op...
0.0

Al-Qa'ida: An Emerging Narco-Supported Terrorist Group?

Document

Release Date: 2016-12-07 Document Date: 2004-08-19
Article lays out questions surrounding al Qaeda's involvement in the narcotics trade in Afghanistan. While there appear to be many low-level al Qaeda operatives involved in the drug trade, there is no intelligence indicating mid- or high-level operatives are involved.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S) Al-Qa'ida: An Emerging Narco-Supported Terrorist Group?<br>FROM:<br>Deputy SINI...
0.0

2003 CSE/NSA SIGINT Bilateral

Document

Release Date: 2016-08-10 Document Date: 2003-11-12
Canada’s Communications Security Establishment hosted an annual SIGINT bilateral, including discussions on support to military operations in Afghanistan, homeland security issues, and counterterrorism in Southeast Asia.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) 2003 CSE/NSA SIGINT Bilateral<br>FROM:<br>Deputy SUSLO in Ottawa<br>Run Da...
0.0

UN Security Council: Round Two of U.S. Draft Resolution on Iraq

Document

Release Date: 2016-08-10 Document Date: 2003-10-07
Critical analysis of a U.S. draft resolution on Iraq in the U.N. Security Council and its chances of success.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) UN Security Council: Round Two of U.S. Draft Resolution<br>on Iraq<br>FROM...
0.0

Media Leaks - Part I (repost)

Document

Release Date: 2016-08-10 Document Date: 2003-12-31
(Repost) NSA refers to media leaks as “cryptologic insecurities.” This article lists several examples from 2000-2002 (from CBS News, “New York Times Daily News,” the Washington Times, and WorldNetDaily) along with damage assessments and follow-on actions, like reporting to the DOJ and requesting an FBI investigation.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Media Leaks - Part I (repost)<br>FROM: SIGINT Communications<br>Run Date: 12/31/...
0.0

Chef's Choice: Database Access by Tactical Units

Document

Release Date: 2016-08-10 Document Date: 2003-12-16
The Signals Intelligence deputy director writes that a year ago, SID made a commitment to provide tactical units in Iraq and Afghanistan with access to SIGINT databases. This is complete, but the approval process to give access to the database is too slow, so he’s unveiling a plan to speed it up and grant or deny access within seven days.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Chef's Choice: Database Access by Tactical Units<br>FROM: Charlie Meals<br...
0.0

CT Support For CENTCOM In Afghanistan

Document

Release Date: 2016-12-07 Document Date: 2004-02-09
Job listing for SIGINT analysts interested in joining an "exclusive group" of counterterrorism subject matter experts in Kabul.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S) CT Support For CENTCOM In Afghanistan<br>FROM: Analysis and Production<br>Unkno...
0.0

IMT Members Make Trip to Afghanistan, Pakistan

Document

Release Date: 2016-12-07 Document Date: 2004-06-09
Two members of the Middle East/North Africa/South Asia Issue Managers Team who traveled to Afghanistan and Pakistan in May 2004 share a brief update and photos from their trip.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) IMT Members Make Trip to Afghanistan, Pakistan<br>FROM: SIGINT Communicatio...
0.0

Charlie Meals Visits GEO

Document

Release Date: 2016-12-07 Document Date: 2004-04-13
The deputy director visited the Geospatial Exploitation Office, meeting with analysts and mission managers supporting the war on terror.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) Charlie Meals Visits GEO<br>FROM:<br>Geospatial Exploitation (S2L)<br>Run...
0.0

Fusing Signals Data, with WARGODDESS

Document

Release Date: 2016-05-16 Document Date: 2003-05-21
WARGODDESS is a system that fuses multiple sources of signal data to help characterize targets and threats and produce estimates about targets and their intentions.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Fusing Signals Data, with WARGODDESS<br>FROM:<br>WARGODDESS System Enginee...
0.0

Black Budget entry on Computer Network Operations GENIE project

Document

Release Date: 2015-01-17 Document Date: 2012-02-18
This extract from the US Intelligence Community’s Congressional Budget Justification for the Fiscal Year 2013 (the “Black Budget”) provides the budget for GENIE the project “which underpins NSA/CSS’ Computer Network Operations (CNO) Endpoint capabilities conducted by the Tailored Access Operations (TAO) Group: see the Der Spiegel article The Digital Arms Race: NSA Preps America for […]
TOP SECRET//SI/TK//NOFORN (U) COMPUTER NETWORK OPERATIONS (U) GENIE This Exhibit is SECRET//NOFORN FY 20111 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 2013 Base...
0.0

Joint Prioritized Effects List

Document

Release Date: 2014-12-28 Document Date: 2011-01-01
This anonymised version of the Joint Prioritized Effects list highlights aspects of NATO’s targeted killing operations in Afghanistan: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
JPEL TARGETS 669 RESTRICTE NATO SECRET REL ISAF JPEL NEXTJTWG: 08AUG10 NEXT JPEL APPROVAL: 09 AUG10 REGION TRIBAL AFFILIATION PROV TGTNOM LEAD AGENCY/SERV AGENCY OP NAME OBJ ...
0.0

SIGINT Helps Hobble the Taleban by Cutting Off Their Livelihood

Document

Release Date: 2014-12-28 Document Date: 2009-02-03
A post from the internal NSA newsletter SIDToday shows that, as of 2008, “narcotics traffickers were added to the Joint Prioritized Effects List (JPEL) for the first time”: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
SIDToday - SIGINT Helps Hobble the Taleban by Cutting Off Their Livelihood DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL • SIDtodav A...
0.0

Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints

Document

Release Date: 2015-07-01 Document Date: 2010-05-01
This 61-page NSA presentation from May 2010 provides analysts with a guide to tracking individuals within XKeyScore using the system’s fingerprint capability: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints May 2010 TOP SECRET //COMINT //REL TO USA, AUS, CAN, GBR, NZL ...
0.0

Profiling SSL and Attributing Private Networks

Document

Release Date: 2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL PROFILING SSL AND ATTRIBUTING PRIVATE NETWORKS An introduction to FLYING PIG and HUSH PUPPY ICTR - Network Exploitation GCHQ T R J...
0.0

Expeditionary Access Operations: NSA’s Close Access Network Exploitation Program

Document

Release Date: 2016-08-19
This undated presentation from the NSA’s Expeditionary Access Operations discusses how malware techniques are used in the field: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
EXPEDITIONARY ACCESS OPERATIONS NSA’s Close Access Network Exploitation Program Expeditionary Access Operations (S//SI//REL) S3283 is the expeditionary arm of TAO which conducts worldwide...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh