Filtered By
Afghanistan (AFG/AF) X
Countries Mentioned [filter]
Top Secret X
Classification [filter]
Results
25 Total
0.0

PCS Harvesting at Scale

Document

Release Date: 2015-02-19 Document Date: 2010-04-27
This April 2010 GCHQ report proposes an automated approach to seizing large numbers of mobile phone encryption keys: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
TOP SECRET STRAP 1 Reference: OPC-TDSD/TECH/21 Date: 27th April 2010 PCS Harvesting at Scale (OPC-TDSD) (OPC-TDSD) (OPC-CAP) (OPC-TDSD) Summary This report explores the ...
0.0

QUANTUMTHEORY success at SARATOGA

Document

Release Date: 2016-08-19 Document Date: 2011-04-15
This 15 April 2011 article from the NSA’s internal newsletter Special Source Operations News discusses the delivery of malware to a target in Pakistan while they were using Facebook: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
(TS//SI//NF) DGO Enables Endpoint Implants via QUANTUMTHEORY By [[REDACTED]] on 2011-09-26 1548 (TS//SI//NF) In another example of the emerging collaboration between the Endpoint and Midpoint ...
0.0

Visit Precis: Sir Iain Lobban

Document

Release Date: 2014-04-30 Document Date: 2013-04-01
This internal NSA document from April 2013 gives background information to prepare for the then GCHQ Director’s visit on 30 April and 1 May; included topics include access to PRISM data, FLAME malware, Iran, Syria and Israel: see the Intercept article British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools, 30 April 2014. […]
TOPSECRET//SI//NOFORN VISIT PRÉCIS Sir Iain Lobban, KCMG, CB Director, Government Communications Headquarters (GCHQ) 30 April 2013 - 1 May 2013 GEN A Hosted Dinner: 30 April 2013//1...
0.0

2003 CSE/NSA SIGINT Bilateral

Document

Release Date: 2016-08-10 Document Date: 2003-11-12
Canada’s Communications Security Establishment hosted an annual SIGINT bilateral, including discussions on support to military operations in Afghanistan, homeland security issues, and counterterrorism in Southeast Asia.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) 2003 CSE/NSA SIGINT Bilateral<br>FROM:<br>Deputy SUSLO in Ottawa<br>Run Da...
0.0

Media Leaks - Part I (repost)

Document

Release Date: 2016-08-10 Document Date: 2003-12-31
(Repost) NSA refers to media leaks as “cryptologic insecurities.” This article lists several examples from 2000-2002 (from CBS News, “New York Times Daily News,” the Washington Times, and WorldNetDaily) along with damage assessments and follow-on actions, like reporting to the DOJ and requesting an FBI investigation.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Media Leaks - Part I (repost)<br>FROM: SIGINT Communications<br>Run Date: 12/31/...
0.0

Black Budget entry on Computer Network Operations GENIE project

Document

Release Date: 2015-01-17 Document Date: 2012-02-18
This extract from the US Intelligence Community’s Congressional Budget Justification for the Fiscal Year 2013 (the “Black Budget”) provides the budget for GENIE the project “which underpins NSA/CSS’ Computer Network Operations (CNO) Endpoint capabilities conducted by the Tailored Access Operations (TAO) Group: see the Der Spiegel article The Digital Arms Race: NSA Preps America for […]
TOP SECRET//SI/TK//NOFORN (U) COMPUTER NETWORK OPERATIONS (U) GENIE This Exhibit is SECRET//NOFORN FY 20111 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 2013 Base...
0.0

Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints

Document

Release Date: 2015-07-01 Document Date: 2010-05-01
This 61-page NSA presentation from May 2010 provides analysts with a guide to tracking individuals within XKeyScore using the system’s fingerprint capability: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints May 2010 TOP SECRET //COMINT //REL TO USA, AUS, CAN, GBR, NZL ...
0.0

Profiling SSL and Attributing Private Networks

Document

Release Date: 2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL PROFILING SSL AND ATTRIBUTING PRIVATE NETWORKS An introduction to FLYING PIG and HUSH PUPPY ICTR - Network Exploitation GCHQ T R J...
0.0

Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations

Document

Release Date: 2015-04-02 Document Date: 2011-03-10
These extracts from a GCHQ paper dated 10 March 2011 provide an indication of the agency’s ongoing effects (misinformation) and “online HUMINT” operations: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.s
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations PhD Human Systems Group, Information Management ...
0.0

Introduction to XKS Application IDs and Fingerprints

Document

Release Date: 2015-07-01 Document Date: 2009-08-27
This 60-page NSA presentation from 27 August 2009 explains the use of different kinds of metadata tags in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Application IDs and Fingerprints 27 August 2009 .... ‘s 01 Ol A l • DERIVED FROM: NSA/CSSM...
0.0

Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations

Document

Release Date: 2015-06-22 Document Date: 2011-03-22
This 42-page report from 10 March 2011 provides an overview of GCHQ’s information operations unit and the behavioural science theories that underpin its activities: see the Intercept article Controversial GCHQ Unit is Deeply Engaged in Law Enforcement, 22 June 2015.
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations Mandeep K. Dhami, PhD Human Systems Group, Infor...
0.0

Black Budget – Human Language Technology Research

Document

Release Date: 2015-05-05 Document Date: 2013-01-01
This extract from the 2013 Intelligence Community Budget Justification (“the Black Budget”) outlines the budget for speech recognition technologies: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
TOP SECRET//SI/TK//NOFORN THIS PAGE INTENTIONALLY LEFT BLANK 360 TOP SECRET//SI/TK//NOFORN TOP SECRET//SI/TK//NOFORN (U) RESEARCH & TECHNOLOGY (U) HUMAN LANGUAGE TECHNOLOGY RESEARC...
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

Voice/Fax User Group Minutes of October 2008 meeting

Document

Release Date: 2018-01-19 Document Date: 2008-10-01
These GCHQ minutes from October 2008 describes how the agency and its partners can re-use voice recognition data in different situations: see the Intercept article Finding Your Voice, 19 January 2018.
TOP SECRET STRAP1 Speaker identification systems (SID^ Result: A couple of months ago we deployed a 5-way speaker id system against a network of high level individuals involved with the A...
0.0

Final Agenda SWEDUSA

Document

Release Date: 2013-12-11 Document Date: 2013-04-23
The agenda for the SWEDUSA 2013 Strategic Planning Conference on 24-26 April 2013, showing extensive discussion between the NSA and FRA at the most senior level: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
TOP SECRET//SI//NOFORN As of: 23 April//1000 Protocol Rep: Visit manager: Date/Time of Visit: (U) 24-26 April 2013 24 April 2013//0745-1600; 25 April 2013//0845-1545; 26 April...
0.0

Exhibit F

Document

Release Date: 2014-06-30 Document Date: 2010-07-16
This document lists the 193 governments, intragovernmental organisations and other entities which the NSA was granted the legal authority to intercept communications “about” for foreign intelligence purposes in August 2010: see the Washington Post article Court gave NSA broad leeway in surveillance, 30 June 2014.
TOP SECRET//NOFORN EXHIBIT F IN THE MATTER OF FOREIGN GOVERNMENTS, FOREIGN FACTIONS Ns?F^yyiG#i 11- ENTITIES, AND FOREIGN-BASED POLITICAL ORGANIZATIONS >■,, f;f |:VV DNI/AG 70...
Afghanistan (AFG/AF), Albania (ALB/AL), Algeria (DZA/DZ), Andorra (AND/AD), Angola (AGO/AO), Antigua and Barbuda (ATG/AG), Argentina (ARG/AR), Armenia (ARM/AM), Austria (AUT/AT), Azerbaijan (AZE/AZ), Bahamas (BHS/BS), Bangladesh (BGD/BD), Barbados (BRB/BB), Belarus (BLR/BY), Belgium (BEL/BE), Belize (BLZ/BZ), Benin (BEN/BJ), Bhutan (BTN/BT), Bolivia (BOL/BO), Bosnia and Herzegovina (BIH/BA), Botswana (BWA/BW), Brazil (BRA/BR), Bulgaria (BGR/BG), Burkina Faso (BFA/BF), Burundi (BDI/BI), Cambodia (KHM/KH), Cameroon (CMR/CM), Central African Republic (CAF/CF), Chad (TCD/TD), Chile (CHL/CL), China (CHN/CN), Colombia (COL/CO), Comoros (COM/KM), Congo (COD/CD), Costa Rica (CRI/CR), Croatia (HRV/HR), Cuba (CUB/CU), Cyprus (CYP/CY), Czech Republic (CZE/CZ), Denmark (DNK/DK), Djibouti (DJI/DJ), Dominica (DMA/DM), Dominican Republic (DOM/DO), Ecuador (ECU/EC), Egypt (EGY/EG), El Salvador (SLV/SV), Equatorial Guinea (GNQ/GQ), Eritrea (ERI/ER), Estonia (EST/EE), Ethiopia (ETH/ET), Fiji (FJI/FJ), Finland (FIN/FI), France (FRA/FR), Gabon (GAB/GA), Gambia (GMB/GM), Georgia (GEO/GE), Germany (DEU/DE), Ghana (GHA/GH), Greece (GRC/GR), Grenada (GRD/GD), Guatemala (GTM/GT), Guinea (GIN/GN), Guinea-Bissau (GNB/GW), Guyana (GUY/GY), Haiti (HTI/HT), Vatican (VAT/VA), Honduras (HND/HN), Hungary (HUN/HU), Iceland (ISL/IS), India (IND/IN), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Ireland (IRL/IE), Israel (ISR/IL), Italy (ITA/IT), Jamaica (JAM/JM), Japan (JPN/JP), Jordan (JOR/JO), Kazakhstan (KAZ/KZ), Kenya (KEN/KE), Kiribati (KIR/KI), Korea (KOR/KR), Kuwait (KWT/KW), Kyrgyzstan (KGZ/KG), Latvia (LVA/LV), Lebanon (LBN/LB), Lesotho (LSO/LS), Liberia (LBR/LR), Libya (LBY/LY), Liechtenstein (LIE/LI), Lithuania (LTU/LT), Luxembourg (LUX/LU), Macedonia (MKD/MK), Madagascar (MDG/MG), Malawi (MWI/MW), Malaysia (MYS/MY), Maldives (MDV/MV), Mali (MLI/ML), Malta (MLT/MT), Marshall Islands (MHL/MH), Mauritania (MRT/MR), Mauritius (MUS/MU), Mexico (MEX/MX), Micronesia (FSM/FM), Moldova (MDA/MD), Monaco (MCO/MC), Mongolia (MNG/MN), Montenegro (MNE/ME), Morocco (MAR/MA), Mozambique (MOZ/MZ), Myanmar (MMR/MM), Namibia (NAM/NA), Nauru (NRU/NR), Nepal (NPL/NP), Netherlands (NLD/NL), Nicaragua (NIC/NI), Niger (NER/NE), Nigeria (NGA/NG), Norway (NOR/NO), Oman (OMN/OM), Pakistan (PAK/PK), Palau (PLW/PW), Panama (PAN/PA), Papua New Guinea (PNG/PG), Paraguay (PRY/PY), Peru (PER/PE), Philippines (PHL/PH), Poland (POL/PL), Portugal (PRT/PT), Qatar (QAT/QA), Romania (ROU/RO), Russia (RUS/RU), Rwanda (RWA/RW), Saint Kitts and Nevis (KNA/KN), Saint Lucia (LCA/LC), Samoa (WSM/WS), San Marino (SMR/SM), Sao Tome and Principe (STP/ST), Senegal (SEN/SN), Serbia (SRB/RS), Seychelles (SYC/SC), Sierra Leone (SLE/SL), Singapore (SGP/SG), Slovakia (SVK/SK), Slovenia (SVN/SI), Somalia (SOM/SO), South Africa (ZAF/ZA), Spain (ESP/ES), Sri Lanka (LKA/LK), Sudan (SDN/SD), Suriname (SUR/SR), Swaziland (SWZ/SZ), Sweden (SWE/SE), Switzerland (CHE/CH), Taiwan (TWN/TW), Tajikistan (TJK/TJ), Tanzania (TZA/TZ), Thailand (THA/TH), Timor-Leste (TLS/TL), Togo (TGO/TG), Tonga (TON/TO), Tunisia (TUN/TN), Turkey (TUR/TR), Turkmenistan (TKM/TM), Tuvalu (TUV/TV), Uganda (UGA/UG), Ukraine (UKR/UA), United States (USA/US), Uruguay (URY/UY), Uzbekistan (UZB/UZ), Vanuatu (VUT/VU), Venezuela (VEN/VE), Vietnam (VNM/VN), Western Sahara (ESH/EH), Yemen (YEM/YE), Zambia (ZMB/ZM), Zimbabwe (ZWE/ZW)
0.0

JSA Restrictions

Document

Release Date: 2013-06-18
This undated article from GCHQ’s internal GCWIki gives technical details about the US-German Joint Sigint Activity group: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
TOP SECRET STRAP 1 COMINT JSA Restrictions Access Central: Targeting Tar g e tin g and selector □ AC Logo Red. png management are services that Access Central offers. This in...
0.0

NSA Intelligence Relationship with Germany – Bundesnachrichtendienst (BND)

Document

Release Date: 2014-06-18 Document Date: 2013-01-17
This internal NSA briefing dated 17 January 2013 describes the current state of the US-German intelligence relationship and mentions that “The BND has been working to influence the German Government to relax interpretation of the privacy laws over the long term to provide greater opportunity for intelligence sharing”: see the Der Spiegel article New NSA […]
TOP SECRET//S1//NOFORN National Security Agency/Central Security Service Information Paper 17 January 2013 Subject: (StfREL TO USA, FVEY} NS A Intelligence Relationship with Germany - B...
0.0

Media Leaks - Part 1

Document

Release Date: 2016-08-10 Document Date: 2003-07-28
NSA refers to media leaks as “cryptologic insecurities.” This article lists several examples from 2000-2002 (from CBS News, “New York Times Daily News,” the Washington Times, and WorldNetDaily) along with damage assessments and follow-on actions, like reporting to the DOJ and requesting an FBI investigation.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Media Leaks - Part 1<br>FROM: SIGINT Communications<br>Unknown<br>Run Date: 07/2...
0.0

Working at Prince Sultan Air Base, SA

Document

Release Date: 2016-08-10 Document Date: 2003-12-17
This intern was deployed to Prince Sultan Air Base in Saudi Arabia a year before the Iraq War. He describes his time as an analyst there, including the relative comfort of the base (“I’m embarrassed to say that it actually had a pool!”).
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Working at Prince Sultan Air Base, SA<br>FROM:<br>IA Intern<br>Run Date: 12/17/2...
0.0

DGO Enables Endpoint Implants via QUANTUMTHEORY

Document

Release Date: 2016-08-19 Document Date: 2011-09-26
This 26 September 2011 article from the NSA’s internal newsletter Special Source Operations News discusses the delivery of QUANTUMINSERT malware to a target in Pakistan: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
(TS//SI//NF) DGO Enables Endpoint Implants via QUANTUMTHEORY By [[REDACTED]] on 2011-09-26 1548 (TS//SI//NF) In another example of the emerging collaboration between the Endpoint and Midpoint ...
0.0

Voice/Fax User Group Minutes of March 2009 meeting

Document

Release Date: 2018-01-19 Document Date: 2009-04-21
These GCHQ minutes from March 2009 discuss the deployment of BROADOAK voice recognition systems in the Middle East against Saudi, Pakistani, Georgian, and Iraqi leaders, among others: see the Intercept article Finding Your Voice, 19 January 2018.
TOP SECRET STRAP1 21 April 2009 VOICE/FAX USER GROUP Minutes of March 2009 meeting 1. B14/MCS update (courtesy of MCS work this month has been almost entirely updates to existing model...
0.0

Draft NSA Inspector General’s report on STELLARWIND

Document

Release Date: 2014-03-12 Document Date: 2009-01-01
This draft report from 2009 sheds light on the legal reasoning behind the FISA Court’s 2007 Large Content order, which allowed warrantless wiretapping to continue: see the New York Times article How a Court Secretly Evolved, Extending U.S. Spies’ Reach, 12 March 2014.
TOP SECRET//STL W//COMINT/ORCON/NOFORN ST-09-0002 WORKING DRAFT OFFICE OF THE INSPECTOR GENERAL NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE 24 March 2009 (U) TABLE OF CONTENTS ...
0.0

NSA intelligence relationship with Norway

Document

Release Date: 2014-04-26 Document Date: 2013-04-17
An internal NSA Information Paper dated 17 April 2013 that describes the current state of the relationship between NSA and the Norwegian intelligence service: see the Dagbladet article, NIS aquires supercomputer, 26 April 2014.
TOP SECRET//COMINT//REL TO USA, NOR National Security Agency/Central 17 April 2013 Security Service Information Paper (S//REL TO USA, NOR) Subject: NSA Intelligence Relationship with No...
0.0

General Zahner's View from the Front

Document

Release Date: 2016-05-16 Document Date: 2003-06-09
Description of Brig. Gen. Zahner’s speech, which covered the role of intelligence in Operation Iraqi Freedom and the importance of taking risks.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) General Zahner's View from the Front<br>FROM: SID Communications<br>Unknown<br>R...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh