Filtered By
Canada (CAN/CA) X
Countries Mentioned [filter]
Results
53 Total
0.0

LEVIATHAN and the FFU Hypothesis

Document

Release Date: 2015-01-28 Document Date: 2012-01-01
This CSE (then CSEC) presentation from 2012 describes the Canadian agency’s file download monitoring operation: see the Intercept article Canada Casts Global Surveillance Dragnet Over File Downloads, 28 January 2015. cse-presentation-on-the-levitation-project
TOP SECRET//SI//REL CAN, AUS, GBR, NZL, USA LEVITATION and the FFU Hypothesis cse-cst.gc.ca TOP SECRET//SI//REL CAN, AUS, GBR, NZL, USA What is LEVITATION? A behaviour-based target...
0.0

DEFIANTWARRIOR and the NSA’s Use of Bots

Document

Release Date: 2015-01-17 Document Date: 2010-05-24
This 24 May 2010 NSA presentation describes the ways the agency uses botnets (“bot herding”): see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL USA, FVEY DEFIANTWARRIO R 7 / //and the ; NSA's Uè^ojÆotá/ Overall Classification: TOP SECRET//COMINT//REL FVEY Current As Of: 24 May 2010 Derived From: NSA/CSS...
0.0

TUTELAGE

Document

Release Date: 2015-01-17
This undated NSA presentation describes tecniques for repurposing third party attack tools: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT ■ Communications Security Establishment Canada Centre de la sécurité des télécommunications Canada CSEC SIGINT Cyber Discovery: Summary of the current effort ...
0.0

SNOWGLOBE: From Discovery to Attribution

Document

Release Date: 2015-01-17 Document Date: 2011-01-01
This 2011 CSEC presentation describes how the agency analysed SNOWGLOBE, which it considered “to be a state-sponsored CNO effort, put forth by a French intelligence agency”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Overall Classification: TOP SECRET II COMINT II REL TO CAN, AUS, GBR, NZL, USA ■ ■ Communications Security Establishment Canada SNOWGLOBE: From Discovery to Attribution CSEC CNT/Cyb...
0.0

To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; US SIGINT Provides Key Support

Document

Release Date: 2014-12-28 Document Date: 2009-06-12
This 12 June 2009 post from NSA’s internal SIDToday newsletter recounts a German/Afghan targeted operation and its support from the agency: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
SIDToday - To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; U.S. SIGINT Prov... DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS C...
0.0

TLS Trends: A roundtable discussion on current usage and future directions

Document

Release Date: 2014-12-28
This CSEC presentation from 2012 outlines the agency’s capabilities against SSL encryption at that point: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO CAN, AUS, GBR, NZL, USA rs TLS Trends: A roundtable discussion on current usage and future directions Communications Security Establishment Canada (CSEC) ...
0.0

Tier B allies

Document

Release Date: 2014-05-13
This undated internal NSA document illustrates the degrees of cooperation in the agency’s relationships with different foreign powers. “Tier A” and “Tier B” are elsewhere referred to as Second and Third Parties: see the book No Place To Hide, 13 May 2014.
Page 123 CONFIDENT1AL//NOFORN//20291123 TIER A Comprehensive Cooperation Australia Canada New Zealand United Kingdom TIERB Focused Cooperation Austria Belgium Czech Republic Denmark G...
0.0

Procedures for the dissemination by NSA to foreign governments of information from FISA electronic surveillance or physical search carried out by the FBI

Document

Release Date: 2014-03-12 Document Date: 2002-08-20
This 20 August 2002 memo from US Attorney General John Ashcroft refers to the “modified minimization procedures” now in operation following the FISA Court’s “Raw Take” order of 22 July 2002 and expands on that order by allowing the sharing of information with foreign governments without the need for authorisation to be sought: see the […]
SECRET//X1 This document found at: I:\J3\J34\FISA\fbi.doc I:\J3\NDD\FISA\ fbi.doc Office of the Attorney CjeneraC 'Washington, <D.C- 20530 PROCEDURES FOR THE DISSEMINATION BY NS A T...
0.0

IP Profiling Analytics & Mission Impacts

Document

Release Date: 2014-01-30 Document Date: 2012-05-10
This CSEC presentation dated 10 May 2012 describes the agency’s techniques for tracking a single IP address and details an experiment carried out at a Canadian airport with the help of an unspecified special source provider: see the CBC article, CSEC used airport Wi-Fi to track Canadian travellers: Edward Snowden documents, 30 January 2014. Download […]
TOP SECRET ■ ■ Communications Security Establishment Canada IP Profiling Analytics & Mission Impacts Tradecraft Developer CSEC - Network Analysis Centre May 10, 2012 SIGINT ...
0.0

Conference on Organized Crime Held This Week

Document

Release Date: 2016-05-16 Document Date: 2003-05-23
Recap of a conference on cross-border criminal activities, including trafficking in drugs, people, and weapons, as well as money laundering. Experts from academia, intelligence, and law enforcement communities provided briefings.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Conference on Organized Crime Held This Week<br>FROM:<br>SINIO for Interna...
0.0

2003 CSE/NSA SIGINT Bilateral

Document

Release Date: 2016-08-10 Document Date: 2003-11-12
Canada’s Communications Security Establishment hosted an annual SIGINT bilateral, including discussions on support to military operations in Afghanistan, homeland security issues, and counterterrorism in Southeast Asia.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) 2003 CSE/NSA SIGINT Bilateral<br>FROM:<br>Deputy SUSLO in Ottawa<br>Run Da...
0.0

Conference Eyes Data Flow Among Second Parties

Document

Release Date: 2017-04-24 Document Date: 2004-11-16
The Five Eyes partners held a conference to discuss the standardization of data formats to ease the exchange of voice, text, fax, and digital network intelligence.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Conference Eyes Data Flow Among Second Parties<br>FROM: <br>Chief, Data Flow an...
0.0

CSEC Cyber Threat Capabilities

Document

Release Date: 2015-03-23 Document Date: 2011-01-01
This CSE presentation from 2011 describes some of the cyber warfare tools at the agency’s disposal: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.
■ ^ ■ Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY Establishment Canada des télécommunications Canada CSEC Cyber Threat Capabilities SIGINT and ITS: an en...
0.0

INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers

Document

Release Date: 2015-02-04 Document Date: 2010-05-06
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET a/ SI / TK // REL TO USA AUS CAN GBR NZL SID Today archi“s reedback iBi ■ ■ ■ Welcome! Saturday, 10 Nov 2012 1 1 B ...
0.0

LANDMARK

Document

Release Date: 2014-08-15
Undated CSEC slides describe LANDMARK, a tool which is used to expand the Five Eyes’ network of Operational Relay Boxes (ORBs) and other compromised machines located outside of Five Eyes territory. Another tool, OLYMPIA, automates the process of pursuing leads identified using the HACIENDA post scanning tool: see the Heise article The HACIENDA Program for […]
Abbildung17-4271ef23aec87e86.png: TOP SECRET//COMINT ■ ju ■ Communications Security Centre de la sécurité ■ “ ■ Establishment des télécommunications Presentation Outline * LANDMARK - au...
0.0

NSA Intelligence Relationship with Canada’s Communications Security Establishment Canada (CSEC)

Document

Release Date: 2014-05-13 Document Date: 2013-04-03
This largely redacted information paper from NSA’s Central Security Service dated 3 April 2013 details the current state of the agency’s cooperative relationship with its Canadian counterpart: see the book No Place To Hide, 13 May 2014.
TOP SECRET//SI//REL USA, FVEY National Security Agency/ 3 April 2013 Central Security Service Information Paper Subject: (U//FOUO) NSA Intelligence Relationship with Canada’s Commun...
0.0

US-Israeli Memorandum of Understanding

Document

Release Date: 2013-09-11 Document Date: 2009-01-01
A Memorandum of Understanding (MOU) between the NSA and the Israeli SIGINT National Unit that allows the NSA to share “raw SIGINT data” with Israel. The agreement was reached in March 2009, although the MOU itself is undated: see the Guardian article NSA shares raw intelligence including Americans’ data with Israel, 11 September 2013.
iur i3jdi,i\jd 1//LUIV111N iu um, ioin (TS//SI//REL) MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) AND THE ISRAELI SIGINT N...
0.0

CATAPULT: A Bilateral Data Port

Document

Release Date: 2016-05-16 Document Date: 2003-05-08
This describes CATAPULT, a prototype of a data portal for sharing SIGINT product between NSA and second-party partners, based on a Canadian project that uses an XML-based standard format.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(C//SI) CATAPULT: A Bilateral Data Port<br>FROM:<br>Deputy Chief, Customer Relations...
0.0

Communications Security Establishment (CSE) - Our Good Neighbor to the North

Document

Release Date: 2016-08-10 Document Date: 2003-08-07
Communications Security Establishment, the Canadian spy agency, shares a history with NSA dating back to World War II. The article explains what CSE (now CSEC) brings to the SIGINT partnership, including unique access because of Canada’s geography and technical niches.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Communications Security Establishment (CSE) - Our Good<br>Neighbor to the North<...
0.0

NSA Hosts Conference on Support to Law Enforcement

Document

Release Date: 2017-04-24 Document Date: 2004-11-08
NSA hosted a conference on cryptanalytic support to law enforcement for partners from all Five Eyes countries, including representatives from general counsel, policy, cryptanalytic offices, and representatives of FBI, Royal Canadian Mounted Police, and the UK's National Technical Assistance Center.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(C) NSA Hosts Conference on Support to Law Enforcement<br>FROM:<br>Exploitation Ope...
0.0

CASCADE – Joint Cyber Sensor Architecture

Document

Release Date: 2015-03-23 Document Date: 2011-01-01
This CSEC presentation from 2011 communicates Canada’s current and future cyberwar plans to their Five Eyes partners: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.
CLASSIFICATION: CLASSIFICATION: TOP SECRET // COMINT // REL FVEY Project Overview Current Status Proposed Architecture Towards 2015 CLASSIFICATION: TOP SECRET // COMINT // REL FYEY ...
0.0

Second Party National Identity Rules, continued

Document

Release Date: 2015-03-08 Document Date: 2012-01-01
This extract from a 2012 NSA document detailing how different Five Eyes countries define their own nationals shows that the GCSB allowed itself the right to surveil the governments of the Cook Islands and Nuie “but not their citizens”: see the Sunday Star Times article Snowden files: Inside Waihopai’s domes, 8 March 2015.
SECRET//COMINT//REL TO USA, FVEY (U) Second Party National Identity Rules, Continued Section B.4. - (U) New Zealand: Government Communications Security Bureau (GCSB) B.4.1. (U) Governmen...
0.0

CSEC ITS/2NE Cyber Threat Discovery

Document

Release Date: 2015-02-25 Document Date: 2010-01-01
This 2010 CSEC document complete with speakers’ notes shows that visits to Canadian government websites were monitored, and hundreds of thousands of emails to government email addresses retained every day, for cybersecurity purposes: see the CBC News article CSE monitors millions of Canadian emails to government, 25 February 2015.
TOP SECRET 1^1 Communications Security Centre de la sécurité Establishment Canada des télécommunications Canada CSEC ITS/N2E Cyber Threat Discovery I DISCOCON 2010 m/4 ...
0.0

DAPINO GAMMA Target Personalisation Centres

Document

Release Date: 2015-02-19 Document Date: 2011-01-01
This 2011 Wiki page details aspects of GCHQ’s DAPINO GAMMA operation against mobile SIM manufacturer Gemalto: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
[edit] Target Personalisation centres ( non 5 eyes): [edit] France • La Ciotat • Meudon - On outskirts of Paris • PontAudemer [edit] Poland Tczew [edit] Czech Republic [edit]...
0.0

Pay attention to that man behind the curtain: Discovering aliens on CNE infrastructure

Document

Release Date: 2015-01-17 Document Date: 2010-06-01
This June 2010 CSEC presentation for the CSEC conference outlines counter-computer network exploitation (CCNE) techniques: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT Pay attention to that man behind the curtain: Discovering aliens on CNE infrastructure CSEC Counter-CNE Target Analytics thread SIGDEV Conference NSA-June 201...
0.0

National Information Assurance Research Laboratory (NIARL) Newsletter – September 2008

Document

Release Date: 2014-12-28 Document Date: 2008-09-01
This September 2008 newsletter from the National Information Assurance Research Laboratory (NIARL), an unit within the NSA’s Research Directorate gives an indication of the agency’s progress with cryptanalysis – which, with “only a handful of in-house techniques” – appears to be modest: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet […]
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 September 2008 Edition ■ (U) Message from the NIARL Director: (U//FOUO) Welcome to the September 2008 edition of the National ...
0.0

Cable Master List

Document

Release Date: 2014-11-25 Document Date: 2009-07-27
These July 2009 documents provide a full list of the fibre-optic cables GCHQ had access to at that point, including details of location, bandwidth and corporate partners: see the Süddeutsche Zeitung article Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts, 25 November 2014. […]
partner_cables.pdf:  Partner Cable UK? REMEDY GERONTIC DACRON LITTLE PINNAGE STREET CAR VITREOUS Apolo UK IRU/LC DCO IRU/LC IRU/LC IRU/LC CANTAT 3 UK DCO IRU/LC Concerto UK D...
0.0

Third Party Partners

Document

Release Date: 2013-12-08
This short excerpt from an NSA document shows that nine European States – Belgium, Denmark, France, Germany, Italy, The Netherlands, Norway, Spain and Sweden – have a second-tier ‘third party’ relationship with the agency: see the SVT article NSA “asking for” specific exchanges from FRA – Secret treaty since 1954, 8 December 2013.
* (S//SI. REU) SSEU’R. members are the Five Eyes nations (Australia, Canada. New Zealand, United Kingdom and United States] and the following Tliird Party partners: Belgium, Denmark, France, Germ...
0.0

NSA lends support to upcoming G8 and G20 meetings in Canada

Document

Release Date: 2013-11-28 Document Date: 2010-06-23
This briefing from 23 June 2010 describes the NSA’s plans for the G8 and G20 summits in Toronto and the extent of Canadian cooperation. Note that redactions have been made to this document that were not present in a version broadcast on television: see the CBC News article New Snowden docs show U.S. spied during […]
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Web search Agenev-all Emails SID-all Emails NSA Rolodex SIDtodav Blog SIDtoda...
0.0

ConSIDer This: The ABC's of Second Party Liaison

Document

Release Date: 2016-05-16 Document Date: 2003-08-13
Special U.S. Liaison Offices are representatives to the second-party countries (the U.K., Canada, Australia, and New Zealand) for cryptologic collaboration. The Foreign Affairs Directorate has officers overseeing second-party matters at Fort Meade, and each second party maintains a senior liaison at NSA.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) ConSIDer This: The ABC's of Second Party Liaison<br>FROM: SIGINT Communica...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh