Filtered By
Canada (CAN/CA)X
Countries Mentioned [filter]
Results
38 Total
1.0

Collection, Processing and Dissemination of Allied Communications

Document

Document Date: 2005-01-01Release Date: 2013-11-20
Extracts from a 2005 draft directive from the NSA’s director of signals intelligence reveal that, contrary to the “common understanding” that the a no-spying agreement existed between members of the ‘Five Eyes’ intelligence alliance (comprising the UK, US, Canada, Australia and New Zealand), the NSA reserved the right to target allies unilaterally in certain circumstances: […]
2005ukusa1.jpg: a) (S//SI//NF) Under the British-U.S. Communications Intelli- gence Agreement of 5 March 1946 (commonly known as the United Kingdom/United States of America (UKUSA) Agreement), ...
1.0

Tier B allies

Document

Release Date: 2014-05-13
This undated internal NSA document illustrates the degrees of cooperation in the agency’s relationships with different foreign powers. “Tier A” and “Tier B” are elsewhere referred to as Second and Third Parties: see the book No Place To Hide, 13 May 2014.
Page 123 CONFIDENT1AL//NOFORN//20291123 TIER A Comprehensive Cooperation Australia Canada New Zealand United Kingdom TIERB Focused Cooperation Austria Belgium Czech Republic Denmark G...
1.0

TLS Trends: A roundtable discussion on current usage and future directions

Document

Release Date: 2014-12-28
This CSEC presentation from 2012 outlines the agency’s capabilities against SSL encryption at that point: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO CAN, AUS, GBR, NZL, USA rs TLS Trends: A roundtable discussion on current usage and future directions Communications Security Establishment Canada (CSEC) ...
1.0

Pay attention to that man behind the curtain: Discovering aliens on CNE infrastructure

Document

Document Date: 2010-06-01Release Date: 2015-01-17
This June 2010 CSEC presentation for the CSEC conference outlines counter-computer network exploitation (CCNE) techniques: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT Pay attention to that man behind the curtain: Discovering aliens on CNE infrastructure CSEC Counter-CNE Target Analytics thread SIGDEV Conference NSA-June 201...
1.0

INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers

Document

Document Date: 2010-05-06Release Date: 2015-02-04
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET a/ SI / TK // REL TO USA AUS CAN GBR NZL SID Today archi“s reedback iBi ■ ■ ■ Welcome! Saturday, 10 Nov 2012 1 1 B ...
1.0

NSA Team Selected for Olympics Support

Document

Document Date: 2003-12-15Release Date: 2015-09-29
This 15 December 2003 post from the internal NSA newsletter SIDToday discusses plans for the agency’s operations at the Athens Olympics the following year: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
id-488-redacted-formatted-p1-normal.gif: DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) NSA Team Selected for Olympics Suppo...
1.0

ConSIDer This: The ABC's of Second Party Liaison

Document

Document Date: 2003-08-13Release Date: 2016-05-16
Special U.S. Liaison Offices are representatives to the second-party countries (the U.K., Canada, Australia, and New Zealand) for cryptologic collaboration. The Foreign Affairs Directorate has officers overseeing second-party matters at Fort Meade, and each second party maintains a senior liaison at NSA.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) ConSIDer This: The ABC's of Second Party Liaison<br>FROM: SIGINT Communica...
1.0

CATAPULT: A Bilateral Data Port

Document

Document Date: 2003-05-08Release Date: 2016-05-16
This describes CATAPULT, a prototype of a data portal for sharing SIGINT product between NSA and second-party partners, based on a Canadian project that uses an XML-based standard format.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(C//SI) CATAPULT: A Bilateral Data Port<br>FROM:<br>Deputy Chief, Customer Relations...
1.0

IP Profiling Analytics & Mission Impacts

Document

Document Date: 2012-05-10Release Date: 2014-01-30
This CSEC presentation dated 10 May 2012 describes the agency’s techniques for tracking a single IP address and details an experiment carried out at a Canadian airport with the help of an unspecified special source provider: see the CBC article, CSEC used airport Wi-Fi to track Canadian travellers: Edward Snowden documents, 30 January 2014. Download […]
TOP SECRET ■ ■ Communications Security Establishment Canada IP Profiling Analytics & Mission Impacts Tradecraft Developer CSEC - Network Analysis Centre May 10, 2012 SIGINT ...
1.0

LANDMARK

Document

Release Date: 2014-08-15
Undated CSEC slides describe LANDMARK, a tool which is used to expand the Five Eyes’ network of Operational Relay Boxes (ORBs) and other compromised machines located outside of Five Eyes territory. Another tool, OLYMPIA, automates the process of pursuing leads identified using the HACIENDA post scanning tool: see the Heise article The HACIENDA Program for […]
Abbildung17-4271ef23aec87e86.png: TOP SECRET//COMINT ■ ju ■ Communications Security Centre de la sécurité ■ “ ■ Establishment des télécommunications Presentation Outline * LANDMARK - au...
1.0

DAPINO GAMMA Target Personalisation Centres

Document

Document Date: 2011-01-01Release Date: 2015-02-19
This 2011 Wiki page details aspects of GCHQ’s DAPINO GAMMA operation against mobile SIM manufacturer Gemalto: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
[edit] Target Personalisation centres ( non 5 eyes): [edit] France • La Ciotat • Meudon - On outskirts of Paris • PontAudemer [edit] Poland Tczew [edit] Czech Republic [edit]...
1.0

NSA Intelligence Relationship with New Zealand

Document

Document Date: 2013-04-01Release Date: 2015-03-10
This NSA information paper from April 2013 describes the state of the agency’s intelligence relationship with its New Zealand counterpart: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY National Security Agency April 2013 Central Security Service Information Paper (U) Subject: NSA Intelligence Relationship with New Zealand (U) Execu...
1.0

US-Israeli Memorandum of Understanding

Document

Document Date: 2009-01-01Release Date: 2013-09-11
A Memorandum of Understanding (MOU) between the NSA and the Israeli SIGINT National Unit that allows the NSA to share “raw SIGINT data” with Israel. The agreement was reached in March 2009, although the MOU itself is undated: see the Guardian article NSA shares raw intelligence including Americans’ data with Israel, 11 September 2013.
iur i3jdi,i\jd 1//LUIV111N iu um, ioin (TS//SI//REL) MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) AND THE ISRAELI SIGINT N...
1.0

NSA Intelligence Relationship with Canada’s Communications Security Establishment Canada (CSEC)

Document

Document Date: 2013-04-03Release Date: 2014-05-13
This largely redacted information paper from NSA’s Central Security Service dated 3 April 2013 details the current state of the agency’s cooperative relationship with its Canadian counterpart: see the book No Place To Hide, 13 May 2014.
TOP SECRET//SI//REL USA, FVEY National Security Agency/ 3 April 2013 Central Security Service Information Paper Subject: (U//FOUO) NSA Intelligence Relationship with Canada’s Commun...
1.0

FY2013 Foreign Partner Review

Document

Document Date: 2013-01-01Release Date: 2014-05-13
This slide, taken from the NSA’s annual review of its cooperation with foreign partners, shows an expansion in the agency’s international relationships: see the book No Place To Hide, 13 May 2014.
Page 123 TOP SECRET// COMINT //REL USA, AUS, CAN, GBR, NZL Approved SIGINT Partners ^ORTUtt^ Second Parties Third Parties Australia Algeria Israel Spain Canada Austria Italy Sweden...
1.0

FY2012 Foreign Partner Review

Document

Document Date: 2012-01-01Release Date: 2014-05-13
This slide, taken from the NSA’s annual report on the state of its cooperation with foreign powers, details the countries that have received payments from the agency: see the book No Place To Hide, 13 May 2014.
Page 124 <AD FY12 CCP Funding of Partner In Thousands of USD 3000 TOP SECRET//COMINT//NOFORN
1.0

NSA Intelligence Relationship with Germany – Bundesnachrichtendienst (BND)

Document

Document Date: 2013-01-17Release Date: 2014-06-18
This internal NSA briefing dated 17 January 2013 describes the current state of the US-German intelligence relationship and mentions that “The BND has been working to influence the German Government to relax interpretation of the privacy laws over the long term to provide greater opportunity for intelligence sharing”: see the Der Spiegel article New NSA […]
TOP SECRET//S1//NOFORN National Security Agency/Central Security Service Information Paper 17 January 2013 Subject: (StfREL TO USA, FVEY} NS A Intelligence Relationship with Germany - B...
1.0

Supporting HMG’s Climate Change Ambitions (… or, “A GCO’s tales from Cancun”)

Document

Document Date: 2011-02-01Release Date: 2014-11-01
This joint GCHQ/MI6 presentation from February 2011 documents the process of international climate change negotiations becoming a “serious intelligence priority” for the UK: see the Dagbladet Information article Snowden documents reveal British climate espionage – Copenhagen climate summit targeted, 1 November 2014.  
GCHQ SECRET INTELLIGENCE SERVICE Supporting HMG’s Climate Change Ambitions (...or, “A GCO’s tales from Cancún”) 27 November - 10 December 2010 GCHQ SECRET INTELLI...
1.0

Network Tradecraft Advancement Team

Document

Document Date: 2010-06-10Release Date: 2014-12-04
This GCHQ document from June 2010 describes cooperation between members of the Five Eyes alliance, particularly Canada’s CSEC, on the technical analysis of international mobile phone networks: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
Network Tradecraft Advancement Team (NTAT) 3G > 2nd SCAMP at CSEC process ■ Worked with CSEC H3 developers to implement IRASCIABLE RABBIT into OLYMPIA ■ Developed 41 use cases ■ Devel...
1.0

National Information Assurance Research Laboratory (NIARL) Newsletter – September 2008

Document

Document Date: 2008-09-01Release Date: 2014-12-28
This September 2008 newsletter from the National Information Assurance Research Laboratory (NIARL), an unit within the NSA’s Research Directorate gives an indication of the agency’s progress with cryptanalysis – which, with “only a handful of in-house techniques” – appears to be modest: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet […]
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 September 2008 Edition ■ (U) Message from the NIARL Director: (U//FOUO) Welcome to the September 2008 edition of the National ...
1.0

To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; US SIGINT Provides Key Support

Document

Document Date: 2009-06-12Release Date: 2014-12-28
This 12 June 2009 post from NSA’s internal SIDToday newsletter recounts a German/Afghan targeted operation and its support from the agency: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
SIDToday - To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; U.S. SIGINT Prov... DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS C...
1.0

LEVIATHAN and the FFU Hypothesis

Document

Document Date: 2012-01-01Release Date: 2015-01-28
This CSE (then CSEC) presentation from 2012 describes the Canadian agency’s file download monitoring operation: see the Intercept article Canada Casts Global Surveillance Dragnet Over File Downloads, 28 January 2015. cse-presentation-on-the-levitation-project
TOP SECRET//SI//REL CAN, AUS, GBR, NZL, USA LEVITATION and the FFU Hypothesis cse-cst.gc.ca TOP SECRET//SI//REL CAN, AUS, GBR, NZL, USA What is LEVITATION? A behaviour-based target...
1.0

SNOWGLOBE: From Discovery to Attribution

Document

Document Date: 2011-01-01Release Date: 2015-01-17
This 2011 CSEC presentation describes how the agency analysed SNOWGLOBE, which it considered “to be a state-sponsored CNO effort, put forth by a French intelligence agency”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Overall Classification: TOP SECRET II COMINT II REL TO CAN, AUS, GBR, NZL, USA ■ ■ Communications Security Establishment Canada SNOWGLOBE: From Discovery to Attribution CSEC CNT/Cyb...
1.0

Operational Legalities

Document

Release Date: 2015-06-22
This 78-page GCHQ presentation, repeated with speaking notes, provides a full overview of the legal and oversight framework governing the agency’s activities: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015. operational-legalities-gchq-nov-28-2008
Operational Legalities Not for display • Beware: there are several hidden slides in this presentation. If you see this you will also see the other hidden ones. • To find which are hidde...
1.0

Third Party Partners

Document

Release Date: 2013-12-08
This short excerpt from an NSA document shows that nine European States – Belgium, Denmark, France, Germany, Italy, The Netherlands, Norway, Spain and Sweden – have a second-tier ‘third party’ relationship with the agency: see the SVT article NSA “asking for” specific exchanges from FRA – Secret treaty since 1954, 8 December 2013.
* (S//SI. REU) SSEU’R. members are the Five Eyes nations (Australia, Canada. New Zealand, United Kingdom and United States] and the following Tliird Party partners: Belgium, Denmark, France, Germ...
1.0

Procedures for the dissemination by NSA to foreign governments of information from FISA electronic surveillance or physical search carried out by the FBI

Document

Document Date: 2002-08-20Release Date: 2014-03-12
This 20 August 2002 memo from US Attorney General John Ashcroft refers to the “modified minimization procedures” now in operation following the FISA Court’s “Raw Take” order of 22 July 2002 and expands on that order by allowing the sharing of information with foreign governments without the need for authorisation to be sought: see the […]
SECRET//X1 This document found at: I:\J3\J34\FISA\fbi.doc I:\J3\NDD\FISA\ fbi.doc Office of the Attorney CjeneraC 'Washington, <D.C- 20530 PROCEDURES FOR THE DISSEMINATION BY NS A T...
1.0

Cable Master List

Document

Document Date: 2009-07-27Release Date: 2014-11-25
These July 2009 documents provide a full list of the fibre-optic cables GCHQ had access to at that point, including details of location, bandwidth and corporate partners: see the Süddeutsche Zeitung article Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts, 25 November 2014. […]
partner_cables.pdf:  Partner Cable UK? REMEDY GERONTIC DACRON LITTLE PINNAGE STREET CAR VITREOUS Apolo UK IRU/LC DCO IRU/LC IRU/LC IRU/LC CANTAT 3 UK DCO IRU/LC Concerto UK D...
1.0

TUTELAGE

Document

Release Date: 2015-01-17
This undated NSA presentation describes tecniques for repurposing third party attack tools: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT ■ Communications Security Establishment Canada Centre de la sécurité des télécommunications Canada CSEC SIGINT Cyber Discovery: Summary of the current effort ...
1.0

CASCADE – Joint Cyber Sensor Architecture

Document

Document Date: 2011-01-01Release Date: 2015-03-23
This CSEC presentation from 2011 communicates Canada’s current and future cyberwar plans to their Five Eyes partners: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.
CLASSIFICATION: CLASSIFICATION: TOP SECRET // COMINT // REL FVEY Project Overview Current Status Proposed Architecture Towards 2015 CLASSIFICATION: TOP SECRET // COMINT // REL FYEY ...
1.0

CSEC ITS/2NE Cyber Threat Discovery

Document

Document Date: 2010-01-01Release Date: 2015-02-25
This 2010 CSEC document complete with speakers’ notes shows that visits to Canadian government websites were monitored, and hundreds of thousands of emails to government email addresses retained every day, for cybersecurity purposes: see the CBC News article CSE monitors millions of Canadian emails to government, 25 February 2015.
TOP SECRET 1^1 Communications Security Centre de la sécurité Establishment Canada des télécommunications Canada CSEC ITS/N2E Cyber Threat Discovery I DISCOCON 2010 m/4 ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh