Filtered By
China (CHN/CN) X
Countries Mentioned [filter]
Results
129 Total
0.0

HIMR Data Mining Research Problem Book

Document

Release Date: 2016-02-02 Document Date: 2011-09-20
This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The […]
UK TOP SECRET STRAP1 COMINT AUS/CAN/NZ/UK/US EYES ONLY Reference: OPC-M/TECH.A/455 (v1.0, r206) Date: 20 September 2011 Copy no: HIMR Data Mining Research Problem Book OPC-MCR, G...
0.0

Assessment of Intelligence Opportunity – Juniper

Document

Release Date: 2015-12-23 Document Date: 2011-02-03
This GCHQ report dated 3 February 2011 and written by a seconded NSA staff member, alludes to the agencies’ capabilities against 13 models of firewalls produced by Juniper Networks, Inc: see the Intercept article NSA Helped British Spies Find Security Holes In Juniper Firewalls, 23 December 2015.
TOP SECRET STRAP1 ASSESSMENT OF INTELLIGENCE OPPORTUNITY - JUNIPER 03 February 2011 Executive Summary Background • Juniper Networks, Inc. headquartered in Sunnyvale, California, USA is...
0.0

DEFIANTWARRIOR and the NSA’s Use of Bots

Document

Release Date: 2015-01-17 Document Date: 2010-05-24
This 24 May 2010 NSA presentation describes the ways the agency uses botnets (“bot herding”): see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL USA, FVEY DEFIANTWARRIO R 7 / //and the ; NSA's Uè^ojÆotá/ Overall Classification: TOP SECRET//COMINT//REL FVEY Current As Of: 24 May 2010 Derived From: NSA/CSS...
0.0

Chinese Exfiltrate Sensitive Military Technology

Document

Release Date: 2015-01-17
These three undated NSA slides describe alleged Chinese cyberattacks against US military targets, codenamed BYZANTINE HADES: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
(U) Acquired radar design - (U) Numbers and types of modules (U) Detailed engine schematics (U) Methods for cooling gases (U) Leading and trailing edge treatments (U) Aft deck he...
0.0

BYZANTINE HADES: An Evolution of Collection

Document

Release Date: 2015-01-17 Document Date: 2010-06-01
This June 2010 NSA presentation for the SIGDEV conference describes efforts to trace a suspected Chinese cyber attack: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (S//REL)BYZANTINE HADES: An Evolution of Collection NTOC, V225 SIGINT Development Conference June 2010 TOP SECRET//COMINT//REL TO...
0.0

NATO Civilian Intelligence Council – Cyber Panel – Talking Points

Document

Release Date: 2015-02-04 Document Date: 2011-09-14
This US National Intelligence Council memo dated 14 September 2011 provides US talking points for a forthcoming NATO meeting and includes the assessment that the threat presented by Anonymous and hacktivist activity is “minimal”: see the Intercept article Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise, 4 February 2015.
SECRET//REL TO USA, NATO NIM/Cyber 14 September 2011 Talking Points Subject: (S//REL NATO) NATO Civilian Intelligence Council—Cyber Panel National Input A. Threat Overview (U) (U...
0.0

Coming Soon! A Tool that Enables Non-Linguists to Analyse Foreign-TV News Programs

Document

Release Date: 2015-05-05 Document Date: 2008-10-23
This October 2008 article from an NSA internal newsletter SIDToday Enhanced Video Text and Audio Processing (eViTAP), a tool that provides automatic translations of news broadcasts in English, Russian, Spanish, Arabic, Mandarin and Farsi: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015. sidtoday-non-linguists-final
(U//FOUO) Coming Soon! A Tool that Enables Non-Linguists to Analyze Foreign-TV News ______________________ Programs FROM: Center for Time-Sensitive Information (S2413) Run Date: 10/23/20...
0.0

GCSB has identified an MFA data link

Document

Release Date: 2015-04-19 Document Date: 2013-04-01
This short extract from an April 2013 NSA document describes a “verbal agreement” between GCSB and NSA to proceed with the FROSTBITE / BASILHAYDEN project to infiltrate a Chinese diplomatic data link: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
(TS//SI//NF) New Zealand: GCSB has identified an MFA data link between the Chinese Consulate and Chinese Visa Office in Auckland. NSA and GCSB have verbally agreed to move forward with a coopera...
0.0

SUSLOW monthly report for March 2013

Document

Release Date: 2015-04-19 Document Date: 2013-03-01
This monthly report from the NSA’s Special US Liaison Officer in Wellington outlines progress on FROSTBITE (BASILHAYDEN) – a project to infiltrate the Chinese diplomatic computer network: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
| TOP SECRET//SI//REL TO USA, FVEY (U//FOUO) SUSLOW Monthly Report for March 2013 (U) March highlights: (U) Intelligence update: o (S//SI//REL TO USA, FVEY) GCSB project FROSTBITE / TA...
0.0

NSA Activities in Progress 2013

Document

Release Date: 2015-03-05 Document Date: 2013-01-01
This single redacted slide from a 2013 NSA presentation confirms that New Zealand participates in Five Eyes cable access operations and reports the existence of a joint plan to infiltrate a Chinese diplomatic data connection: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 March […]
Snowden3.png: Key Activities In Progress: Access New Zealand: Joint effort to exploit Chinese MFA link. New Zealand: Partner cable access program achieves Phase 1. TOP SECRET//COMINT//NO...
0.0

Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities

Document

Release Date: 2013-12-09 Document Date: 2007-01-01
A 2007 proposal to the NSA from contractor SAIC, promoting the company’s ability to support “intelligence collection in the games space”: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 December 2013.
Games: A Look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities Table of Contents FORWARD......................................................................4 ...
0.0

Apportionment of Strategic Efforts -- Our Plan of Attack

Document

Release Date: 2018-03-01 Document Date: 2006-02-15
U.S. Signals Intelligence System resources are allocated in the following areas: 35 percent are dedicated to the global war on terrorism; 35 percent are dedicated to China, North Korea, Iran, and Russia; 20 percent go to remaining strategic focus areas; and 10 percent are set aside for development in data acquisition, signals development, or analysis and production.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) Apportionment of Strategic Efforts -- Our Plan of Attack FROM: SIGINT Communication...
0.0

Classification Guide for SIGINT Material Dating from 16 August 1945 – 31 December 1967

Document

Release Date: 2014-06-18 Document Date: 2011-11-21
This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
TOP SECRET//SjyTK//NOFÜRN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR SIGINT Material Dating from 16 August 1945 *31 December 1967 Effects Dale: 21 De...
0.0

SIGINT Monitors Global Spread of Avian Flu

Document

Release Date: 2016-12-07 Document Date: 2005-10-28
NSA closely monitored the 2004 spread of avian influenza in preparation for a possible pandemic. "As our IC colleagues have said, containing the threat of infectious disease comes down to 'detection, detection, detection. SIGINT is probably going to get it first,'" the author writes.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) SIGINT Monitors Global Spread of Avian Flu<br>FROM:<br>Assistant SINIO for ...
0.0

CNO Core Secrets

Document

Release Date: 2014-10-10
This undated selection of seven NSA slides highlights the activities the agency regards as its “core secrets”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN NSA/CSS and JFCC-NW National Initiative Task - Security Framework SAP Authority NSA/CSS/JFCC-NW SAPS DNI CNE DoD CND CNA wm Information Released to...
0.0

Exceptionally Controlled Information (ECI) Compartments January 2013

Document

Release Date: 2014-10-10 Document Date: 2013-01-01
This NSA document from January 2013 lists the codenames of those agency activities sufficiently sensitive to qualify as “exceptionally controlled information”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.ah
CONFIDENTIAL//REL TO USA, AUS, CAN, GBR, NZL (U) Exceptionally Controlled Information (ECI) Compartments January 2013 ECI Name and Trigraph Organization Control Authority AMBULANT AMB...
0.0

About the Virtual Private Network SIGDev Working Group...

Document

Release Date: 2017-09-13 Document Date: 2005-05-12
A brief description of a working group focused on monitoring and helping to exploit virtual private networks, or VPNs. Established in 2004, the working group publishes regular "VPN Target Activity Reports" on dozens of countries and organizations around the world. "These reports may help you exploit targets' VPNs more successfully," the chair of the working group writes.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (TS//SI) About the Virtual Private Network SIGDev Working Group... FROM: Chair NSA VPN WG, Ad...
0.0

Global Capabilities Manager: What the New Position Entails

Document

Release Date: 2018-03-01 Document Date: 2005-08-08
A recent restructuring created the new position title of Global Capabilities Manager. The GCM for Combating Proliferation explains his role: developing overarching global strategies and assessing the NSA’s capability to address this area rather than focus on daily operations. 
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) Global Capabilities Manager: What the New Position Entails FROM: SIGINT Communicati...
0.0

Interview with... Charlie Meals, Signals Intelligence Deputy Director

Document

Release Date: 2017-04-24 Document Date: 2004-10-13
In an interview, the deputy director describes his early days in the NSA's "weather shop," decrypting Soviet weather reports.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) Interview with... Charlie Meals, Signals Intelligence<br>Deputy Director<...
0.0

GCHQ Perspective on Annual Bilat

Document

Release Date: 2017-09-13 Document Date: 2005-02-11
Topics at an annual meeting between the Signals Intelligence Directorate and its GCHQ counterpart included the relative paucity of GCHQ efforts in China, the need to devote sufficient resources to Russia and weapons of mass destruction in the face of counterterrorism mandates, and the need to better geolocate targets, writes GCHQ's director for signals intelligence operations.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) GCHQ Perspective on Annual Bilat FROM: Iain Lobban Director of SIGINT Operations, GCHQ Ru...
0.0

SINIO Summer Seminar China Energy Geopolitics

Document

Release Date: 2018-03-01 Document Date: 2005-08-17
A brown bag lunch about China’s “energy diplomacy” will be held.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) SINIO Summer Seminar China Energy Geopolitics FROM: Marilyn Maines Deputy Chief, St...
0.0

Al-Qa'ida: An Emerging Narco-Supported Terrorist Group?

Document

Release Date: 2016-12-07 Document Date: 2004-08-19
Article lays out questions surrounding al Qaeda's involvement in the narcotics trade in Afghanistan. While there appear to be many low-level al Qaeda operatives involved in the drug trade, there is no intelligence indicating mid- or high-level operatives are involved.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S) Al-Qa'ida: An Emerging Narco-Supported Terrorist Group?<br>FROM:<br>Deputy SINI...
0.0

DIA - Swimming Upstream in the SIGINT System

Document

Release Date: 2016-08-10 Document Date: 2003-11-06
NSA collects “medical SIGINT” from the communications of NGOs and treaty-monitoring organizations and is collaborating with the DIA’s Armed Forces Medical Intelligence Center at the Army’s bioweapons research facility at Fort Detrick for expertise in epidemiology.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) DIA - Swimming Upstream in the SIGINT System<br>FROM:<br>Account Manager f...
0.0

A&P; Leadership Changes

Document

Release Date: 2016-08-10 Document Date: 2003-10-22
Leadership changes in Analysis and Production are announced.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) A&amp;P; Leadership Changes<br>FROM: Jim Allen<br>Deputy Director for Analysis a...
0.0

A Visit to the USUN

Document

Release Date: 2016-12-07 Document Date: 2004-01-09
Staffers from the China Foreign Affairs Branch visited the NSA representatives at the United Nations. They were told the U.N. is a "tactical SIGINT environment." Reporting from SIGINT to U.N. changed history on Iraq War resolution.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) A Visit to the USUN<br>FROM:<br>and <br>China Foreign Affairs Branch (S2B34...
0.0

NSA China Forum - May 6th

Document

Release Date: 2016-12-07 Document Date: 2004-05-05
Experts on Asia will lead an unclassified discussion titled "Northeast Asian Security: Moving Toward a Regional Security Framework?"
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) NSA China Forum - May 6th<br>FROM:<br>PRC Foreign Affairs (S2B34)<br>Run Date: ...
0.0

Case Studies of Integrated Cyber Operation Techniques

Document

Release Date: 2014-03-12
This undated NSA SIGINT presentation describes nine varieties of QUANTUM malware attack, their operational status and success in the field: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL USA, FVEY Case Studies of Integrated Cyber Operation Techniques NSA/CSS Threat Operations Center VS TOP SECRET//COMINT//REL USA, FVEY (U//FOUO) TUiT0t.EÄ,©i...
0.0

Using XKEYSCORE to Enable TAO

Document

Release Date: 2015-07-01 Document Date: 2009-07-16
This NSA presentation from 16 July 2009 explains how the XKeyScore system supports the agency’s Tailored Access Operations: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
using-xks-to-enable-tao-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. AUS, CAN. GBR. NZL//20291123 Ait* tuv. Using XKEYSCORE to Enable TAO Booz I AJIen l Hamilton SDS Analyst 16 July ...
0.0

NSA’s Changing Counterterrorism Relationship With India

Document

Release Date: 2018-03-01 Document Date: 2009-06-15
This 2009 post from the NSA’s internal newsletter SIDToday describes the deepening of the agency’s cooperation with India, which included an invitation to join the Sigint Seniors Pacific (SSPAC) forum: see the Intercept article The Powerful Global Spy Alliance You Never Knew Existed, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI//REL) NSA's Changing Counterterrorism Relationship with India FROM: (S//SI//R...
0.0

NSA High Frequency (HF) Collaboration efforts with Japan

Document

Release Date: 2017-04-24 Document Date: 2013-01-02
This internal briefing dated 2 January 2013 provides talking points for the NSA Director on restoring Japanese participation in the CROSSFIRE programme, which had stopped in 2009: see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017.
SECRET//COMINT//NOFORN (S//REL TO USA, FVEY) Topic: NSA High Frequency (HF) Collaboration efforts with Japan (S//REL TO USA, FVEY) Background: For many years, NSA collaborated with the DFS on...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh