Filtered By
China (CHN/CN) X
Countries Mentioned [filter]
Results
105 Total
0.0

HIMR Data Mining Research Problem Book

Document

Release Date: 2016-02-02 Document Date: 2011-09-20
This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The […]
UK TOP SECRET STRAP1 COMINT AUS/CAN/NZ/UK/US EYES ONLY Reference: OPC-M/TECH.A/455 (v1.0, r206) Date: 20 September 2011 Copy no: HIMR Data Mining Research Problem Book OPC-MCR, G...
0.0

Coming Soon! A Tool that Enables Non-Linguists to Analyse Foreign-TV News Programs

Document

Release Date: 2015-05-05 Document Date: 2008-10-23
This October 2008 article from an NSA internal newsletter SIDToday Enhanced Video Text and Audio Processing (eViTAP), a tool that provides automatic translations of news broadcasts in English, Russian, Spanish, Arabic, Mandarin and Farsi: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015. sidtoday-non-linguists-final
(U//FOUO) Coming Soon! A Tool that Enables Non-Linguists to Analyze Foreign-TV News ______________________ Programs FROM: Center for Time-Sensitive Information (S2413) Run Date: 10/23/20...
0.0

GCSB has identified an MFA data link

Document

Release Date: 2015-04-19 Document Date: 2013-04-01
This short extract from an April 2013 NSA document describes a “verbal agreement” between GCSB and NSA to proceed with the FROSTBITE / BASILHAYDEN project to infiltrate a Chinese diplomatic data link: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
(TS//SI//NF) New Zealand: GCSB has identified an MFA data link between the Chinese Consulate and Chinese Visa Office in Auckland. NSA and GCSB have verbally agreed to move forward with a coopera...
0.0

SUSLOW monthly report for March 2013

Document

Release Date: 2015-04-19 Document Date: 2013-03-01
This monthly report from the NSA’s Special US Liaison Officer in Wellington outlines progress on FROSTBITE (BASILHAYDEN) – a project to infiltrate the Chinese diplomatic computer network: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
| TOP SECRET//SI//REL TO USA, FVEY (U//FOUO) SUSLOW Monthly Report for March 2013 (U) March highlights: (U) Intelligence update: o (S//SI//REL TO USA, FVEY) GCSB project FROSTBITE / TA...
0.0

NSA Activities in Progress 2013

Document

Release Date: 2015-03-05 Document Date: 2013-01-01
This single redacted slide from a 2013 NSA presentation confirms that New Zealand participates in Five Eyes cable access operations and reports the existence of a joint plan to infiltrate a Chinese diplomatic data connection: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 March […]
Snowden3.png: Key Activities In Progress: Access New Zealand: Joint effort to exploit Chinese MFA link. New Zealand: Partner cable access program achieves Phase 1. TOP SECRET//COMINT//NO...
0.0

NATO Civilian Intelligence Council – Cyber Panel – Talking Points

Document

Release Date: 2015-02-04 Document Date: 2011-09-14
This US National Intelligence Council memo dated 14 September 2011 provides US talking points for a forthcoming NATO meeting and includes the assessment that the threat presented by Anonymous and hacktivist activity is “minimal”: see the Intercept article Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise, 4 February 2015.
SECRET//REL TO USA, NATO NIM/Cyber 14 September 2011 Talking Points Subject: (S//REL NATO) NATO Civilian Intelligence Council—Cyber Panel National Input A. Threat Overview (U) (U...
0.0

DEFIANTWARRIOR and the NSA’s Use of Bots

Document

Release Date: 2015-01-17 Document Date: 2010-05-24
This 24 May 2010 NSA presentation describes the ways the agency uses botnets (“bot herding”): see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL USA, FVEY DEFIANTWARRIO R 7 / //and the ; NSA's Uè^ojÆotá/ Overall Classification: TOP SECRET//COMINT//REL FVEY Current As Of: 24 May 2010 Derived From: NSA/CSS...
0.0

Chinese Exfiltrate Sensitive Military Technology

Document

Release Date: 2015-01-17
These three undated NSA slides describe alleged Chinese cyberattacks against US military targets, codenamed BYZANTINE HADES: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
(U) Acquired radar design - (U) Numbers and types of modules (U) Detailed engine schematics (U) Methods for cooling gases (U) Leading and trailing edge treatments (U) Aft deck he...
0.0

BYZANTINE HADES: An Evolution of Collection

Document

Release Date: 2015-01-17 Document Date: 2010-06-01
This June 2010 NSA presentation for the SIGDEV conference describes efforts to trace a suspected Chinese cyber attack: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (S//REL)BYZANTINE HADES: An Evolution of Collection NTOC, V225 SIGINT Development Conference June 2010 TOP SECRET//COMINT//REL TO...
0.0

CNO Core Secrets

Document

Release Date: 2014-10-10
This undated selection of seven NSA slides highlights the activities the agency regards as its “core secrets”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN NSA/CSS and JFCC-NW National Initiative Task - Security Framework SAP Authority NSA/CSS/JFCC-NW SAPS DNI CNE DoD CND CNA wm Information Released to...
0.0

Exceptionally Controlled Information (ECI) Compartments January 2013

Document

Release Date: 2014-10-10 Document Date: 2013-01-01
This NSA document from January 2013 lists the codenames of those agency activities sufficiently sensitive to qualify as “exceptionally controlled information”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.ah
CONFIDENTIAL//REL TO USA, AUS, CAN, GBR, NZL (U) Exceptionally Controlled Information (ECI) Compartments January 2013 ECI Name and Trigraph Organization Control Authority AMBULANT AMB...
0.0

Classification Guide for SIGINT Material Dating from 16 August 1945 – 31 December 1967

Document

Release Date: 2014-06-18 Document Date: 2011-11-21
This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
TOP SECRET//SjyTK//NOFÜRN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR SIGINT Material Dating from 16 August 1945 *31 December 1967 Effects Dale: 21 De...
0.0

Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities

Document

Release Date: 2013-12-09 Document Date: 2007-01-01
A 2007 proposal to the NSA from contractor SAIC, promoting the company’s ability to support “intelligence collection in the games space”: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 December 2013.
Games: A Look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities Table of Contents FORWARD......................................................................4 ...
0.0

January 2007 Strategic Mission List

Document

Release Date: 2013-11-02 Document Date: 2007-01-01
This nine-page briefing describes the NSA’s major missions and signals intelligence priorities for 2007: see the New York Times article No Morsel Too Minuscule for All-Consuming N.S.A., 2 November 2013.
nsa-mission-list-1.png: SECRET//COMINT//REL TO USA. ALS. CAN. GBR//20291123 United States S1GINT System January 2007 Strategic Mission List Introduction - Director’s Intent (S//SI) The ...
0.0

Peeling Back the Layers of Tor with EGOTISTICALGIRAFFE

Document

Release Date: 2013-10-04 Document Date: 2007-01-08
This Tailored Access Operations presentation shows how the NSA uses a technique codenamed EgotisticalGiraffe to attack Tor users through vulnerable computer software: see the Guardian article NSA and GCHQ target Tor network that protects anonymity of web users, 4 October 2013.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (TS//SI//REL) Peeling Back the Layers of TOR with EGOTISTICALGIRAFFE ■¿cCE&v.^ Overall Classification This briefing is classified ...
0.0

A&P; Leadership Changes

Document

Release Date: 2016-08-10 Document Date: 2003-10-22
Leadership changes in Analysis and Production are announced.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) A&amp;P; Leadership Changes<br>FROM: Jim Allen<br>Deputy Director for Analysis a...
0.0

DIA - Swimming Upstream in the SIGINT System

Document

Release Date: 2016-08-10 Document Date: 2003-11-06
NSA collects “medical SIGINT” from the communications of NGOs and treaty-monitoring organizations and is collaborating with the DIA’s Armed Forces Medical Intelligence Center at the Army’s bioweapons research facility at Fort Detrick for expertise in epidemiology.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) DIA - Swimming Upstream in the SIGINT System<br>FROM:<br>Account Manager f...
0.0

SIGINT Monitors Global Spread of Avian Flu

Document

Release Date: 2016-12-07 Document Date: 2005-10-28
NSA closely monitored the 2004 spread of avian influenza in preparation for a possible pandemic. "As our IC colleagues have said, containing the threat of infectious disease comes down to 'detection, detection, detection. SIGINT is probably going to get it first,'" the author writes.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) SIGINT Monitors Global Spread of Avian Flu<br>FROM:<br>Assistant SINIO for ...
0.0

Al-Qa'ida: An Emerging Narco-Supported Terrorist Group?

Document

Release Date: 2016-12-07 Document Date: 2004-08-19
Article lays out questions surrounding al Qaeda's involvement in the narcotics trade in Afghanistan. While there appear to be many low-level al Qaeda operatives involved in the drug trade, there is no intelligence indicating mid- or high-level operatives are involved.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S) Al-Qa'ida: An Emerging Narco-Supported Terrorist Group?<br>FROM:<br>Deputy SINI...
0.0

NSA China Forum - May 6th

Document

Release Date: 2016-12-07 Document Date: 2004-05-05
Experts on Asia will lead an unclassified discussion titled "Northeast Asian Security: Moving Toward a Regional Security Framework?"
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) NSA China Forum - May 6th<br>FROM:<br>PRC Foreign Affairs (S2B34)<br>Run Date: ...
0.0

A Visit to the USUN

Document

Release Date: 2016-12-07 Document Date: 2004-01-09
Staffers from the China Foreign Affairs Branch visited the NSA representatives at the United Nations. They were told the U.N. is a "tactical SIGINT environment." Reporting from SIGINT to U.N. changed history on Iraq War resolution.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) A Visit to the USUN<br>FROM:<br>and <br>China Foreign Affairs Branch (S2B34...
0.0

Interview with... Charlie Meals, Signals Intelligence Deputy Director

Document

Release Date: 2017-04-24 Document Date: 2004-10-13
In an interview, the deputy director describes his early days in the NSA's "weather shop," decrypting Soviet weather reports.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) Interview with... Charlie Meals, Signals Intelligence<br>Deputy Director<...
0.0

Interagency SARS Conference– May 20th

Document

Release Date: 2016-05-16 Document Date: 2003-07-05
This post from internal NSA newsletter SIDToday dated 5 July 2003 describes how the agency utilised medical SIGINT to gain insights into the impact of China’s SARS outbreak that year, including details of the partner agencies NSA collaborated with: see the Intercept article How the U.S. Spies on Medical Nonprofits and Health Defenses Worldwide, 10 […]
<p data-reactid=".ti.1.0.0.1.0.1.$0.0" class="SidTodayFilesDetailViewer-pages-page-paragraph">DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR N...
0.0

DIA – Swimming Upstream in the SIGINT System

Document

Release Date: 2016-08-10 Document Date: 2003-11-06
A post from the internal NSA newsletter SIDToday dated 6 November 2003 describes how the agency shared intercepted material from international NGOS and treaty monitoring organisations working in the health sector with the DIA’s Armed Forces Medical Intelligence Center. The DIA unit was tasked with producing intelligence for the military “in support of force health […]
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) DIA - Swimming Upstream in the SIGINT System FROM: AccountManagerfor DIA ...
0.0

Exploiting Foreign Lawful Intercept (LI) Roundtable

Document

Release Date: 2015-09-29 Document Date: 2012-01-01
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif: TOP SECRET//SI//REL TO USA, FVEY (S//SI//REL) Exploiting Foreign Lawful Intercept (LI) Roundtable S31122 TOP SECRET//SI//REL TO USA, FVEY...
0.0

Using XKEYSCORE to Enable TAO

Document

Release Date: 2015-07-01 Document Date: 2009-07-16
This NSA presentation from 16 July 2009 explains how the XKeyScore system supports the agency’s Tailored Access Operations: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
using-xks-to-enable-tao-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. AUS, CAN. GBR. NZL//20291123 Ait* tuv. Using XKEYSCORE to Enable TAO Booz I AJIen l Hamilton SDS Analyst 16 July ...
0.0

INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers

Document

Release Date: 2015-02-04 Document Date: 2010-05-06
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET a/ SI / TK // REL TO USA AUS CAN GBR NZL SID Today archi“s reedback iBi ■ ■ ■ Welcome! Saturday, 10 Nov 2012 1 1 B ...
0.0

Case Studies of Integrated Cyber Operation Techniques

Document

Release Date: 2014-03-12
This undated NSA SIGINT presentation describes nine varieties of QUANTUM malware attack, their operational status and success in the field: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL USA, FVEY Case Studies of Integrated Cyber Operation Techniques NSA/CSS Threat Operations Center VS TOP SECRET//COMINT//REL USA, FVEY (U//FOUO) TUiT0t.EÄ,©i...
0.0

Computer Network Exploitation (CNE) Classification Guide / 2-59

Document

Release Date: 2014-10-10 Document Date: 2010-03-01
This 2010 NSA classication guide outlines the sensitivity of aspects of the agency’s hacking activities: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2010.
TOP SECRET//SI//REL TO USA, FVEY (U) CLASSIFICATION GUIDE TITLE/NUMBER: Computer Network Exploitation (CNE) Classification Guide / 2-59 (U) PUBLICATION DATE: 1 March 2010 (U) OFFICE OF O...
0.0

Sentry Eagle National Initiative – Security Framework

Document

Release Date: 2014-10-10
This group of three undated NSA slides provides a graphical representation of the sensitivity of aspects of the agency’s SENTRY EAGLE programme: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN SENTRY EAGLE National Initiative - Security Framework DERIVED FROM: NSA/CSS Manual 1-52. Dated: 20041123. Declassify On: 20291123 TOP SECRET//COMINT//NOFORN ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh