Filtered By
Egypt (EGY/EG) X
Countries Mentioned [filter]
Results
21 Total
0.0

Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities

Document

Release Date: 2013-12-09 Document Date: 2007-01-01
A 2007 proposal to the NSA from contractor SAIC, promoting the company’s ability to support “intelligence collection in the games space”: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 December 2013.
Games: A Look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities Table of Contents FORWARD......................................................................4 ...
0.0

What SIGINT Revealed About the Egyptian Election

Document

Release Date: 2018-03-01 Document Date: 2005-10-05
The NSA’s Egypt team detected “the clear intention of security authorities to tamper with the results” of a referendum on how to conduct the Egyptian presidential election, including instructions on what the results would be before the referendum took place. But when the actual election came, signals intelligence showed “good evidence” of “no massive fraud” in the election result. 
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI) What SIGINT Revealed About the Egyptian Election FROM: Senior Reporter/Subject-Matter...
0.0

Belgacom_connections

Document

Release Date: 2014-12-13
This undated GCHQ screenshot, which appears to be from a map viewer called CARBON ROD, shows the international connections that made Belgacom a desirable target for the agnecy: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
Meteor Mobile Telecommunications bmited ITS Gn\bH; Germ; VO D AF 0 M E_U K_AS N VodaTo ASN-BICS UK PXket Backboj ier Services fBtepmblic- FRANCÍ sipska; Herzei 'elek&miini...
0.0

About the Virtual Private Network SIGDev Working Group...

Document

Release Date: 2017-09-13 Document Date: 2005-05-12
A brief description of a working group focused on monitoring and helping to exploit virtual private networks, or VPNs. Established in 2004, the working group publishes regular "VPN Target Activity Reports" on dozens of countries and organizations around the world. "These reports may help you exploit targets' VPNs more successfully," the chair of the working group writes.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (TS//SI) About the Virtual Private Network SIGDev Working Group... FROM: Chair NSA VPN WG, Ad...
0.0

Exploiting Foreign Lawful Intercept (LI) Roundtable

Document

Release Date: 2015-09-29 Document Date: 2012-01-01
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif: TOP SECRET//SI//REL TO USA, FVEY (S//SI//REL) Exploiting Foreign Lawful Intercept (LI) Roundtable S31122 TOP SECRET//SI//REL TO USA, FVEY...
0.0

NSA Intelligence Relationship with Israel

Document

Release Date: 2014-08-04 Document Date: 2013-04-19
This internal NSA information paper, dated 19 April 2013, describes a “far reaching technical and analytic relationship” with Israel’s SIGINT National Unit (ISNU): see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
TOP SECRET//SI//NOFORN National Security Agency/Central 19 April 2013 Security Service Information Paper (TS//REL TO USA, ISR) Subject: NSA Intelligence Relationship with Israel (U) I...
0.0

THIEVING MAGPIE – Using on-board GSM/GPRS to track targets

Document

Release Date: 2014-05-13 Document Date: 2012-01-01
These slides from a 2012 GCHQ presentation outline the progress the agency has made in intercepting mobile phone calls made on board commercial aircraft: see the book No Place To Hide, 13 May 2014.
THIEVING MAGPIE Using on-board GSM/GPRS services to track targets TOP SECRET//COMINT//REL TO USA, FVEY STRAP 1 This information is exempt from disclosure under the Freedom of Infor ____...
0.0

Boundless Informant heat maps

Document

Release Date: 2013-06-11 Document Date: 2013-03-26
These undated heat maps show the number of pieces of communications data the NSA gathers per country in a particular 30 day period, divided into telephony (DNR) and internet (DNI) metadata. Details in the second map refer to a period in January 2013 and third to a period ending in February the same year: see […]
boundlessinformant.pdf: Page 93 BOUNDLESSINFORMANT Top 5 Countries (i»t 30 o«>» t-om «¡xu/i ■Ohm.pdf: BOUNDLESSINFORMANT im!MwamHMiM:rta.]a;ii]aaMaiM,(.yiii:am«.'.«M«iMiaiiiiiPH;i!i...
0.0

LEVANT - Register Now

Document

Release Date: 2017-09-13 Document Date: 2005-06-20
An intelligence community conference concerning Syria, Lebanon, Israel, Jordan, and Egypt will be hosted by the National Geospatial-Intelligence Agency.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) LEVANT - Register Now FROM: NSA Reprehensive to NGA/ISD Run Date: 06/20/2005 What: NGA ...
0.0

EP-3E Collision: Cryptologic Damage Assessment and Incident Review

Document

Release Date: 2017-04-10 Document Date: 2001-07-01
A joint US Navy and NSA report, prepared three months after a US spy plane was forced to crash land in China, assesses the degree to which surveillance secrets were compromised: see the Intercept article Burn After Reading: Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident, 10 April 2017. […]
TOP SECRET//COMINT//NOFORN//X1 EP-3E Collision: Cryptologic Damage Assessment and Incident Review Final Report Prepared by the EP-3 Cryptologic Assessment Team July 2001 Classifie...
0.0

Cable Master List

Document

Release Date: 2014-11-25 Document Date: 2009-07-27
These July 2009 documents provide a full list of the fibre-optic cables GCHQ had access to at that point, including details of location, bandwidth and corporate partners: see the Süddeutsche Zeitung article Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts, 25 November 2014. […]
partner_cables.pdf:  Partner Cable UK? REMEDY GERONTIC DACRON LITTLE PINNAGE STREET CAR VITREOUS Apolo UK IRU/LC DCO IRU/LC IRU/LC IRU/LC CANTAT 3 UK DCO IRU/LC Concerto UK D...
0.0

Exhibit F

Document

Release Date: 2014-06-30 Document Date: 2010-07-16
This document lists the 193 governments, intragovernmental organisations and other entities which the NSA was granted the legal authority to intercept communications “about” for foreign intelligence purposes in August 2010: see the Washington Post article Court gave NSA broad leeway in surveillance, 30 June 2014.
TOP SECRET//NOFORN EXHIBIT F IN THE MATTER OF FOREIGN GOVERNMENTS, FOREIGN FACTIONS Ns?F^yyiG#i 11- ENTITIES, AND FOREIGN-BASED POLITICAL ORGANIZATIONS >■,, f;f |:VV DNI/AG 70...
Afghanistan (AFG/AF), Albania (ALB/AL), Algeria (DZA/DZ), Andorra (AND/AD), Angola (AGO/AO), Antigua and Barbuda (ATG/AG), Argentina (ARG/AR), Armenia (ARM/AM), Austria (AUT/AT), Azerbaijan (AZE/AZ), Bahamas (BHS/BS), Bangladesh (BGD/BD), Barbados (BRB/BB), Belarus (BLR/BY), Belgium (BEL/BE), Belize (BLZ/BZ), Benin (BEN/BJ), Bhutan (BTN/BT), Bolivia (BOL/BO), Bosnia and Herzegovina (BIH/BA), Botswana (BWA/BW), Brazil (BRA/BR), Bulgaria (BGR/BG), Burkina Faso (BFA/BF), Burundi (BDI/BI), Cambodia (KHM/KH), Cameroon (CMR/CM), Central African Republic (CAF/CF), Chad (TCD/TD), Chile (CHL/CL), China (CHN/CN), Colombia (COL/CO), Comoros (COM/KM), Congo (COD/CD), Costa Rica (CRI/CR), Croatia (HRV/HR), Cuba (CUB/CU), Cyprus (CYP/CY), Czech Republic (CZE/CZ), Denmark (DNK/DK), Djibouti (DJI/DJ), Dominica (DMA/DM), Dominican Republic (DOM/DO), Ecuador (ECU/EC), Egypt (EGY/EG), El Salvador (SLV/SV), Equatorial Guinea (GNQ/GQ), Eritrea (ERI/ER), Estonia (EST/EE), Ethiopia (ETH/ET), Fiji (FJI/FJ), Finland (FIN/FI), France (FRA/FR), Gabon (GAB/GA), Gambia (GMB/GM), Georgia (GEO/GE), Germany (DEU/DE), Ghana (GHA/GH), Greece (GRC/GR), Grenada (GRD/GD), Guatemala (GTM/GT), Guinea (GIN/GN), Guinea-Bissau (GNB/GW), Guyana (GUY/GY), Haiti (HTI/HT), Vatican (VAT/VA), Honduras (HND/HN), Hungary (HUN/HU), Iceland (ISL/IS), India (IND/IN), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Ireland (IRL/IE), Israel (ISR/IL), Italy (ITA/IT), Jamaica (JAM/JM), Japan (JPN/JP), Jordan (JOR/JO), Kazakhstan (KAZ/KZ), Kenya (KEN/KE), Kiribati (KIR/KI), Korea (KOR/KR), Kuwait (KWT/KW), Kyrgyzstan (KGZ/KG), Latvia (LVA/LV), Lebanon (LBN/LB), Lesotho (LSO/LS), Liberia (LBR/LR), Libya (LBY/LY), Liechtenstein (LIE/LI), Lithuania (LTU/LT), Luxembourg (LUX/LU), Macedonia (MKD/MK), Madagascar (MDG/MG), Malawi (MWI/MW), Malaysia (MYS/MY), Maldives (MDV/MV), Mali (MLI/ML), Malta (MLT/MT), Marshall Islands (MHL/MH), Mauritania (MRT/MR), Mauritius (MUS/MU), Mexico (MEX/MX), Micronesia (FSM/FM), Moldova (MDA/MD), Monaco (MCO/MC), Mongolia (MNG/MN), Montenegro (MNE/ME), Morocco (MAR/MA), Mozambique (MOZ/MZ), Myanmar (MMR/MM), Namibia (NAM/NA), Nauru (NRU/NR), Nepal (NPL/NP), Netherlands (NLD/NL), Nicaragua (NIC/NI), Niger (NER/NE), Nigeria (NGA/NG), Norway (NOR/NO), Oman (OMN/OM), Pakistan (PAK/PK), Palau (PLW/PW), Panama (PAN/PA), Papua New Guinea (PNG/PG), Paraguay (PRY/PY), Peru (PER/PE), Philippines (PHL/PH), Poland (POL/PL), Portugal (PRT/PT), Qatar (QAT/QA), Romania (ROU/RO), Russia (RUS/RU), Rwanda (RWA/RW), Saint Kitts and Nevis (KNA/KN), Saint Lucia (LCA/LC), Samoa (WSM/WS), San Marino (SMR/SM), Sao Tome and Principe (STP/ST), Senegal (SEN/SN), Serbia (SRB/RS), Seychelles (SYC/SC), Sierra Leone (SLE/SL), Singapore (SGP/SG), Slovakia (SVK/SK), Slovenia (SVN/SI), Somalia (SOM/SO), South Africa (ZAF/ZA), Spain (ESP/ES), Sri Lanka (LKA/LK), Sudan (SDN/SD), Suriname (SUR/SR), Swaziland (SWZ/SZ), Sweden (SWE/SE), Switzerland (CHE/CH), Taiwan (TWN/TW), Tajikistan (TJK/TJ), Tanzania (TZA/TZ), Thailand (THA/TH), Timor-Leste (TLS/TL), Togo (TGO/TG), Tonga (TON/TO), Tunisia (TUN/TN), Turkey (TUR/TR), Turkmenistan (TKM/TM), Tuvalu (TUV/TV), Uganda (UGA/UG), Ukraine (UKR/UA), United States (USA/US), Uruguay (URY/UY), Uzbekistan (UZB/UZ), Vanuatu (VUT/VU), Venezuela (VEN/VE), Vietnam (VNM/VN), Western Sahara (ESH/EH), Yemen (YEM/YE), Zambia (ZMB/ZM), Zimbabwe (ZWE/ZW)
0.0

Broadcast/Intenet Radio Exploitation and Analysis

Document

Release Date: 2015-09-25 Document Date: 2009-11-06
This GCHQ research paper from 6 November 2009 outlines what kinds of data the agency can extract from internet radio stations and their listenership, grouped by country: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
broadcast-analysis-p1-normal.gif: UK TOP SECRET//COMINT//REL FVEY Broadcast/lnternet Radio Exploitation and Analysis 6th November 2009 OPD-NAC Distribution (via email) (ST2) BS...
0.0

Content Extraction Enhancements for Target Analytics

Document

Release Date: 2014-01-16 Document Date: 2011-06-09
This NSA presentation from 9 June 2011 shows the scale of the agency’s collection of SMS messages (codenamed Dishfire) and describes the operation of the Prefer analysis tool: see the Guardian article, NSA collects millions of text messages daily in ‘untargeted’ global sweep, 16 January 2014.
TOP SECRET//COMINT//REL TO USA, FVEY//20320108 Content Extraction Enhancements For Target Analytics: SMS Text Messages: A Goldmine to Exploit 9 June, 2011 Presenters: With Wor...
0.0

AURORAGOLD Working Group

Document

Release Date: 2014-12-04 Document Date: 2012-06-06
This 26-page NSA document, originally presented at 2012’s Five Eyes SIGDEV conference, gives a detailed overview of the agency’s information gathering on world mobile phone networks. Some intercepted technical and contact details have been redacted: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//SI//REL TO FVEY (U//FOUO) AURORAGOLD Working Group (S//SI//REL) Shaping understanding of the global GSm/uMTS/LTE landscape SIGDEV Conference - 6 June 2012 This briefing is cl...
0.0

Geopolitical trends for 2014-2019

Document

Release Date: 2013-12-02
Three redacted slides from an NSA presentation name several states as subjects of ongoing interest: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
slide1.jpg: slide2.jpg: TOP SECRET//SI//REL TO USA, FVEY U//JEQUOslide3.jpg: rTO USA, FYEY Geopolitical Trends: Global Drivers (S//REL) Geopolitical Trend driver»: • St re**orc to...
0.0

The Saudi Assassination Plot -- How It Was Thwarted

Document

Release Date: 2018-03-01 Document Date: 2005-08-09
A plot by Libyan dictator Moammar Gadhafi to assassinate the Saudi Crown Prince was revealed by an alleged terrorist during interrogation and corroborated using signals intelligence. 
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) The Saudi Assassination Plot -- How It Was Thwarted FROM: Deputy Chief, Customer Account ...
0.0

SID Mailbag: Intelligence Analysts at SCS Sites

Document

Release Date: 2017-09-13 Document Date: 2005-02-07
An intelligence analyst inquires whether the Special Collection Service will be hiring more intelligence analysts in their field sites around the globe; SCS responds that they have a limited number of openings for that position.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) SID Mailbag: Intelligence Analysts at SCS Sites FROM: SIGINT Communications Unknown Run D...
0.0

NSA Tipper Alerts Allies to Terrorist Threat

Document

Release Date: 2016-12-07 Document Date: 2004-01-20
NSA tipped off Norway to an al Qaeda threat to the Norwegian Embassy in Cairo, Egypt, on January 6, 2004. NSA SIGINT was Norway's only source of this threat information.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) NSA Tipper Alerts Allies to Terrorist Threat<br>FROM: SIGINT Communications...
0.0

The Saudi Assassination Plot — How It Was Thwarted

Document

Release Date: 2017-11-30 Document Date: 2005-08-09
In this 2005 article from the internal NSA newsletter SIDToday, an NSA employee credits the agency with securing the conviction of Abdurahman Alamoudi in the Eastern District of Virgina: see the Intercept article NSA Secretly Helped Convict Defendants in U.S. Courts, 30 November 2017.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) The Saudi Assassination Plot -- How It Was Thwarted FROM :| DeputyChiefTCustomer...
0.0

MHS Lends a Hand in the Aftermath of the London Bombings

Document

Release Date: 2018-03-01 Document Date: 2005-08-24
The NSA’s base at Menwith Hill in the U.K. supported the GCHQ in tracking phone, GSM, SMS, and high-powered cordless phone signals in the wake of the London bombings on July 7, 2005. This included putting nine U.K. cities under mass surveillance by monitoring satellite phones via “VOICESAIL.” NSA analysts also found a certain area in Pakistan with a high density of calls to the U.K. and were able to use intercepted communications from a subsequent attempted bombing to add potential terrorism-related cover terms for attacks to their database.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (C) MHS Lends a Hand in the Aftermath of the London Bombings FROM: Menwith Hill Station Run ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh