Filtered By
Iraq (IRQ/IQ)X
Countries Mentioned [filter]
Results
57 Total
1.0

Case Studies of Integrated Cyber Operation Techniques

Document

Release Date: 2014-03-12
This undated NSA SIGINT presentation describes nine varieties of QUANTUM malware attack, their operational status and success in the field: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL USA, FVEY Case Studies of Integrated Cyber Operation Techniques NSA/CSS Threat Operations Center VS TOP SECRET//COMINT//REL USA, FVEY (U//FOUO) TUiT0t.EÄ,©i...
1.0

HTTP Activity in XKEYSCORE

Document

Document Date: 2009-03-01Release Date: 2015-07-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HTTP Activity in XKEYSCORE March 2009 Derived From: NSA/QSSM 1-52 Dated: 200701 (T Declassify On: 202911 ...
1.0

Broadcast/Intenet Radio Exploitation and Analysis

Document

Document Date: 2009-11-06Release Date: 2015-09-25
This GCHQ research paper from 6 November 2009 outlines what kinds of data the agency can extract from internet radio stations and their listenership, grouped by country: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
broadcast-analysis-p1-normal.gif: UK TOP SECRET//COMINT//REL FVEY Broadcast/lnternet Radio Exploitation and Analysis 6th November 2009 OPD-NAC Distribution (via email) (ST2) BS...
1.0

North Korea Rock Drill Held This Week

Document

Document Date: 2003-06-20Release Date: 2016-05-16
A North Korea “rock drill” featuring experts from across the cryptologic community was held to prepare the cryptologic system to better support policymakers and war fighters.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) North Korea Rock Drill Held This Week<br>FROM: the North Korean Issue Manage...
1.0

Introduction to the Korean Issue Management Team

Document

Document Date: 2003-05-20Release Date: 2016-05-16
The Korean Issue Management Team identifies North Korean SIGINT gaps, prioritizes them, and challenges the enterprise to respond with solutions.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Introduction to the Korean Issue Management Team<br>FROM: the Korean Issue...
1.0

A Perspective on the NSA/ USUN Partnership

Document

Document Date: 2003-04-23Release Date: 2016-05-16
The intelligence SID gave to the U.S. United Nations team (USUN) during the wind-up to the Iraq War “played a critical role” in the adoption of U.N. Security Council resolutions. The work with that customer was a resounding success.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) A Perspective on the NSA/ USUN Partnership<br>FROM:<br>Acting Chief, Custome...
1.0

MG Quirk Leads Group to Iraq

Document

Document Date: 2003-06-26Release Date: 2016-05-16
Photo display of MG Quirk’s November 2002 trip to Baghdad, including a visit to Abu Ghraib prison; no photos are included, only the captions.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) MG Quirk Leads Group to Iraq<br>FROM:<br>Iraq Issue Manager<br>Run Date: 0...
1.0

Tailored Access Operations – Texas Cryptologic Center

Document

Release Date: 2013-12-29
This NSA presentation describes the staffing and activities of the Tailored Access Operations sectio based in San Antonia Texas. These included operations against Mexico’s Secretariat of Public Security (codenamed WHITETAMALE), Cuba, Columbia, Venezuela and unspecified targets in the Middle East: see the Der Spiegel article Inside TAO: Documents Reveal Top NSA Hacking Unit, 29 December […]
image-584021-galleryV9-yenq.jpg: image-584022-galleryV9-qplk.jpg: TOP SECRET//COMINT//REL TO USA, FVEY Overview • Current People, Space, & Operations (FY2009) • Medina era Growth (FY20...
1.0

Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities

Document

Document Date: 2007-01-01Release Date: 2013-12-09
A 2007 proposal to the NSA from contractor SAIC, promoting the company’s ability to support “intelligence collection in the games space”: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 December 2013.
Games: A Look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities Table of Contents FORWARD......................................................................4 ...
1.0

Exhibit F

Document

Document Date: 2010-07-16Release Date: 2014-06-30
This document lists the 193 governments, intragovernmental organisations and other entities which the NSA was granted the legal authority to intercept communications “about” for foreign intelligence purposes in August 2010: see the Washington Post article Court gave NSA broad leeway in surveillance, 30 June 2014.
TOP SECRET//NOFORN EXHIBIT F IN THE MATTER OF FOREIGN GOVERNMENTS, FOREIGN FACTIONS Ns?F^yyiG#i 11- ENTITIES, AND FOREIGN-BASED POLITICAL ORGANIZATIONS >■,, f;f |:VV DNI/AG 70...
Afghanistan (AFG/AF), Albania (ALB/AL), Algeria (DZA/DZ), Andorra (AND/AD), Angola (AGO/AO), Antigua and Barbuda (ATG/AG), Argentina (ARG/AR), Armenia (ARM/AM), Austria (AUT/AT), Azerbaijan (AZE/AZ), Bahamas (BHS/BS), Bangladesh (BGD/BD), Barbados (BRB/BB), Belarus (BLR/BY), Belgium (BEL/BE), Belize (BLZ/BZ), Benin (BEN/BJ), Bhutan (BTN/BT), Bolivia (BOL/BO), Bosnia and Herzegovina (BIH/BA), Botswana (BWA/BW), Brazil (BRA/BR), Bulgaria (BGR/BG), Burkina Faso (BFA/BF), Burundi (BDI/BI), Cambodia (KHM/KH), Cameroon (CMR/CM), Central African Republic (CAF/CF), Chad (TCD/TD), Chile (CHL/CL), China (CHN/CN), Colombia (COL/CO), Comoros (COM/KM), Congo (COD/CD), Costa Rica (CRI/CR), Croatia (HRV/HR), Cuba (CUB/CU), Cyprus (CYP/CY), Czech Republic (CZE/CZ), Denmark (DNK/DK), Djibouti (DJI/DJ), Dominica (DMA/DM), Dominican Republic (DOM/DO), Ecuador (ECU/EC), Egypt (EGY/EG), El Salvador (SLV/SV), Equatorial Guinea (GNQ/GQ), Eritrea (ERI/ER), Estonia (EST/EE), Ethiopia (ETH/ET), Fiji (FJI/FJ), Finland (FIN/FI), France (FRA/FR), Gabon (GAB/GA), Gambia (GMB/GM), Georgia (GEO/GE), Germany (DEU/DE), Ghana (GHA/GH), Greece (GRC/GR), Grenada (GRD/GD), Guatemala (GTM/GT), Guinea (GIN/GN), Guinea-Bissau (GNB/GW), Guyana (GUY/GY), Haiti (HTI/HT), Vatican (VAT/VA), Honduras (HND/HN), Hungary (HUN/HU), Iceland (ISL/IS), India (IND/IN), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Ireland (IRL/IE), Israel (ISR/IL), Italy (ITA/IT), Jamaica (JAM/JM), Japan (JPN/JP), Jordan (JOR/JO), Kazakhstan (KAZ/KZ), Kenya (KEN/KE), Kiribati (KIR/KI), Korea (KOR/KR), Kuwait (KWT/KW), Kyrgyzstan (KGZ/KG), Latvia (LVA/LV), Lebanon (LBN/LB), Lesotho (LSO/LS), Liberia (LBR/LR), Libya (LBY/LY), Liechtenstein (LIE/LI), Lithuania (LTU/LT), Luxembourg (LUX/LU), Macedonia (MKD/MK), Madagascar (MDG/MG), Malawi (MWI/MW), Malaysia (MYS/MY), Maldives (MDV/MV), Mali (MLI/ML), Malta (MLT/MT), Marshall Islands (MHL/MH), Mauritania (MRT/MR), Mauritius (MUS/MU), Mexico (MEX/MX), Micronesia (FSM/FM), Moldova (MDA/MD), Monaco (MCO/MC), Mongolia (MNG/MN), Montenegro (MNE/ME), Morocco (MAR/MA), Mozambique (MOZ/MZ), Myanmar (MMR/MM), Namibia (NAM/NA), Nauru (NRU/NR), Nepal (NPL/NP), Netherlands (NLD/NL), Nicaragua (NIC/NI), Niger (NER/NE), Nigeria (NGA/NG), Norway (NOR/NO), Oman (OMN/OM), Pakistan (PAK/PK), Palau (PLW/PW), Panama (PAN/PA), Papua New Guinea (PNG/PG), Paraguay (PRY/PY), Peru (PER/PE), Philippines (PHL/PH), Poland (POL/PL), Portugal (PRT/PT), Qatar (QAT/QA), Romania (ROU/RO), Russia (RUS/RU), Rwanda (RWA/RW), Saint Kitts and Nevis (KNA/KN), Saint Lucia (LCA/LC), Samoa (WSM/WS), San Marino (SMR/SM), Sao Tome and Principe (STP/ST), Senegal (SEN/SN), Serbia (SRB/RS), Seychelles (SYC/SC), Sierra Leone (SLE/SL), Singapore (SGP/SG), Slovakia (SVK/SK), Slovenia (SVN/SI), Somalia (SOM/SO), South Africa (ZAF/ZA), Spain (ESP/ES), Sri Lanka (LKA/LK), Sudan (SDN/SD), Suriname (SUR/SR), Swaziland (SWZ/SZ), Sweden (SWE/SE), Switzerland (CHE/CH), Taiwan (TWN/TW), Tajikistan (TJK/TJ), Tanzania (TZA/TZ), Thailand (THA/TH), Timor-Leste (TLS/TL), Togo (TGO/TG), Tonga (TON/TO), Tunisia (TUN/TN), Turkey (TUR/TR), Turkmenistan (TKM/TM), Tuvalu (TUV/TV), Uganda (UGA/UG), Ukraine (UKR/UA), United States (USA/US), Uruguay (URY/UY), Uzbekistan (UZB/UZ), Vanuatu (VUT/VU), Venezuela (VEN/VE), Vietnam (VNM/VN), Western Sahara (ESH/EH), Yemen (YEM/YE), Zambia (ZMB/ZM), Zimbabwe (ZWE/ZW)
1.0

LEVIATHAN and the FFU Hypothesis

Document

Document Date: 2012-01-01Release Date: 2015-01-28
This CSE (then CSEC) presentation from 2012 describes the Canadian agency’s file download monitoring operation: see the Intercept article Canada Casts Global Surveillance Dragnet Over File Downloads, 28 January 2015. cse-presentation-on-the-levitation-project
TOP SECRET//SI//REL CAN, AUS, GBR, NZL, USA LEVITATION and the FFU Hypothesis cse-cst.gc.ca TOP SECRET//SI//REL CAN, AUS, GBR, NZL, USA What is LEVITATION? A behaviour-based target...
1.0

For Media Mining, the Future is Now!

Document

Document Date: 2006-08-01Release Date: 2015-05-05
This 1 August 2006 post from the internal NSA newsletter SIDToday describes advances in the agency’s text-to-speech capability: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015. sidtoday-future-is-now-final
(U) For Media Mining, the Future Is Now! FROM: Human Language Technology (S23) Run Date: 08/01/2006 (TS//SI) In the first article on the Human Language Technology Program Management Offi...
1.0

Exploiting Foreign Lawful Intercept (LI) Roundtable

Document

Document Date: 2012-01-01Release Date: 2015-09-29
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif: TOP SECRET//SI//REL TO USA, FVEY (S//SI//REL) Exploiting Foreign Lawful Intercept (LI) Roundtable S31122 TOP SECRET//SI//REL TO USA, FVEY...
1.0

Documenting Your Contribution During The Iraq Crisis

Document

Document Date: 2003-04-10Release Date: 2016-05-16
Request from Records Management for records relating to NSA contributions to Iraq campaign.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Documenting Your Contribution During The Iraq Crisis<br>FROM: the SIGINT Communi...
1.0

Fusing Signals Data, with WARGODDESS

Document

Document Date: 2003-05-21Release Date: 2016-05-16
WARGODDESS is a system that fuses multiple sources of signal data to help characterize targets and threats and produce estimates about targets and their intentions.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Fusing Signals Data, with WARGODDESS<br>FROM:<br>WARGODDESS System Enginee...
1.0

SIGINT Development: A Network of Discovery Networks

Document

Document Date: 2003-06-11Release Date: 2016-05-16
An article describes the mission and recent activities of SIGINT Development, an expanding mission of NSA.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) SIGINT Development: A Network of Discovery Networks<br>FROM: SIGINT Communicatio...
1.0

Welcome to SIDtoday

Document

Document Date: 2003-03-31Release Date: 2016-05-16
Introduction to the new SIDtoday website on March 31, 2003.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Welcome to SIDtoday<br>FROM: the Sigint Communications Team<br>Unknown<br>Run Da...
1.0

Another Top Iraqi Captured

Document

Document Date: 2003-06-27Release Date: 2016-05-16
SIGINT played a very prominent role in the capture of the “ace of diamonds” from CENTCOM’s card deck representing its list of most wanted Iraqis.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Another Top Iraqi Captured<br>FROM:<br>Chief, Geospatial Exploitation<br>Run Dat...
1.0

When Meeting Customer Needs Means Defending the Nation

Document

Document Date: 2003-04-16Release Date: 2016-05-16
Introduction to SID’s Customer Relationships Directorate series and summary of future articles.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) When Meeting Customer Needs Means Defending the Nation<br>FROM:<br>Acting Chief,...
1.0

2013 Intelligence Community budget justification

Document

Document Date: 2012-02-01Release Date: 2013-08-29
Congressional Budget Justification summary for fiscal year 2013 from the Office of the Director of National Intelligence (ODNI): see the Washington Post article U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary, 29 August 2013.
TOP SECRET//SI/TK//NOFORN FY 2013 Congressional Budget Justification Volume I NATIONAL INTELLIGENCE PROGRAM SUMMARY February 2012 TOP SECRET//SI/TK//NOFORN TOP SECRET//SI/TK//...
1.0

Targeting Rationale (TAR)

Document

Document Date: 2007-01-08Release Date: 2013-08-15
A Targeting Rationale document details how NSA analysts should justify their targeting decisions: see the Washington Post article NSA broke privacy rules thousands of times per year, audit finds, 15 August 2013.
TOP SECRET//COMINT//NOFORN//MR Targeting Rationale (TAR) (C//SI//REL TO USA, FVEY) The basic premise of this process is to memorialize why you the analyst have requested targeting. This rat...
1.0

NSA Inspector General review of the President’s Surveillance Program

Document

Document Date: 2009-03-24Release Date: 2013-06-27
A review of NSA activities beginning shortly after 9/11 until January 2007 describes the warrantless mass surveillance activities authorised by President Bush, including a program codenamed STELLARWIND: see the Guardian article NSA collected US email records in bulk for more than two years under Obama, 27 June 2013.
TOP SECRET//STLW//COMINT/ORCON/NOFORN ST-09-0002 WORKING DRAFT OFFICE OF THE INSPECTOR GENERAL NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE 24 March 2009 (U) TABLE OF CONTENTS ...
1.0

Boundless Informant heat maps

Document

Document Date: 2013-03-26Release Date: 2013-06-11
These undated heat maps show the number of pieces of communications data the NSA gathers per country in a particular 30 day period, divided into telephony (DNR) and internet (DNI) metadata. Details in the second map refer to a period in January 2013 and third to a period ending in February the same year: see […]
boundlessinformant.pdf: Page 93 BOUNDLESSINFORMANT Top 5 Countries (i»t 30 o«>» t-om «¡xu/i ■Ohm.pdf: BOUNDLESSINFORMANT im!MwamHMiM:rta.]a;ii]aaMaiM,(.yiii:am«.'.«M«iMiaiiiiiPH;i!i...
1.0

CRISSCROSS/PROTON

Document

Document Date: 2006-02-26Release Date: 2014-08-25
This NSA Point Paper dated 22 February 2006 provides a history of the CRISSCROSS and PROTON information sharing systems that preceded ICREACH: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
TOP SECRET//COMINT//ORCON/NOFORN//MR POINT PAPER SUBJECT: CRISSCROSS/PROTON PURPOSE: Provide DIRNSA information on subject. BACKGROUND: 22 Feb 06 (U) History of CRISSCROSS/PROTON...
1.0

NSA’s Oldest Third Party SIGINT Partnership

Document

Document Date: 2005-10-07Release Date: 2014-08-31
This October 2005 article, taken from the internal NSA newsletter Foreign Affairs Digest, provides a brief history of the agency’s past and current relationship with its Turkish counterparts, which includes a staff of 40 NSA employees stationed in Ankara: see the Intercept article How the NSA Helped Turkey Kill Kurdish Rebels, 31 August 2014. Download […]
dynamic: page - HIGHEST possible classification js TOP SECRET // SI tTK // REL TO USA AUS CAN GBR NZL (U) NS As Oldest Third Party SJGJNT Partnership Countiy Desk Officer (CiDO) Turkey R...
1.0

European Technical Center Area Checked for Unexploded WWII Ordnance

Document

This internal NSA post from 14 March 2006 describes an incident on 20 December 2005 when what was suspected to be unexplodeded WWII-era ordnance was discovered at an agency facility in Mainz Kastel, Germany: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) European Technical Center Area Checked for Unexploded WWII Ordnance FROM: multiple authors Unknown Run Date: 03/15/2006 (C) The ETC facility was closed for a day while inves...
1.0

Intro to the VPN Exploitation Process

Document

Document Date: 2010-09-13Release Date: 2014-12-28
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
1.0

RT10 Overview

Document

Document Date: 2006-06-05Release Date: 2015-05-05
This NSA presentation from June 2006 describes advances in voice recognition technology, particularly in the context of operations in Iraq: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
RT10 Overview June 2006 TOPSECRET//COMINT//20291123 TOPSECRET//COMINT//20291123 Current Challenges - Why Innovate? ► Network is converging and dataflow is increasing ► Pushing ev...
1.0

GCHQ Ministry Stakeholder Relationships spreadsheets

Document

Document Date: 2008-01-01Release Date: 2015-06-22
This collection of 13 spreadsheets illustrates the relationship between GCHQ and various ministries within the UK government and that agency’s work is by no means restricted to matters of national security, but also extends to domestic issues: see the Intercept article Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research, 22 June […]
 Bank of England GCO Name(s) 3CHQ Top level Aim with Customer BANK MISSION Contribute to Bank decision-making on issues affecting UK economic stability. To support UK economic stability. ...
1.0

From SIGINT to HUMINT to SIGINT (through HUMINT) – part 1

Document

Document Date: 2005-03-10Release Date: 2016-05-11
This SIDToday article from 10 March 2005 details the experiences of Eric Fair, a US interrogator in Iraq who went on to work for the NSA. In his memoirs, published in 2016, Fair admits self-censoring in order not to disclose his moral qualms to colleagues: see the Intercept article The Secret NSA Diary of an […]
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) From SIGINT to HUMINT to SIGINT (through HUMINT) -- part 1 FROM: Eric Fai...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh