Results
30 Total
0.0
Computer-Network Exploitation Successes South of the Border
Document
Release Date:
2013-10-20
Document Date:
2010-11-15
This extract from a 15 November 2010 NSA memo reveals that the agency has been able to access Mexican President Felipe Calderon’s email account: see the Der Spiegel article NSA Accessed Mexican President’s Email, 20 October 2013.
(TS//SI//REL) Computer-Network Exploitation Successes South of the Border
I FROM: .* BA.
Chief, NSA-Texas TAO/Requiremcnts & Targeting (FTS327)
Run Date: 11/15/2010
rS//SI//REL) TAO-en...
0.0
The International Security Issues Build-Out
Document
Release Date:
2017-04-24
Document Date:
2006-05-17
This section of a 17 May 2006 article from an internal NSA newsletter makes it clear that Japanese foreign policy and trade activities are surveillance targets for the agency: see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017.
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI TK 7 REL TO USA AUS CAN GBR NZL
(C) The International Seemin’ Issues Build-Out
Global Capabilities Manager. ISI (S2C)
Ru...
0.0
Intelligently filtering your data: Brazil and Mexico case studies
Document
Release Date:
2013-12-02
A selection of slides from a Secure and Trustworthy Cyberspace (SaTC) presentation gives case studies on the use of graph analysis in relation to the political leadership of Mexico and Brazil: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
glenn1-30.jpg:
?86 H6MTW£8MllflfHi® T8 Bifc SIS: SHI; ESH; H5t
I(TS//SI//REL) Intelligently filtering your data
Brazil and Mexico case studies
SATC
i86 ieff«E8fHHWB£l: ?8 HIS; 886; SH...
0.0
Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities
Document
Release Date:
2013-12-09
Document Date:
2007-01-01
A 2007 proposal to the NSA from contractor SAIC, promoting the company’s ability to support “intelligence collection in the games space”: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 December 2013.
Games: A Look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities
Table of Contents
FORWARD......................................................................4
...
Bahrain (BHR/BH), China (CHN/CN), Egypt (EGY/EG), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Israel (ISR/IL), Japan (JPN/JP), Jordan (JOR/JO), Kazakhstan (KAZ/KZ), Korea (KOR/KR), Kuwait (KWT/KW), Lebanon (LBN/LB), Malaysia (MYS/MY), Mexico (MEX/MX), Oman (OMN/OM), Pakistan (PAK/PK), Palestine (PSE/PS), Qatar (QAT/QA), Saudi Arabia (SAU/SA), Singapore (SGP/SG), Sudan (SDN/SD), Turkmenistan (TKM/TM), United Arab Emirates (ARE/AE), United Kingdom (GBR/GB), United States (USA/US), Uzbekistan (UZB/UZ)
0.0
NSA Washington Mission
Document
Release Date:
2014-05-13
Document Date:
2006-01-01
This excerpt from a 2006 NSA memo written by the global resources manager of the International Security Issues (ISI) mission underlines the importance of data on energy resources, production and international investment to the agency: see the book No Place To Hide, 13 May 2014.
Page 138
(U) NSA Washington Mission
(U) Regional
(TS//SI) ISI is responsible for 13 individual nation states in three continents. One
significant tie that binds all these countries togethe...
0.0
Exploiting Foreign Lawful Intercept (LI) Roundtable
Document
Release Date:
2015-09-29
Document Date:
2012-01-01
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif:
TOP SECRET//SI//REL TO USA, FVEY
(S//SI//REL) Exploiting Foreign
Lawful Intercept (LI)
Roundtable
S31122
TOP SECRET//SI//REL TO USA, FVEY...
0.0
Tailored Access Operations – Texas Cryptologic Center
Document
Release Date:
2013-12-29
This NSA presentation describes the staffing and activities of the Tailored Access Operations sectio based in San Antonia Texas. These included operations against Mexico’s Secretariat of Public Security (codenamed WHITETAMALE), Cuba, Columbia, Venezuela and unspecified targets in the Middle East: see the Der Spiegel article Inside TAO: Documents Reveal Top NSA Hacking Unit, 29 December […]
image-584021-galleryV9-yenq.jpg:
image-584022-galleryV9-qplk.jpg:
TOP SECRET//COMINT//REL TO USA, FVEY
Overview
• Current People, Space, & Operations (FY2009)
• Medina era Growth (FY20...
0.0
BASECOAT
Document
Release Date:
2014-05-19
Document Date:
2013-05-02
This slide from a 2013 NSA Special Source Operations presentation shows that SOMALGET is used to investigate narcotics offenses: see the Intercept article: Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas, 19 May 2014.
TOP SECRET//SI//NOFORN
(U) WHAT’S NEW
>US-331OAI /A2/BASECOAT (Bahamas) reactivated mid-
March. Five reports issued by end of March, four sole source.
2/00/501291-13 ______
(S//SI//REL...
0.0
NSA Intelligence Relationship with Canada’s Communications Security Establishment Canada (CSEC)
Document
Release Date:
2014-05-13
Document Date:
2013-04-03
This largely redacted information paper from NSA’s Central Security Service dated 3 April 2013 details the current state of the agency’s cooperative relationship with its Canadian counterpart: see the book No Place To Hide, 13 May 2014.
TOP SECRET//SI//REL USA, FVEY
National Security Agency/ 3 April 2013
Central Security Service
Information Paper
Subject: (U//FOUO) NSA Intelligence Relationship with Canada’s
Commun...
0.0
What Happened to the United States Customs Service? (part 1)
Document
Release Date:
2017-04-24
Document Date:
2004-11-18
The author explains the transition of the former U.S. Customs Service into the Bureau of Customs and Border Protection and the Bureau of Immigration and Customs Enforcement within the new Department of Homeland Security.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) What Happened to the United States Customs Service? (part 1)<br>FROM:<br>NSA Re...
0.0
DAPINO GAMMA Target Personalisation Centres
Document
Release Date:
2015-02-19
Document Date:
2011-01-01
This 2011 Wiki page details aspects of GCHQ’s DAPINO GAMMA operation against mobile SIM manufacturer Gemalto: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
[edit] Target Personalisation centres ( non 5 eyes):
[edit] France
• La Ciotat
• Meudon - On outskirts of Paris
• PontAudemer
[edit] Poland
Tczew
[edit] Czech Republic
[edit]...
Brazil (BRA/BR), Canada (CAN/CA), China (CHN/CN), Czech Republic (CZE/CZ), Denmark (DNK/DK), Finland (FIN/FI), France (FRA/FR), Germany (DEU/DE), India (IND/IN), Italy (ITA/IT), Japan (JPN/JP), Malaysia (MYS/MY), Mexico (MEX/MX), Norway (NOR/NO), Poland (POL/PL), Russia (RUS/RU), Singapore (SGP/SG), South Africa (ZAF/ZA), Spain (ESP/ES), Sweden (SWE/SE), Taiwan (TWN/TW), United Kingdom (GBR/GB)
0.0
Intro to the VPN Exploitation Process
Document
Release Date:
2014-12-28
Document Date:
2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL
Intro to the VPN Exploitation
Process
OTP VPN Exploitation Team
S31176
September 13, 2010
TOP SECRET//COMINT//REL USA, AUS, CAN, G...
AGILITY, BLEAKINQUIRY, CADENCE, CORALREEF, FOURSCORE, MAILORDER, PINWALE, SCISSORS, TOYGRIPPE, TURTLEPOWER, XKEYSCORE (XKS)
Afghanistan (AFG/AF), China (CHN/CN), India (IND/IN), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Japan (JPN/JP), North Korea (PRK/KP), Korea (KOR/KR), Mexico (MEX/MX), Nigeria (NGA/NG), Pakistan (PAK/PK), Russia (RUS/RU), Saudi Arabia (SAU/SA), Somalia (SOM/SO), Turkey (TUR/TR), United States (USA/US)
0.0
Exhibit F
Document
Release Date:
2014-06-30
Document Date:
2010-07-16
This document lists the 193 governments, intragovernmental organisations and other entities which the NSA was granted the legal authority to intercept communications “about” for foreign intelligence purposes in August 2010: see the Washington Post article Court gave NSA broad leeway in surveillance, 30 June 2014.
TOP SECRET//NOFORN
EXHIBIT F
IN THE MATTER OF FOREIGN GOVERNMENTS, FOREIGN FACTIONS
Ns?F^yyiG#i
11-
ENTITIES, AND FOREIGN-BASED POLITICAL ORGANIZATIONS >■,,
f;f |:VV
DNI/AG 70...
Afghanistan (AFG/AF), Albania (ALB/AL), Algeria (DZA/DZ), Andorra (AND/AD), Angola (AGO/AO), Antigua and Barbuda (ATG/AG), Argentina (ARG/AR), Armenia (ARM/AM), Austria (AUT/AT), Azerbaijan (AZE/AZ), Bahamas (BHS/BS), Bangladesh (BGD/BD), Barbados (BRB/BB), Belarus (BLR/BY), Belgium (BEL/BE), Belize (BLZ/BZ), Benin (BEN/BJ), Bhutan (BTN/BT), Bolivia (BOL/BO), Bosnia and Herzegovina (BIH/BA), Botswana (BWA/BW), Brazil (BRA/BR), Bulgaria (BGR/BG), Burkina Faso (BFA/BF), Burundi (BDI/BI), Cambodia (KHM/KH), Cameroon (CMR/CM), Central African Republic (CAF/CF), Chad (TCD/TD), Chile (CHL/CL), China (CHN/CN), Colombia (COL/CO), Comoros (COM/KM), Congo (COD/CD), Costa Rica (CRI/CR), Croatia (HRV/HR), Cuba (CUB/CU), Cyprus (CYP/CY), Czech Republic (CZE/CZ), Denmark (DNK/DK), Djibouti (DJI/DJ), Dominica (DMA/DM), Dominican Republic (DOM/DO), Ecuador (ECU/EC), Egypt (EGY/EG), El Salvador (SLV/SV), Equatorial Guinea (GNQ/GQ), Eritrea (ERI/ER), Estonia (EST/EE), Ethiopia (ETH/ET), Fiji (FJI/FJ), Finland (FIN/FI), France (FRA/FR), Gabon (GAB/GA), Gambia (GMB/GM), Georgia (GEO/GE), Germany (DEU/DE), Ghana (GHA/GH), Greece (GRC/GR), Grenada (GRD/GD), Guatemala (GTM/GT), Guinea (GIN/GN), Guinea-Bissau (GNB/GW), Guyana (GUY/GY), Haiti (HTI/HT), Vatican (VAT/VA), Honduras (HND/HN), Hungary (HUN/HU), Iceland (ISL/IS), India (IND/IN), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Ireland (IRL/IE), Israel (ISR/IL), Italy (ITA/IT), Jamaica (JAM/JM), Japan (JPN/JP), Jordan (JOR/JO), Kazakhstan (KAZ/KZ), Kenya (KEN/KE), Kiribati (KIR/KI), Korea (KOR/KR), Kuwait (KWT/KW), Kyrgyzstan (KGZ/KG), Latvia (LVA/LV), Lebanon (LBN/LB), Lesotho (LSO/LS), Liberia (LBR/LR), Libya (LBY/LY), Liechtenstein (LIE/LI), Lithuania (LTU/LT), Luxembourg (LUX/LU), Macedonia (MKD/MK), Madagascar (MDG/MG), Malawi (MWI/MW), Malaysia (MYS/MY), Maldives (MDV/MV), Mali (MLI/ML), Malta (MLT/MT), Marshall Islands (MHL/MH), Mauritania (MRT/MR), Mauritius (MUS/MU), Mexico (MEX/MX), Micronesia (FSM/FM), Moldova (MDA/MD), Monaco (MCO/MC), Mongolia (MNG/MN), Montenegro (MNE/ME), Morocco (MAR/MA), Mozambique (MOZ/MZ), Myanmar (MMR/MM), Namibia (NAM/NA), Nauru (NRU/NR), Nepal (NPL/NP), Netherlands (NLD/NL), Nicaragua (NIC/NI), Niger (NER/NE), Nigeria (NGA/NG), Norway (NOR/NO), Oman (OMN/OM), Pakistan (PAK/PK), Palau (PLW/PW), Panama (PAN/PA), Papua New Guinea (PNG/PG), Paraguay (PRY/PY), Peru (PER/PE), Philippines (PHL/PH), Poland (POL/PL), Portugal (PRT/PT), Qatar (QAT/QA), Romania (ROU/RO), Russia (RUS/RU), Rwanda (RWA/RW), Saint Kitts and Nevis (KNA/KN), Saint Lucia (LCA/LC), Samoa (WSM/WS), San Marino (SMR/SM), Sao Tome and Principe (STP/ST), Senegal (SEN/SN), Serbia (SRB/RS), Seychelles (SYC/SC), Sierra Leone (SLE/SL), Singapore (SGP/SG), Slovakia (SVK/SK), Slovenia (SVN/SI), Somalia (SOM/SO), South Africa (ZAF/ZA), Spain (ESP/ES), Sri Lanka (LKA/LK), Sudan (SDN/SD), Suriname (SUR/SR), Swaziland (SWZ/SZ), Sweden (SWE/SE), Switzerland (CHE/CH), Taiwan (TWN/TW), Tajikistan (TJK/TJ), Tanzania (TZA/TZ), Thailand (THA/TH), Timor-Leste (TLS/TL), Togo (TGO/TG), Tonga (TON/TO), Tunisia (TUN/TN), Turkey (TUR/TR), Turkmenistan (TKM/TM), Tuvalu (TUV/TV), Uganda (UGA/UG), Ukraine (UKR/UA), United States (USA/US), Uruguay (URY/UY), Uzbekistan (UZB/UZ), Vanuatu (VUT/VU), Venezuela (VEN/VE), Vietnam (VNM/VN), Western Sahara (ESH/EH), Yemen (YEM/YE), Zambia (ZMB/ZM), Zimbabwe (ZWE/ZW)
0.0
Silent Success: SIGINT Synergy Helps Shape US Foreign Policy
Document
Release Date:
2013-08-02
Document Date:
2010-08-30
This August 2010 post from the internal NSA newsletter SIDtoday shows how the agency aided US diplomacy on the issue of Iran sanctions – by surveilling the communications of other members of the UN Security Council: see the Época article Spies of the digital age, 2 August 2013.
investiga_1.jpg:
I Öl» Si
cret comint SOI ORN
.•«tv 1Ic\ps Sh*P* ^ ^
• SK.IV» Svncie l,c*
(llWW.0> Silent sue««: SK
j| ■ Koreift*» l*ol»c>
A, the outset of these .engihy uegottati...
0.0
SSO dictionary – MYSTIC
Document
Release Date:
2014-05-19
This extract is taken from an undated dictionary produced by NSA Special Source Operations, providing glosses for several terms associated with MYSTIC operations. The name of one country has been redacted: see the Intercept article Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas, 19 May 2014. Download […]
BASECOAT (TS//SI//NF) MYSTIC acess; Bahamas A-link GSM. DEA access under LI that collects Counter-Narcotic (CN) targets. There are two sites located in the Bahamas. It is currently being used as a...
0.0
Broadcast/Intenet Radio Exploitation and Analysis
Document
Release Date:
2015-09-25
Document Date:
2009-11-06
This GCHQ research paper from 6 November 2009 outlines what kinds of data the agency can extract from internet radio stations and their listenership, grouped by country: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
broadcast-analysis-p1-normal.gif:
UK TOP SECRET//COMINT//REL FVEY
Broadcast/lnternet Radio
Exploitation and Analysis
6th November 2009
OPD-NAC
Distribution (via email)
(ST2)
BS...
Afghanistan (AFG/AF), Algeria (DZA/DZ), Argentina (ARG/AR), China (CHN/CN), Czech Republic (CZE/CZ), Egypt (EGY/EG), France (FRA/FR), Germany (DEU/DE), Iran (IRN/IR), Iraq (IRQ/IQ), Ireland (IRL/IE), Italy (ITA/IT), Japan (JPN/JP), Kazakhstan (KAZ/KZ), Mauritania (MRT/MR), Mexico (MEX/MX), Netherlands (NLD/NL), Pakistan (PAK/PK), Romania (ROU/RO), Russia (RUS/RU), Singapore (SGP/SG), South Africa (ZAF/ZA), Spain (ESP/ES), Sudan (SDN/SD), Tanzania (TZA/TZ), Ukraine (UKR/UA), United Kingdom (GBR/GB), United States (USA/US), Zimbabwe (ZWE/ZW)
0.0
Your target is using a BlackBerry? Now what?
Document
Release Date:
2013-09-09
This slide, from an undated NSA presentation, shows that the agency is able to defeat BlackBerry encryption technology – using an email from a Mexican government official as an example: see the Der Spiegel article iSpy: How the NSA Accesses Smartphone Data, 9 September 2013.
TOPSECRET//COMNÏ//RH TO USA, FVEY
(U) Post Processed BES collection
t Type
Data Type
Mensaje original
De:
Enviado el:
Para:
Asunto: RE: URGENTE:
Gracias.
TOP SE...
0.0
The International Security Issues Build-Out
Document
Release Date:
2013-12-02
Document Date:
2012-11-09
This update from the NSANet intranet shows that the International Security Issues section of the agency shows a growing emphasis on gathering economic and financial information on the 13 countries under its remit: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
Welcome! Friday. 09 Nov 2012
• Web search
• Agency-all Emails
• SID-all Emai...
0.0
Geopolitical trends for 2014-2019
Document
Release Date:
2013-12-02
Three redacted slides from an NSA presentation name several states as subjects of ongoing interest: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
slide1.jpg:
slide2.jpg:
TOP SECRET//SI//REL TO USA, FVEY
U//JEQUOslide3.jpg:
rTO USA, FYEY
Geopolitical Trends: Global Drivers
(S//REL) Geopolitical Trend driver»:
• St re**orc to...
0.0
Passing on Target Expertise... IT Support... Averting an Assassination -- An Interview with REDACTED
Document
Release Date:
2017-04-24
Document Date:
2004-12-13
The chief of intelligence security issues describes an exciting career, which began with averting an assassination attempt against a congressional delegation by narco-insurgents in Asia. In the chief's opinion, the NSA needs better IT tools and functionalities, from web access to better PCs.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Passing on Target Expertise... IT Support... Averting an<br>Assassination -- An...
0.0
MG Q Iraq Theater TDY: Day 3, April 1, 2005
Document
Release Date:
2017-09-13
Document Date:
2005-04-06
A staffer from the Iraq Issue Management Team relates his experience in Baghdad, on his first trip to a war zone.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(U) MG Q Iraq Theater TDY: Day 3, April1, 2005
FROM:
Iraq Issue Management Team
Run Date: 04...
0.0
Remember the Alamo!
Document
Release Date:
2017-09-13
Document Date:
2005-02-25
A staffer at the Medina Regional Security Operations Center in San Antonio highly recommends moving to the city, despite Texas's high car insurance premiums for teenagers.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(U) Remember the Alamo!
FROM:
Chief, Communications and Support Services, NSA/CSS Texas (MRS...
0.0
GCSB XKeyScore fingerprint – May 2013
Document
Release Date:
2015-03-23
Document Date:
2013-05-06
This XKeyScore fingerprint, last modified on 6 May 2013, shows that New Zealand’s GCSB monitored candidates for the post of WTO director general: see the New Zealand Herald article How spy agency homed in on Groser’s rivals, 23 March 2015.
Classification:
5-eyes releasable
Top Secret
COMINT
Last modified: 2013-05-06
NOTE WELL that the contents of this file are managed by the GUI.
Any manual updates to this file will be o...
0.0
Finding Nuggests — Quickly — in a Heap of Voice Collection, From Mexico to Afghanistan
Document
Release Date:
2015-05-05
Document Date:
2011-05-25
This 25 May 2011 post from the NSA internal newsletter SIDToday describes the agency’s development of speech to text technology: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
(S//SI//REL) Finding Nuggets -- Quickly — in a Heap of Voice Collection, From Mexico to
Afghanistan
FROM: (U//FOUO)^^^^^^|
Senior Technical Development Program — Class of 2010, and Intell...
0.0
SIGINTers Use Human Language Technology to Great Advantage, Isolate Conversation About Threat to US
Document
Release Date:
2018-01-19
Document Date:
2010-09-14
This September 2010 article from the internal NSA newsletter SIDToday recounts how voice recognition technology enabled analysts to find the salient record from over 1300 voice conversations in “less than four minutes”: see the Intercept article Finding Your Voice, 19 January 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(TS//SI//REL) SIGINTers Use Human Language Technology to Great
Advantage, Isolate Convers...
0.0
GOOOOAAAALLLL!!! — World Cup Report From SUSLAG
Document
Release Date:
2018-03-01
Document Date:
2006-08-25
This SIDToday report from August 2006 describes the role played by NSA, Germany’s BND and the Sigint Seniors Counterterrorism alliance (SISECT) during 2006’s World Cup: see the Intercept article The Powerful Global Spy Alliance You Never Knew Existed, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(U) GOOOOAAAALLLL!!! -- World Cup Report from SUSLAG
FROM: Special US Liaison Activity Ge...
0.0
Supporting HMG’s Climate Change Ambitions (… or, “A GCO’s tales from Cancun”)
Document
Release Date:
2014-11-01
Document Date:
2011-02-01
This joint GCHQ/MI6 presentation from February 2011 documents the process of international climate change negotiations becoming a “serious intelligence priority” for the UK: see the Dagbladet Information article Snowden documents reveal British climate espionage – Copenhagen climate summit targeted, 1 November 2014.
GCHQ
SECRET
INTELLIGENCE
SERVICE
Supporting HMG’s
Climate Change Ambitions
(...or, “A GCO’s tales from Cancún”)
27 November - 10 December 2010
GCHQ
SECRET
INTELLI...
0.0
MYSTIC fact sheet
Document
Release Date:
2014-05-19
This undated NSA Special Source Operations memo explains MYSTIC a collaboration between various US agencies that collects signals from telecoms networks by means of devices have been installed for ostenisbly “legitimate commercial services”: see the Intercept article Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas, 19 May […]
(U) General Information
MYSTIC
Year Established
Description
Intelligence Value
Major Targets
Major Benefactors
& users of Information
(U) 2009
(TS//SI//NF) MYSTIC is an SS...
0.0
'Key Reads' Effort Expands, Scores Successes
Document
Release Date:
2018-03-01
Document Date:
2005-09-26
The “key reads” process, first developed for Central Command needs in Operation Iraqi Freedom, has been expanded to more topics and customers. Key reads respond to specific customer requests in less than three days.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(C//SI) 'Key Reads' Effort Expands, Scores Successes
FROM:
Requirements Analysis Center (S114...
0.0
Army Values Ingrained in Every New Recruit
Document
Release Date:
2017-09-13
Document Date:
2005-05-19
For Army Day, Maj. Gen. Richard Quirk delivers lengthy remarks about the history and ethos of the U.S. Army, and urges Signals Intelligence Directorate staff to "recommit yourself to the Country, the mission, and your fellow soldiers."
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(U) Army Values Ingrained in Every New Recruit
FROM: MG Richard Quirk, USA
Signals Intelligen...