Filtered By
North Korea (PRK/KP) X
Countries Mentioned [filter]
Results
35 Total
0.0

Classification Guide for SIGINT Material Dating from 16 August 1945 – 31 December 1967

Document

Release Date: 2014-06-18 Document Date: 2011-11-21
This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
TOP SECRET//SjyTK//NOFÜRN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR SIGINT Material Dating from 16 August 1945 *31 December 1967 Effects Dale: 21 De...
0.0

January 2007 Strategic Mission List

Document

Release Date: 2013-11-02 Document Date: 2007-01-01
This nine-page briefing describes the NSA’s major missions and signals intelligence priorities for 2007: see the New York Times article No Morsel Too Minuscule for All-Consuming N.S.A., 2 November 2013.
nsa-mission-list-1.png: SECRET//COMINT//REL TO USA. ALS. CAN. GBR//20291123 United States S1GINT System January 2007 Strategic Mission List Introduction - Director’s Intent (S//SI) The ...
0.0

When Meeting Customer Needs Means Defending the Nation

Document

Release Date: 2016-05-16 Document Date: 2003-04-16
Introduction to SID’s Customer Relationships Directorate series and summary of future articles.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) When Meeting Customer Needs Means Defending the Nation<br>FROM:<br>Acting Chief,...
0.0

SID's 'Hot Pursuit' Targets North Korea

Document

Release Date: 2016-08-10 Document Date: 2003-08-13
SID’s Office of Target Pursuit has redoubled analytic efforts against North Korea, where results are often frustrating. Employing the “Hot Pursuit” idea implemented for the Iraq conflict, a multidisciplinary group within SID has been formed to focus on the target.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) SID's 'Hot Pursuit' Targets North Korea<br>FROM:<br>Asia Target Analysis<br>...
0.0

Second Party Bilaterals Held in Hawaii

Document

Release Date: 2016-08-10 Document Date: 2003-10-02
SID Director Quirk met with Australian and New Zealand partners in Hawaii.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Second Party Bilaterals Held in Hawaii<br>FROM:<br>Deputy SUSLO Canberra<b...
0.0

Third North Korea Rock Drill Breaks New Ground

Document

Release Date: 2016-08-10 Document Date: 2003-12-02
Summary of the third North Korea “rock drill,” a three-day meeting held by the North Korea Issue Management Team where NSA worked with the State Department to create strategy to support the State Department’s goals.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) Third North Korea Rock Drill Breaks New Ground<br>FROM: the North Korea Issu...
0.0

Korea ROCK DRILL 4 Outshines the Sun In Hawaii

Document

Release Date: 2016-12-07 Document Date: 2004-02-09
The Korea Issue Management Team held a rock drill in Hawaii designed to test the cryptologic system's capabilities in a war on the Korean peninsula. The scenario was a North Korean attack on South Korea.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) Korea ROCK DRILL 4 Outshines the Sun In Hawaii<br>FROM:<br>Data Acquisition...
0.0

NSA China Forum - May 6th

Document

Release Date: 2016-12-07 Document Date: 2004-05-05
Experts on Asia will lead an unclassified discussion titled "Northeast Asian Security: Moving Toward a Regional Security Framework?"
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) NSA China Forum - May 6th<br>FROM:<br>PRC Foreign Affairs (S2B34)<br>Run Date: ...
0.0

Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations

Document

Release Date: 2015-04-02 Document Date: 2011-03-10
These extracts from a GCHQ paper dated 10 March 2011 provide an indication of the agency’s ongoing effects (misinformation) and “online HUMINT” operations: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.s
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations PhD Human Systems Group, Information Management ...
0.0

CSEC Cyber Threat Capabilities

Document

Release Date: 2015-03-23 Document Date: 2011-01-01
This CSE presentation from 2011 describes some of the cyber warfare tools at the agency’s disposal: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.
■ ^ ■ Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY Establishment Canada des télécommunications Canada CSEC Cyber Threat Capabilities SIGINT and ITS: an en...
0.0

2008-13 Strategic Plan

Document

Release Date: 2013-11-02 Document Date: 2007-10-03
This eleven page document describes how the NSA sees its own mission, internal culture and the challenges it faces: see the New York Times article No Morsel Too Minuscule for All-Consuming N.S.A., 2 November 2013.
nsa-mission-plan-1.png: TOP SECRET//COMINT//REL TO USA, FVEY//20320108 (U) SIGINT Mission Strategic Plan FY2008-2013 3 October 2007 Release ¡Signals Intelligence Derived From: N...
0.0

Uncovering North Korea Nuclear Programs

Document

Release Date: 2016-05-16 Document Date: 2003-04-09
Based on NSA SIGINT, the State Department confronted North Korean officials with evidence they were developing a uranium enrichment capability.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) Uncovering North Korea Nuclear Programs<br>FROM: Frances J. Fleisch<br>Deput...
0.0

IAI Presentation: Ambassador Wendy Sherman, Albright Group, 27 April

Document

Release Date: 2016-12-07 Document Date: 2004-04-22
Ambassador Wendy Sherman will speak to staff on North Korea and non-proliferation. The discussion will be unclassified as the speaker is not cleared.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) IAI Presentation: Ambassador Wendy Sherman, Albright<br>Group, 27 April<b...
0.0

Korea ROCK DRILL 5 Shatters Seoul's Morning Calm

Document

Release Date: 2016-12-07 Document Date: 2004-05-19
Rock Drill 5 tested the cryptologic capability for an allied counteroffensive into North Korea. It was the first exercise of its type to be held with a third-party partner, South Korea's Defense Security Agency.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) Korea ROCK DRILL 5 Shatters Seoul's Morning Calm<br>FROM: the North Korea I...
0.0

Ambassador Wendy Sherman Speaks on North Korea

Document

Release Date: 2016-12-07 Document Date: 2004-05-04
Ambassador Sherman believes that North Korea will continue its nuclear program or may have already succeeded in developing weapons. SIGINT on the issue was "absolutely indispensable" and "critical for arms control and verification."
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Ambassador Wendy Sherman Speaks on North Korea<br>FROM: SIGINT Communications<b...
0.0

Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations

Document

Release Date: 2015-06-22 Document Date: 2011-03-22
This 42-page report from 10 March 2011 provides an overview of GCHQ’s information operations unit and the behavioural science theories that underpin its activities: see the Intercept article Controversial GCHQ Unit is Deeply Engaged in Law Enforcement, 22 June 2015.
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations Mandeep K. Dhami, PhD Human Systems Group, Infor...
0.0

Black Budget – Israel

Document

Release Date: 2013-08-29 Document Date: 2012-02-01
These three short extracts from the 2013 Intelligence Community Budget Justification (“the Black Budget”) shows that Israel was seen as a counter-intelligence target: see the Intercept article Netanyahu’s Spying Denials Contradicted by Secret NSA Documents, 25 March 2015.
1Isr-540x258.png: (U> Penetrate Hostile Foreign Intelligence Services (S//NF) The ability to detect and engage foreign intelligence services and non state actors that target U.S. interests is...
0.0

Is there “fifth party” collection?

Document

Release Date: 2015-01-17 Document Date: 2011-01-01
This undated post from an NSA discussion board describes “fourth party collection” – piggybacking on another state’s computer network exploitation operation: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
(TS//SI//REL) Is there "fifth party" collection? | Round Table Dynamic Page - Highest Possible Classification is TOP SECRET // SI / TK // REL TO USA, FVEY (TS//SI//REL) Is there "fifth part...
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

Dynamic Methods of Interaction with New and Existing Customers

Document

Release Date: 2016-05-16 Document Date: 2003-04-22
After 9/11, SID suddenly got an influx of requests from previously minor customers (like the departments of Interior and Agriculture), acquired many new customers, and had to interact differently with law enforcement. In response, CRD designed new products to be more flexible with secret documents (allowing them to be accessed outside of SCIFs, on mobile devices, etc.).
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Dynamic Methods of Interaction with New and Existing Customers<br>FROM:<br>Actin...
0.0

North Korea Rock Drill Held This Week

Document

Release Date: 2016-05-16 Document Date: 2003-06-20
A North Korea “rock drill” featuring experts from across the cryptologic community was held to prepare the cryptologic system to better support policymakers and war fighters.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) North Korea Rock Drill Held This Week<br>FROM: the North Korean Issue Manage...
0.0

Update on OpSIGINT

Document

Release Date: 2016-12-07 Document Date: 2004-06-10
The daily demands of producing SIGINT use up everyone's energy and leave little time for innovation. Operation SIGINT — a "small team working on behalf of SID senior leadership to tackle today's impediments with innovative solutions in important, target areas" — is recruiting.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) Update on OpSIGINT<br>FROM: Maria Magoulas-Perkins<br>OpSIGINT Lead<br>Ru...
0.0

NSA Intelligence Relationship with New Zealand

Document

Release Date: 2015-03-10 Document Date: 2013-04-01
This NSA information paper from April 2013 describes the state of the agency’s intelligence relationship with its New Zealand counterpart: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY National Security Agency April 2013 Central Security Service Information Paper (U) Subject: NSA Intelligence Relationship with New Zealand (U) Execu...
0.0

NIOC Maryland Advanced Computer Network Operations Course

Document

Release Date: 2015-01-17 Document Date: 2012-04-18
This April 2012 training presentation produced by Navy Information Operations Command Maryland states that “the next major conflict will start in cyberspace”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
NIOC MARYLAND ADVANCED COMPUTER NETWORK OPERATIONS COURSE Coordinated by -- NAVIOCOM Maryland Center of Excellence for Non-Kinetic Options — 1 SECRET//REL TO USA, / Title • C...
0.0

MG Q, Where Are You?

Document

Release Date: 2016-05-16 Document Date: 2003-06-25
The SIGINT director went with the NSA director to the Palliser Conference, an annual meeting of the five-eyes SIGINT and HUMINT agencies.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) MG Q, Where Are You?<br>FROM: SIGINT Communications<br>Unknown<br>Run Date: 06/2...
0.0

North Korea MULTI-INT Process

Document

Release Date: 2016-08-10 Document Date: 2003-10-09
SID is building a process for gathering requirements from customers using a “multi-intelligence” process. Based on success of this approach in Operation Iraqi Freedom, NSA is using it to support North Korea Campaign planning.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S) North Korea MULTI-INT Process<br>FROM:<br>Customer Gateway (S11)<br>Run Date: 10...
0.0

Passing on Target Expertise... IT Support... Averting an Assassination -- An Interview with REDACTED

Document

Release Date: 2017-04-24 Document Date: 2004-12-13
The chief of intelligence security issues describes an exciting career, which began with averting an assassination attempt against a congressional delegation by narco-insurgents in Asia. In the chief's opinion, the NSA needs better IT tools and functionalities, from web access to better PCs.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Passing on Target Expertise... IT Support... Averting an<br>Assassination -- An...
0.0

CRASH Team

Document

Release Date: 2017-04-24 Document Date: 2004-08-16
A team of SID experts is collaborating to uncover North Korea's global financial assets and intelligence on its leadership's financial activities. One key to its success is access to North Korean transaction data routed through foreign banks.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) CRASH Team<br>FROM:<br>(S//SI) Follow-the-Money (S2C22)<br>Run Date: 08/1...
0.0

1999 Agreement between the US and Israel

Document

Release Date: 2014-08-04 Document Date: 1999-07-15
This agreement, dated 15 July 1999, includes a preamble describing the development of signals intelligence cooperation between the US and Israel since the 1950s: see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
TOP S E C R E T/HVCCO 1. (S) preamblei in 1968 President Johnson and Prime Minister Eshkol agreed that an intelligence exchange would take place between the United States and Israel. This und...
0.0

2013 Intelligence Community budget justification

Document

Release Date: 2013-08-29 Document Date: 2012-02-01
Congressional Budget Justification summary for fiscal year 2013 from the Office of the Director of National Intelligence (ODNI): see the Washington Post article U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary, 29 August 2013.
TOP SECRET//SI/TK//NOFORN FY 2013 Congressional Budget Justification Volume I NATIONAL INTELLIGENCE PROGRAM SUMMARY February 2012 TOP SECRET//SI/TK//NOFORN TOP SECRET//SI/TK//...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh