Filtered By
North Korea (PRK/KP) X
Countries Mentioned [filter]
Results
40 Total
0.0

Apportionment of Strategic Efforts -- Our Plan of Attack

Document

Release Date: 2018-03-01 Document Date: 2006-02-15
U.S. Signals Intelligence System resources are allocated in the following areas: 35 percent are dedicated to the global war on terrorism; 35 percent are dedicated to China, North Korea, Iran, and Russia; 20 percent go to remaining strategic focus areas; and 10 percent are set aside for development in data acquisition, signals development, or analysis and production.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) Apportionment of Strategic Efforts -- Our Plan of Attack FROM: SIGINT Communication...
0.0

Classification Guide for SIGINT Material Dating from 16 August 1945 – 31 December 1967

Document

Release Date: 2014-06-18 Document Date: 2011-11-21
This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
TOP SECRET//SjyTK//NOFÜRN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR SIGINT Material Dating from 16 August 1945 *31 December 1967 Effects Dale: 21 De...
0.0

Second Party Bilaterals Held in Hawaii

Document

Release Date: 2016-08-10 Document Date: 2003-10-02
SID Director Quirk met with Australian and New Zealand partners in Hawaii.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Second Party Bilaterals Held in Hawaii<br>FROM:<br>Deputy SUSLO Canberra<b...
0.0

Third North Korea Rock Drill Breaks New Ground

Document

Release Date: 2016-08-10 Document Date: 2003-12-02
Summary of the third North Korea “rock drill,” a three-day meeting held by the North Korea Issue Management Team where NSA worked with the State Department to create strategy to support the State Department’s goals.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) Third North Korea Rock Drill Breaks New Ground<br>FROM: the North Korea Issu...
0.0

Korea ROCK DRILL 4 Outshines the Sun In Hawaii

Document

Release Date: 2016-12-07 Document Date: 2004-02-09
The Korea Issue Management Team held a rock drill in Hawaii designed to test the cryptologic system's capabilities in a war on the Korean peninsula. The scenario was a North Korean attack on South Korea.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) Korea ROCK DRILL 4 Outshines the Sun In Hawaii<br>FROM:<br>Data Acquisition...
0.0

NSA China Forum - May 6th

Document

Release Date: 2016-12-07 Document Date: 2004-05-05
Experts on Asia will lead an unclassified discussion titled "Northeast Asian Security: Moving Toward a Regional Security Framework?"
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) NSA China Forum - May 6th<br>FROM:<br>PRC Foreign Affairs (S2B34)<br>Run Date: ...
0.0

SID's 'Hot Pursuit' Targets North Korea

Document

Release Date: 2016-08-10 Document Date: 2003-08-13
SID’s Office of Target Pursuit has redoubled analytic efforts against North Korea, where results are often frustrating. Employing the “Hot Pursuit” idea implemented for the Iraq conflict, a multidisciplinary group within SID has been formed to focus on the target.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) SID's 'Hot Pursuit' Targets North Korea<br>FROM:<br>Asia Target Analysis<br>...
0.0

When Meeting Customer Needs Means Defending the Nation

Document

Release Date: 2016-05-16 Document Date: 2003-04-16
Introduction to SID’s Customer Relationships Directorate series and summary of future articles.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) When Meeting Customer Needs Means Defending the Nation<br>FROM:<br>Acting Chief,...
0.0

Is there “fifth party” collection?

Document

Release Date: 2015-01-17 Document Date: 2011-01-01
This undated post from an NSA discussion board describes “fourth party collection” – piggybacking on another state’s computer network exploitation operation: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
(TS//SI//REL) Is there "fifth party" collection? | Round Table Dynamic Page - Highest Possible Classification is TOP SECRET // SI / TK // REL TO USA, FVEY (TS//SI//REL) Is there "fifth part...
0.0

Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations

Document

Release Date: 2015-04-02 Document Date: 2011-03-10
These extracts from a GCHQ paper dated 10 March 2011 provide an indication of the agency’s ongoing effects (misinformation) and “online HUMINT” operations: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.s
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations PhD Human Systems Group, Information Management ...
0.0

CSEC Cyber Threat Capabilities

Document

Release Date: 2015-03-23 Document Date: 2011-01-01
This CSE presentation from 2011 describes some of the cyber warfare tools at the agency’s disposal: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.
■ ^ ■ Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY Establishment Canada des télécommunications Canada CSEC Cyber Threat Capabilities SIGINT and ITS: an en...
0.0

SUSLAK's 'News of the World'

Document

Release Date: 2018-03-01 Document Date: 2005-08-18
Since 1996, a Cryptologic Services Group special liaison in Seoul has been sending out an informal daily email newsletter for NSA staff targeting North Korea. The newsletter is focused on key intelligence issues encountered by U.S. Forces Korea. The liaison staffer is hoping to turn the newsletter into a blog, but is “not sure NSA’s computer systems or philosophy is ready for such a thing.”
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) SUSLAK's 'News of the World' FROM: John Sharon CSG USFK/Ground (F45) Run Date: 08/18/2005...
0.0

Ambassador Wendy Sherman Speaks on North Korea

Document

Release Date: 2016-12-07 Document Date: 2004-05-04
Ambassador Sherman believes that North Korea will continue its nuclear program or may have already succeeded in developing weapons. SIGINT on the issue was "absolutely indispensable" and "critical for arms control and verification."
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Ambassador Wendy Sherman Speaks on North Korea<br>FROM: SIGINT Communications<b...
0.0

IAI Presentation: Ambassador Wendy Sherman, Albright Group, 27 April

Document

Release Date: 2016-12-07 Document Date: 2004-04-22
Ambassador Wendy Sherman will speak to staff on North Korea and non-proliferation. The discussion will be unclassified as the speaker is not cleared.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) IAI Presentation: Ambassador Wendy Sherman, Albright<br>Group, 27 April<b...
0.0

Korea ROCK DRILL 5 Shatters Seoul's Morning Calm

Document

Release Date: 2016-12-07 Document Date: 2004-05-19
Rock Drill 5 tested the cryptologic capability for an allied counteroffensive into North Korea. It was the first exercise of its type to be held with a third-party partner, South Korea's Defense Security Agency.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) Korea ROCK DRILL 5 Shatters Seoul's Morning Calm<br>FROM: the North Korea I...
0.0

Uncovering North Korea Nuclear Programs

Document

Release Date: 2016-05-16 Document Date: 2003-04-09
Based on NSA SIGINT, the State Department confronted North Korean officials with evidence they were developing a uranium enrichment capability.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) Uncovering North Korea Nuclear Programs<br>FROM: Frances J. Fleisch<br>Deput...
0.0

EP-3E Collision: Cryptologic Damage Assessment and Incident Review

Document

Release Date: 2017-04-10 Document Date: 2001-07-01
A joint US Navy and NSA report, prepared three months after a US spy plane was forced to crash land in China, assesses the degree to which surveillance secrets were compromised: see the Intercept article Burn After Reading: Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident, 10 April 2017. […]
TOP SECRET//COMINT//NOFORN//X1 EP-3E Collision: Cryptologic Damage Assessment and Incident Review Final Report Prepared by the EP-3 Cryptologic Assessment Team July 2001 Classifie...
0.0

Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations

Document

Release Date: 2015-06-22 Document Date: 2011-03-22
This 42-page report from 10 March 2011 provides an overview of GCHQ’s information operations unit and the behavioural science theories that underpin its activities: see the Intercept article Controversial GCHQ Unit is Deeply Engaged in Law Enforcement, 22 June 2015.
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations Mandeep K. Dhami, PhD Human Systems Group, Infor...
0.0

Black Budget – Israel

Document

Release Date: 2013-08-29 Document Date: 2012-02-01
These three short extracts from the 2013 Intelligence Community Budget Justification (“the Black Budget”) shows that Israel was seen as a counter-intelligence target: see the Intercept article Netanyahu’s Spying Denials Contradicted by Secret NSA Documents, 25 March 2015.
1Isr-540x258.png: (U> Penetrate Hostile Foreign Intelligence Services (S//NF) The ability to detect and engage foreign intelligence services and non state actors that target U.S. interests is...
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

Update on OpSIGINT

Document

Release Date: 2016-12-07 Document Date: 2004-06-10
The daily demands of producing SIGINT use up everyone's energy and leave little time for innovation. Operation SIGINT ”” a "small team working on behalf of SID senior leadership to tackle today's impediments with innovative solutions in important, target areas" ”” is recruiting.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) Update on OpSIGINT<br>FROM: Maria Magoulas-Perkins<br>OpSIGINT Lead<br>Ru...
0.0

North Korea Rock Drill Held This Week

Document

Release Date: 2016-05-16 Document Date: 2003-06-20
A North Korea “rock drill” featuring experts from across the cryptologic community was held to prepare the cryptologic system to better support policymakers and war fighters.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) North Korea Rock Drill Held This Week<br>FROM: the North Korean Issue Manage...
0.0

Dynamic Methods of Interaction with New and Existing Customers

Document

Release Date: 2016-05-16 Document Date: 2003-04-22
After 9/11, SID suddenly got an influx of requests from previously minor customers (like the departments of Interior and Agriculture), acquired many new customers, and had to interact differently with law enforcement. In response, CRD designed new products to be more flexible with secret documents (allowing them to be accessed outside of SCIFs, on mobile devices, etc.).
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Dynamic Methods of Interaction with New and Existing Customers<br>FROM:<br>Actin...
0.0

NIOC Maryland Advanced Computer Network Operations Course

Document

Release Date: 2015-01-17 Document Date: 2012-04-18
This April 2012 training presentation produced by Navy Information Operations Command Maryland states that “the next major conflict will start in cyberspace”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
NIOC MARYLAND ADVANCED COMPUTER NETWORK OPERATIONS COURSE Coordinated by -- NAVIOCOM Maryland Center of Excellence for Non-Kinetic Options — 1 SECRET//REL TO USA, / Title • C...
0.0

NSA Intelligence Relationship with New Zealand

Document

Release Date: 2015-03-10 Document Date: 2013-04-01
This NSA information paper from April 2013 describes the state of the agency’s intelligence relationship with its New Zealand counterpart: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY National Security Agency April 2013 Central Security Service Information Paper (U) Subject: NSA Intelligence Relationship with New Zealand (U) Execu...
0.0

SINIO Summer Seminar Intelligence in the Wake of the Iraq WMD NIE

Document

Release Date: 2018-03-01 Document Date: 2005-09-14
The senior intelligence officer for weapons of mass destruction proliferation will speak at a brown bag seminar on the topic: “If the Intelligence Community was so wrong about Iraq, how can the IC’s WMD assessments on North Korea and Iran be trusted?”
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) SINIO Summer Seminar Intelligence in the Wake of the Iraq WMD NIE FROM: Marilyn Mai...
0.0

Passing on Target Expertise... IT Support... Averting an Assassination -- An Interview with REDACTED

Document

Release Date: 2017-04-24 Document Date: 2004-12-13
The chief of intelligence security issues describes an exciting career, which began with averting an assassination attempt against a congressional delegation by narco-insurgents in Asia. In the chief's opinion, the NSA needs better IT tools and functionalities, from web access to better PCs.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Passing on Target Expertise... IT Support... Averting an<br>Assassination -- An...
0.0

Korea ROCK DRILL 7 Opens Eyes

Document

Release Date: 2017-09-13 Document Date: 2005-06-17
The May 2005 Rock Drill in Seoul tested the cryptologic system in exercise scenarios of defending South Korea from attack and warning of North Korea's collapse.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Korea ROCK DRILL 7 Opens Eyes FROM: and Asia-Pacific Issue Management Team Run Date: 0...
0.0

Is NSA Correctly Postured Against the Most Critical Missions?

Document

Release Date: 2017-09-13 Document Date: 2005-06-09
Signals Intelligence Directorate leadership decides where to expend the most resources based on the SIGINT Mission List. The list includes 15 critical functional missions -- each of which has an area of focus and an area in which SID decides not to devote as much attention, thus accepting some amount of risk. China, North Korea, Iraq, Iran, and Russia are "regarded as 'trump cards'" and can take priority over any one of these missions.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Is NSA Correctly Postured Against the Most Critical Missions? FROM: MG Richard Quirk, USA...
0.0

North Korea MULTI-INT Process

Document

Release Date: 2016-08-10 Document Date: 2003-10-09
SID is building a process for gathering requirements from customers using a “multi-intelligence” process. Based on success of this approach in Operation Iraqi Freedom, NSA is using it to support North Korea Campaign planning.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S) North Korea MULTI-INT Process<br>FROM:<br>Customer Gateway (S11)<br>Run Date: 10...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh