Filtered By
Pakistan (PAK/PK)X
Countries Mentioned [filter]
Results
50 Total
1.0

NSA Intelligence Relationship with New Zealand

Document

Document Date: 2013-04-01Release Date: 2015-03-10
This NSA information paper from April 2013 describes the state of the agency’s intelligence relationship with its New Zealand counterpart: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY National Security Agency April 2013 Central Security Service Information Paper (U) Subject: NSA Intelligence Relationship with New Zealand (U) Execu...
1.0

Guide to using Contexts in XKS Fingerprints

Document

Release Date: 2015-07-01
This undated NSA technical document provides detailed information for performing searches within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.s
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL Guide to using Contexts in XKS Fingerprints Version 1.0 Example 1 $a = cc('pk') and (web_search('jihad') or document_body('planning for ...
1.0

HTTP Activity in XKEYSCORE

Document

Document Date: 2009-03-01Release Date: 2015-07-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HTTP Activity in XKEYSCORE March 2009 Derived From: NSA/QSSM 1-52 Dated: 200701 (T Declassify On: 202911 ...
1.0

Tech Strings in Documents (aka Tech Extractor) 2010

Document

Document Date: 2010-04-01Release Date: 2015-07-01
This April 2010 NSA presentation explains how keyword selection works within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-tech-extractor-2010-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. AUS, CAN. GBR, NZL Tech Strings in Documents (aka Tech Extractor) TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZLx...
1.0

Broadcast/Intenet Radio Exploitation and Analysis

Document

Document Date: 2009-11-06Release Date: 2015-09-25
This GCHQ research paper from 6 November 2009 outlines what kinds of data the agency can extract from internet radio stations and their listenership, grouped by country: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
broadcast-analysis-p1-normal.gif: UK TOP SECRET//COMINT//REL FVEY Broadcast/lnternet Radio Exploitation and Analysis 6th November 2009 OPD-NAC Distribution (via email) (ST2) BS...
1.0

Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities

Document

Document Date: 2007-01-01Release Date: 2013-12-09
A 2007 proposal to the NSA from contractor SAIC, promoting the company’s ability to support “intelligence collection in the games space”: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 December 2013.
Games: A Look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities Table of Contents FORWARD......................................................................4 ...
1.0

Shotgiant

Document

Document Date: 2010-01-01Release Date: 2014-03-22
Selected slides, some with speaking notes, drawn from a 2010 NSA presention, describe the aims of the agency’s operations against Chinese company Huawei: see the New York Times article N.S.A. Breached Chinese Servers Seen as Security Threat, 22 March 2014.
(U) Why We Care (TS//SI//REL TO USA, FVEY) S2 - many of our targets communicate over Huawei produced products (TS//SI//REL TO USA, FVEY) S3 - design, deployment & market expansion imp...
1.0

FY2013 Foreign Partner Review

Document

Document Date: 2013-01-01Release Date: 2014-05-13
This slide, taken from the NSA’s annual review of its cooperation with foreign partners, shows an expansion in the agency’s international relationships: see the book No Place To Hide, 13 May 2014.
Page 123 TOP SECRET// COMINT //REL USA, AUS, CAN, GBR, NZL Approved SIGINT Partners ^ORTUtt^ Second Parties Third Parties Australia Algeria Israel Spain Canada Austria Italy Sweden...
1.0

FY2012 Foreign Partner Review

Document

Document Date: 2012-01-01Release Date: 2014-05-13
This slide, taken from the NSA’s annual report on the state of its cooperation with foreign powers, details the countries that have received payments from the agency: see the book No Place To Hide, 13 May 2014.
Page 124 <AD FY12 CCP Funding of Partner In Thousands of USD 3000 TOP SECRET//COMINT//NOFORN
1.0

Draft Agenda: Herr Dietmar B.

Document

Document Date: 2013-04-22Release Date: 2014-06-18
This April 2013 agenda prepares for a visit of senior officials from the German BND. Subjects to be disussed include Special Source Operations: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
SLCRLT//NOK }R N Direct or S JG J NT Analysis and Production Gerraan Fédéral Intelligence Service 30 April-1 May 2013 30 April 2013 Time Presentation Title and Presenter 0350 (U//FOU...
1.0

Exhibit F

Document

Document Date: 2010-07-16Release Date: 2014-06-30
This document lists the 193 governments, intragovernmental organisations and other entities which the NSA was granted the legal authority to intercept communications “about” for foreign intelligence purposes in August 2010: see the Washington Post article Court gave NSA broad leeway in surveillance, 30 June 2014.
TOP SECRET//NOFORN EXHIBIT F IN THE MATTER OF FOREIGN GOVERNMENTS, FOREIGN FACTIONS Ns?F^yyiG#i 11- ENTITIES, AND FOREIGN-BASED POLITICAL ORGANIZATIONS >■,, f;f |:VV DNI/AG 70...
Afghanistan (AFG/AF), Albania (ALB/AL), Algeria (DZA/DZ), Andorra (AND/AD), Angola (AGO/AO), Antigua and Barbuda (ATG/AG), Argentina (ARG/AR), Armenia (ARM/AM), Austria (AUT/AT), Azerbaijan (AZE/AZ), Bahamas (BHS/BS), Bangladesh (BGD/BD), Barbados (BRB/BB), Belarus (BLR/BY), Belgium (BEL/BE), Belize (BLZ/BZ), Benin (BEN/BJ), Bhutan (BTN/BT), Bolivia (BOL/BO), Bosnia and Herzegovina (BIH/BA), Botswana (BWA/BW), Brazil (BRA/BR), Bulgaria (BGR/BG), Burkina Faso (BFA/BF), Burundi (BDI/BI), Cambodia (KHM/KH), Cameroon (CMR/CM), Central African Republic (CAF/CF), Chad (TCD/TD), Chile (CHL/CL), China (CHN/CN), Colombia (COL/CO), Comoros (COM/KM), Congo (COD/CD), Costa Rica (CRI/CR), Croatia (HRV/HR), Cuba (CUB/CU), Cyprus (CYP/CY), Czech Republic (CZE/CZ), Denmark (DNK/DK), Djibouti (DJI/DJ), Dominica (DMA/DM), Dominican Republic (DOM/DO), Ecuador (ECU/EC), Egypt (EGY/EG), El Salvador (SLV/SV), Equatorial Guinea (GNQ/GQ), Eritrea (ERI/ER), Estonia (EST/EE), Ethiopia (ETH/ET), Fiji (FJI/FJ), Finland (FIN/FI), France (FRA/FR), Gabon (GAB/GA), Gambia (GMB/GM), Georgia (GEO/GE), Germany (DEU/DE), Ghana (GHA/GH), Greece (GRC/GR), Grenada (GRD/GD), Guatemala (GTM/GT), Guinea (GIN/GN), Guinea-Bissau (GNB/GW), Guyana (GUY/GY), Haiti (HTI/HT), Vatican (VAT/VA), Honduras (HND/HN), Hungary (HUN/HU), Iceland (ISL/IS), India (IND/IN), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Ireland (IRL/IE), Israel (ISR/IL), Italy (ITA/IT), Jamaica (JAM/JM), Japan (JPN/JP), Jordan (JOR/JO), Kazakhstan (KAZ/KZ), Kenya (KEN/KE), Kiribati (KIR/KI), Korea (KOR/KR), Kuwait (KWT/KW), Kyrgyzstan (KGZ/KG), Latvia (LVA/LV), Lebanon (LBN/LB), Lesotho (LSO/LS), Liberia (LBR/LR), Libya (LBY/LY), Liechtenstein (LIE/LI), Lithuania (LTU/LT), Luxembourg (LUX/LU), Macedonia (MKD/MK), Madagascar (MDG/MG), Malawi (MWI/MW), Malaysia (MYS/MY), Maldives (MDV/MV), Mali (MLI/ML), Malta (MLT/MT), Marshall Islands (MHL/MH), Mauritania (MRT/MR), Mauritius (MUS/MU), Mexico (MEX/MX), Micronesia (FSM/FM), Moldova (MDA/MD), Monaco (MCO/MC), Mongolia (MNG/MN), Montenegro (MNE/ME), Morocco (MAR/MA), Mozambique (MOZ/MZ), Myanmar (MMR/MM), Namibia (NAM/NA), Nauru (NRU/NR), Nepal (NPL/NP), Netherlands (NLD/NL), Nicaragua (NIC/NI), Niger (NER/NE), Nigeria (NGA/NG), Norway (NOR/NO), Oman (OMN/OM), Pakistan (PAK/PK), Palau (PLW/PW), Panama (PAN/PA), Papua New Guinea (PNG/PG), Paraguay (PRY/PY), Peru (PER/PE), Philippines (PHL/PH), Poland (POL/PL), Portugal (PRT/PT), Qatar (QAT/QA), Romania (ROU/RO), Russia (RUS/RU), Rwanda (RWA/RW), Saint Kitts and Nevis (KNA/KN), Saint Lucia (LCA/LC), Samoa (WSM/WS), San Marino (SMR/SM), Sao Tome and Principe (STP/ST), Senegal (SEN/SN), Serbia (SRB/RS), Seychelles (SYC/SC), Sierra Leone (SLE/SL), Singapore (SGP/SG), Slovakia (SVK/SK), Slovenia (SVN/SI), Somalia (SOM/SO), South Africa (ZAF/ZA), Spain (ESP/ES), Sri Lanka (LKA/LK), Sudan (SDN/SD), Suriname (SUR/SR), Swaziland (SWZ/SZ), Sweden (SWE/SE), Switzerland (CHE/CH), Taiwan (TWN/TW), Tajikistan (TJK/TJ), Tanzania (TZA/TZ), Thailand (THA/TH), Timor-Leste (TLS/TL), Togo (TGO/TG), Tonga (TON/TO), Tunisia (TUN/TN), Turkey (TUR/TR), Turkmenistan (TKM/TM), Tuvalu (TUV/TV), Uganda (UGA/UG), Ukraine (UKR/UA), United States (USA/US), Uruguay (URY/UY), Uzbekistan (UZB/UZ), Vanuatu (VUT/VU), Venezuela (VEN/VE), Vietnam (VNM/VN), Western Sahara (ESH/EH), Yemen (YEM/YE), Zambia (ZMB/ZM), Zimbabwe (ZWE/ZW)
1.0

Bad guys are everywhere, good guys are somewhere!

Document

Release Date: 2014-09-14
This undated NSA presentation sets out the network-mapping tool Treasure Map, and supplies information on some of the agency’s collection access points: see the Intercept article New Zealand Launched Mass Surveillance Project While Publicly Denying It, 15 September 2014.
Bad guys are everywhere, good guys are somewhere! NSA/CSS Threat Operations Center (NTOC) NTOC Technology Development TS//SI//REL TO USA, FVEY (U) NTOC • (U//FOUO) Operates under bot...
1.0

SIGINT Helps Hobble the Taleban by Cutting Off Their Livelihood

Document

Document Date: 2009-02-03Release Date: 2014-12-28
A post from the internal NSA newsletter SIDToday shows that, as of 2008, “narcotics traffickers were added to the Joint Prioritized Effects List (JPEL) for the first time”: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
SIDToday - SIGINT Helps Hobble the Taleban by Cutting Off Their Livelihood DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL • SIDtodav A...
1.0

Interview with a SID “Hacker” — Part 1: How does TAO Do Its Work?

Document

Document Date: 2012-07-12Release Date: 2015-01-17
This 12 July 2012 post from the NSA internal newsletter SIDToday describes the work of Tailored Access Operations (TAO) from the perspective of a practitioner: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
SIDToday - Interview with a SID "Hacker" -- Part 1: How Does TAO Do Its Work? DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO)...
1.0

PCS Harvesting at Scale

Document

Document Date: 2010-04-27Release Date: 2015-02-19
This April 2010 GCHQ report proposes an automated approach to seizing large numbers of mobile phone encryption keys: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
TOP SECRET STRAP 1 Reference: OPC-TDSD/TECH/21 Date: 27th April 2010 PCS Harvesting at Scale (OPC-TDSD) (OPC-TDSD) (OPC-CAP) (OPC-TDSD) Summary This report explores the ...
1.0

Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations

Document

Document Date: 2011-03-22Release Date: 2015-06-22
This 42-page report from 10 March 2011 provides an overview of GCHQ’s information operations unit and the behavioural science theories that underpin its activities: see the Intercept article Controversial GCHQ Unit is Deeply Engaged in Law Enforcement, 22 June 2015.
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations Mandeep K. Dhami, PhD Human Systems Group, Infor...
1.0

The Unofficial XKEYSCORE User Guide

Document

Release Date: 2015-07-01
This 27-page NSA document, authored by a consultant from contractor Booz Allen Hamilton, provides a step-by-step guide to using XKeyScore, together with screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
unofficial-xks-user-guide-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 The Unofficial XKEYSCORE User Guide E92 - ADET Consultant, Booz Allen Hamilton Th...
1.0

X-KEYSCORE as a SIGDEV tool

Document

Document Date: 2009-01-01Release Date: 2015-07-01
This 2009 NSA presentation describes some of the plug ins available and the way the tool relates to other NSA methods for searching internet metadata, with XKeyScore having the broadest capability: see the book No Place To Hide, 13 May 2014.
xks-as-a-sigdev-tool-p1-normal.gif: X-KEYSCORE as a SIGDEV tool 2009 ■EBTxks-as-a-sigdev-tool-p2-normal.gif: What is X-KEYSCORE?xks-as-a-sigdev-tool-p3-normal.gif: TOP SECRET//COMINT//ORC...
1.0

Exploiting Foreign Lawful Intercept (LI) Roundtable

Document

Document Date: 2012-01-01Release Date: 2015-09-29
This NSA presentation from 2012 discusses techniques for subverting “lawful intercept” systems used abroad: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
2012-lawful-intercept-redacted2-p1-normal.gif: TOP SECRET//SI//REL TO USA, FVEY (S//SI//REL) Exploiting Foreign Lawful Intercept (LI) Roundtable S31122 TOP SECRET//SI//REL TO USA, FVEY...
1.0

2013 Intelligence Community budget justification

Document

Document Date: 2012-02-01Release Date: 2013-08-29
Congressional Budget Justification summary for fiscal year 2013 from the Office of the Director of National Intelligence (ODNI): see the Washington Post article U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary, 29 August 2013.
TOP SECRET//SI/TK//NOFORN FY 2013 Congressional Budget Justification Volume I NATIONAL INTELLIGENCE PROGRAM SUMMARY February 2012 TOP SECRET//SI/TK//NOFORN TOP SECRET//SI/TK//...
1.0

Targeting Rationale (TAR)

Document

Document Date: 2007-01-08Release Date: 2013-08-15
A Targeting Rationale document details how NSA analysts should justify their targeting decisions: see the Washington Post article NSA broke privacy rules thousands of times per year, audit finds, 15 August 2013.
TOP SECRET//COMINT//NOFORN//MR Targeting Rationale (TAR) (C//SI//REL TO USA, FVEY) The basic premise of this process is to memorialize why you the analyst have requested targeting. This rat...
1.0

Boundless Informant heat maps

Document

Document Date: 2013-03-26Release Date: 2013-06-11
These undated heat maps show the number of pieces of communications data the NSA gathers per country in a particular 30 day period, divided into telephony (DNR) and internet (DNI) metadata. Details in the second map refer to a period in January 2013 and third to a period ending in February the same year: see […]
boundlessinformant.pdf: Page 93 BOUNDLESSINFORMANT Top 5 Countries (i»t 30 o«>» t-om «¡xu/i ■Ohm.pdf: BOUNDLESSINFORMANT im!MwamHMiM:rta.]a;ii]aaMaiM,(.yiii:am«.'.«M«iMiaiiiiiPH;i!i...
1.0

CRISSCROSS/PROTON

Document

Document Date: 2006-02-26Release Date: 2014-08-25
This NSA Point Paper dated 22 February 2006 provides a history of the CRISSCROSS and PROTON information sharing systems that preceded ICREACH: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
TOP SECRET//COMINT//ORCON/NOFORN//MR POINT PAPER SUBJECT: CRISSCROSS/PROTON PURPOSE: Provide DIRNSA information on subject. BACKGROUND: 22 Feb 06 (U) History of CRISSCROSS/PROTON...
1.0

Muhammad Tahir Shahzad AKA Abu Hamza

Document

Document Date: 2011-01-22Release Date: 2014-07-05
These two slides from a 22 January 2011 NSA PowerPoint presentation constitute the first document drawing on intercepted communications content to be made public. The subject of this presentation was captured in Abbottabad, Pakistan on 23 January 2011: see the Washington Post article In NSA-intercepted data, those not targeted far outnumber the foreigners who are, […]
Muhammad Tahir Shahzad AKA Abu Hamza 22 JANUARY 2011 OVERALL CLASSIFICATION OF DOCUMENT: (U//FOUO) The following information has not been fully analyzed and may be incomplete and sub...
1.0

Intro to the VPN Exploitation Process

Document

Document Date: 2010-09-13Release Date: 2014-12-28
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
1.0

ISA-94: Application for renewal of warrant GPW/1160 in respect of activities which involve the modification of commercial software

Document

Document Date: 2008-06-13Release Date: 2015-06-22
This GCHQ application for warrant renewal from June 2008 shows that the agency has been engaged in the reverse engineering of commercial antivirus software for the purposes of facilitating its hacking operations: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET STRAP2 UK EYES ONLY Date: 13 June 2008 GCHQ Reference: A/9014/9105/55 Sian MacLeod Mariot Leslie Foreign Secretary ISA-94: APPLICATION FOR RENEWAL OF WARRANT GPW/1160 IN...
1.0

Finding and Querying on Document Metadata

Document

Document Date: 2009-04-01Release Date: 2015-07-01
This NSA presentation from April 2009 explains how analysts can make use of document metadata available through XKeyScore, together with worked examples and screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Finding and Querying on Document Metadata tooz|/ 1 Booz|Allen| Hamilton Sigint Development Support / SIGINT Technica...
1.0

GCHQ Ministry Stakeholder Relationships spreadsheets

Document

Document Date: 2008-01-01Release Date: 2015-06-22
This collection of 13 spreadsheets illustrates the relationship between GCHQ and various ministries within the UK government and that agency’s work is by no means restricted to matters of national security, but also extends to domestic issues: see the Intercept article Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research, 22 June […]
 Bank of England GCO Name(s) 3CHQ Top level Aim with Customer BANK MISSION Contribute to Bank decision-making on issues affecting UK economic stability. To support UK economic stability. ...
1.0

HTTP Activity vs. User Activity

Document

Document Date: 2009-06-19Release Date: 2015-07-01
This NSA presentation from 19 June 2009 explains the metadata capabilities of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL m V HTTP Activity vs User Activity 19 June 2009 Derived From: NSA/CSSM 1-52 Bated :l2007i MM TOP SEC...
1.0

HIMR Data Mining Research Problem Book

Document

Document Date: 2011-09-20Release Date: 2016-02-02
This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The […]
UK TOP SECRET STRAP1 COMINT AUS/CAN/NZ/UK/US EYES ONLY Reference: OPC-M/TECH.A/455 (v1.0, r206) Date: 20 September 2011 Copy no: HIMR Data Mining Research Problem Book OPC-MCR, G...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh