Filtered By
Pakistan (PAK/PK) X
Countries Mentioned [filter]
Results
116 Total
0.0

What does the death of Usama bin Laden mean?

Document

Release Date: 2015-05-18 Document Date: 2011-05-17
In this 17 May 2011 article from the internal newsletter SIDToday, the NSA Signals Intelligence Directorate’s Associate Deputy Director for Counterterrorism, Jon Darby, decribes how the NSA played a “critical” role in the raid in bon Laden’s Abbottabad compound: see the Intercept article What the Snowden Files Say About the Osama Bin Laden Raid, 18 […]
DYNAMIC PAGE - HIGHES I P0SS1BLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Friday, 09 Nov 2012 • Web search • Agcncv-all Emails • SID-all Emails ...
0.0

HIMR Data Mining Research Problem Book

Document

Release Date: 2016-02-02 Document Date: 2011-09-20
This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The […]
UK TOP SECRET STRAP1 COMINT AUS/CAN/NZ/UK/US EYES ONLY Reference: OPC-M/TECH.A/455 (v1.0, r206) Date: 20 September 2011 Copy no: HIMR Data Mining Research Problem Book OPC-MCR, G...
0.0

Assessment of Intelligence Opportunity – Juniper

Document

Release Date: 2015-12-23 Document Date: 2011-02-03
This GCHQ report dated 3 February 2011 and written by a seconded NSA staff member, alludes to the agencies’ capabilities against 13 models of firewalls produced by Juniper Networks, Inc: see the Intercept article NSA Helped British Spies Find Security Holes In Juniper Firewalls, 23 December 2015.
TOP SECRET STRAP1 ASSESSMENT OF INTELLIGENCE OPPORTUNITY - JUNIPER 03 February 2011 Executive Summary Background • Juniper Networks, Inc. headquartered in Sunnyvale, California, USA is...
0.0

DEFIANTWARRIOR and the NSA’s Use of Bots

Document

Release Date: 2015-01-17 Document Date: 2010-05-24
This 24 May 2010 NSA presentation describes the ways the agency uses botnets (“bot herding”): see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL USA, FVEY DEFIANTWARRIO R 7 / //and the ; NSA's Uè^ojÆotá/ Overall Classification: TOP SECRET//COMINT//REL FVEY Current As Of: 24 May 2010 Derived From: NSA/CSS...
0.0

Events Product Centre

Document

Release Date: 2015-09-25 Document Date: 2010-11-01
This GCHQ presentation from November 2010 shows that the agency was logging 30 billion metadata records per day by that year: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
operational-engineering-nov-2010-p1-normal.gif: •¿events Events Product Centre W: CHQ SECRET STRAP1operational-engineering-nov-2010-p2-normal.gif: »¿events Agenda «Welcome «Im...
0.0

Tech Strings in Documents (aka Tech Extractor) 2009

Document

Release Date: 2015-07-01 Document Date: 2009-12-01
This December 2009 NSA presentation explains how keyword selection works within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-tech-extractor-2009-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. AUS, CAN, GBR. NZU/20291123 Tech Strings in Documents (aka Tech Extractor) December 2009xks-tech-extractor-2009-p2...
0.0

PCS Harvesting at Scale

Document

Release Date: 2015-02-19 Document Date: 2010-04-27
This April 2010 GCHQ report proposes an automated approach to seizing large numbers of mobile phone encryption keys: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
TOP SECRET STRAP 1 Reference: OPC-TDSD/TECH/21 Date: 27th April 2010 PCS Harvesting at Scale (OPC-TDSD) (OPC-TDSD) (OPC-CAP) (OPC-TDSD) Summary This report explores the ...
0.0

ISA-94: Application for renewal of warrant GPW/1160 in respect of activities which involve the modification of commercial software

Document

Release Date: 2015-06-22 Document Date: 2008-06-13
This GCHQ application for warrant renewal from June 2008 shows that the agency has been engaged in the reverse engineering of commercial antivirus software for the purposes of facilitating its hacking operations: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET STRAP2 UK EYES ONLY Date: 13 June 2008 GCHQ Reference: A/9014/9105/55 Sian MacLeod Mariot Leslie Foreign Secretary ISA-94: APPLICATION FOR RENEWAL OF WARRANT GPW/1160 IN...
0.0

HTTP Activity in XKEYSCORE

Document

Release Date: 2015-07-01 Document Date: 2009-03-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HTTP Activity in XKEYSCORE March 2009 Derived From: NSA/QSSM 1-52 Dated: 200701 (T Declassify On: 202911 ...
0.0

QUANTUMTHEORY success at SARATOGA

Document

Release Date: 2016-08-19 Document Date: 2011-04-15
This 15 April 2011 article from the NSA’s internal newsletter Special Source Operations News discusses the delivery of malware to a target in Pakistan while they were using Facebook: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
(TS//SI//NF) DGO Enables Endpoint Implants via QUANTUMTHEORY By [[REDACTED]] on 2011-09-26 1548 (TS//SI//NF) In another example of the emerging collaboration between the Endpoint and Midpoint ...
0.0

SIGINT Development Support II Program Management Review

Document

Release Date: 2016-08-19 Document Date: 2013-04-24
Four slides taken from a 24 April 2013 NSA presentation detail how SECONDDATE man-in-the-middle attacks were used against targets in Pakistan and Lebanon: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//SI//NOFORN The overall classification of this brief is (U) SIGINT Development Support II Program Management Review ► 24 April 2013 TOP SECRET//COMINT//NOFORN Derived Fro...
0.0

Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities

Document

Release Date: 2013-12-09 Document Date: 2007-01-01
A 2007 proposal to the NSA from contractor SAIC, promoting the company’s ability to support “intelligence collection in the games space”: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 December 2013.
Games: A Look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities Table of Contents FORWARD......................................................................4 ...
0.0

Classification Guide for SIGINT Material Dating from 16 August 1945 – 31 December 1967

Document

Release Date: 2014-06-18 Document Date: 2011-11-21
This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
TOP SECRET//SjyTK//NOFÜRN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR SIGINT Material Dating from 16 August 1945 *31 December 1967 Effects Dale: 21 De...
0.0

What We're Hearing from Customers

Document

Release Date: 2018-03-01 Document Date: 2005-11-08
Customer account managers record their knowledge about each customer in a customer relationship management database, which will be made available to everyone on NSAnet in the future. 
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) What We're Hearing from Customers FROM: Customer Engagement Program Manager (S11) Run Dat...
0.0

All-Source Victory on the High Seas!!

Document

Release Date: 2018-03-01 Document Date: 2005-11-04
The U.S. Navy worked with the NSA to find a handset traveling with a shipment of narcotics in the Arabian Sea. The French navy boarded the vessel, seizing 3.5 tons of hashish. But the handset was no longer on board; it was subsequently located on the vessel from which the drugs had been transferred, and the crew of that vessel was also taken into custody.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) All-Source Victory on the High Seas!! FROM: SIGINT Communications and LCDR Victor Spears ...
0.0

The New Breed of SIGINT Reporting

Document

Release Date: 2018-03-01 Document Date: 2005-10-25
First Instance Reporting is a new type of reporting that allows “forward-deployed” signals intelligence personnel “to push information out much earlier in the production cycle.” So far, there have been 3,300 such reports, including information about the inspection of uranium processing activities in Iran, Russian government knowledge of a terrorist plot, and others.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) The New Breed of SIGINT Reporting FROM: D/Chief, Field Operations Office, Special Collec...
0.0

India: Support to Terrorist Attacks in Mumbai

Document

Release Date: 2014-12-21
This extract from an undated NSA document claims that GCHQ surveillance of Lashkar-e-Taiba operative Zarrar Shah “yielded a complete operations plan” for the 2008 Mumbai terrorist attacks – but only after the plot had succeeded: see the New York Times article In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted Puzzle, 21 December […]

0.0

Combat Search and Rescue: Menwith Hill Station's Role in Saving Lives

Document

Release Date: 2017-09-13 Document Date: 2005-03-23
The Menwith Hill Station takes a direct role in combat search and rescue (CSAR) operations, processing distress transmissions received from troops and sending them to rescue efforts. The station has successfully aided in the rescue of U.S. personnel in Afghanistan, Pakistan, and Iraq, and participates in CSAR trainings and simulations with U.K. Special Forces.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (C) Combat Search and Rescue: Menwith Hill Station's Role in Saving Lives FROM: MHS Operatio...
0.0

CIA - NSA Analysis Day -- Collaboration in Action

Document

Release Date: 2017-09-13 Document Date: 2005-04-27
The CIA-NSA Analysis Day brought 170 CIA analysts and leaders to the NSA for information exchange, and speakers and panels on information sharing and collaboration.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) CIA - NSA Analysis Day -- Collaboration in Action FROM: CRD Account Manager for CI...
0.0

The Geographic Resource Center Has Info You Need: Maps, Data and Research

Document

Release Date: 2017-04-24 Document Date: 2004-10-29
The Geographic Resource Center is NSA's map library, which provides hard-copy and digital maps and geographic data to analysts at NSA headquarters and around the world.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) The Geographic Resource Center Has Info You Need: Maps, Data<br>and Research<br...
0.0

Interview with... Charlie Meals, Signals Intelligence Deputy Director

Document

Release Date: 2017-04-24 Document Date: 2004-10-13
In an interview, the deputy director describes his early days in the NSA's "weather shop," decrypting Soviet weather reports.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) Interview with... Charlie Meals, Signals Intelligence<br>Deputy Director<...
0.0

The Only Game in Town (part 1)

Document

Release Date: 2017-04-24 Document Date: 2004-12-15
An intelligence analysis intern describes her tour as NSA counterterrorism representative at the CIA station in Islamabad, where she witnessed the arrests of several dozen terrorists.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) The Only Game in Town (part 1)<br>FROM:<br>Intelligence Analysis (IA) Intern<br...
0.0

SINIO Summer Seminar Pakistan's Nuclear Force Doctrine and Capabilities

Document

Release Date: 2018-03-01 Document Date: 2005-08-24
A seminar about Pakistan’s nuclear weapons will help Signals Intelligence Directorate staff understand the country’s nuclear program.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) SINIO Summer Seminar Pakistan's Nuclear Force Doctrine and Capabilities FROM: Maril...
0.0

IMT Members Make Trip to Afghanistan, Pakistan

Document

Release Date: 2016-12-07 Document Date: 2004-06-09
Two members of the Middle East/North Africa/South Asia Issue Managers Team who traveled to Afghanistan and Pakistan in May 2004 share a brief update and photos from their trip.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) IMT Members Make Trip to Afghanistan, Pakistan<br>FROM: SIGINT Communicatio...
0.0

Black Budget entry on Computer Network Operations GENIE project

Document

Release Date: 2015-01-17 Document Date: 2012-02-18
This extract from the US Intelligence Community’s Congressional Budget Justification for the Fiscal Year 2013 (the “Black Budget”) provides the budget for GENIE the project “which underpins NSA/CSS’ Computer Network Operations (CNO) Endpoint capabilities conducted by the Tailored Access Operations (TAO) Group: see the Der Spiegel article The Digital Arms Race: NSA Preps America for […]
TOP SECRET//SI/TK//NOFORN (U) COMPUTER NETWORK OPERATIONS (U) GENIE This Exhibit is SECRET//NOFORN FY 20111 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 2013 Base...
0.0

Joint Prioritized Effects List

Document

Release Date: 2014-12-28 Document Date: 2011-01-01
This anonymised version of the Joint Prioritized Effects list highlights aspects of NATO’s targeted killing operations in Afghanistan: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
JPEL TARGETS 669 RESTRICTE NATO SECRET REL ISAF JPEL NEXTJTWG: 08AUG10 NEXT JPEL APPROVAL: 09 AUG10 REGION TRIBAL AFFILIATION PROV TGTNOM LEAD AGENCY/SERV AGENCY OP NAME OBJ ...
0.0

SIGINT Helps Hobble the Taleban by Cutting Off Their Livelihood

Document

Release Date: 2014-12-28 Document Date: 2009-02-03
A post from the internal NSA newsletter SIDToday shows that, as of 2008, “narcotics traffickers were added to the Joint Prioritized Effects List (JPEL) for the first time”: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
SIDToday - SIGINT Helps Hobble the Taleban by Cutting Off Their Livelihood DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL • SIDtodav A...
0.0

X-KEYSCORE as a SIGDEV tool

Document

Release Date: 2015-07-01 Document Date: 2009-01-01
This 2009 NSA presentation describes some of the plug ins available and the way the tool relates to other NSA methods for searching internet metadata, with XKeyScore having the broadest capability: see the book No Place To Hide, 13 May 2014.
xks-as-a-sigdev-tool-p1-normal.gif: X-KEYSCORE as a SIGDEV tool 2009 ■EBTxks-as-a-sigdev-tool-p2-normal.gif: What is X-KEYSCORE?xks-as-a-sigdev-tool-p3-normal.gif: TOP SECRET//COMINT//ORC...
0.0

Profiling SSL and Attributing Private Networks

Document

Release Date: 2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL PROFILING SSL AND ATTRIBUTING PRIVATE NETWORKS An introduction to FLYING PIG and HUSH PUPPY ICTR - Network Exploitation GCHQ T R J...
0.0

What’s NSA’s Reputation Among Third Parties? What are the Japanese Like as SIGINTers?

Document

Release Date: 2017-04-24 Document Date: 2008-11-19
This 19 November 2008 article from the NSA internal newsletter SIDToday presents an interview with the head of US Special Liaison Activity Japan (SUSLAJ), who describes Japan’s reluctance to participate in multinational SIGINT fora and historic agency operations in Pakistan and the Philippines: see the Intercept article Japan Made Secret Deals With The NSA That […]
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI//REL) What's NSA's Reputation Among Third Parties? What Are the Japanese Like as ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh