Filtered By
United Kingdom (GBR/GB) X
Countries Mentioned [filter]
United Kingdom X
Countries Shared With [filter]
Results
50 Total
0.0

SNOWGLOBE: From Discovery to Attribution

Document

Release Date: 2015-01-17 Document Date: 2011-01-01
This 2011 CSEC presentation describes how the agency analysed SNOWGLOBE, which it considered “to be a state-sponsored CNO effort, put forth by a French intelligence agency”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Overall Classification: TOP SECRET II COMINT II REL TO CAN, AUS, GBR, NZL, USA ■ ■ Communications Security Establishment Canada SNOWGLOBE: From Discovery to Attribution CSEC CNT/Cyb...
0.0

NSA Extended Enterprise Report: July 2008

Document

Release Date: 2015-04-02 Document Date: 2008-07-08
This extract from a July 2008 NSA document describes Argentina as GCHQ’s “primary interest” in Latin America: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET//REL TO USA, AUS, CAN, GBR, NZL//20291123 Extended Enterprise Report: July 2008 This document summarises key activities of interest to GCHQ at the NSA Regional Cryptologic Center...
0.0

Global Collaboration Environment (GCE)

Document

Release Date: 2018-03-01 Document Date: 2013-04-10
This set of NSA talking points, dated 10 April 2013, outlines a plan for continuing the GCE intelligence-sharing arrangement beyond the Afghan war, which NSA and GCHQ would collaborate on closely: see the Intercept article The Powerful Global Spy Alliance You Never Knew Existed, 1 March 2018.
SECRET//SI//REL TO USA, GBR (U) Topic: Global Collaboration Environment (GCE) (U//FOUO) Director's Talking Points: • (S//REL TO USA, GBR) Thank GCHQ for giving full support to GCE, and for...
0.0

Tracking Targets on Online Social Networks

Document

Release Date: 2014-05-13 Document Date: 2009-09-01
This September 2009 NSA presentation outline some of the insights that analysts can gather from online social networks (OSNs) and show the XKeyScore interface for performing such searches: see the book No Place To Hide, 13 May 2014.
TOP SECRET//COMINT//REL TO USA, FVEY (S//SI//REL) Tracking Targets on Online Social Networks The overall classification of this briefing to TOP SECRET//COMINT//REL TO USA, FVEY Online...
0.0

HTTP Activity in XKEYSCORE

Document

Release Date: 2015-07-01 Document Date: 2009-03-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HTTP Activity in XKEYSCORE March 2009 Derived From: NSA/QSSM 1-52 Dated: 200701 (T Declassify On: 202911 ...
0.0

MHS and GCHQ “Get in the Game with Target Development for World of Warcraft Online Gaming”

Document

Release Date: 2013-12-09 Document Date: 2008-01-01
An NSA document from 2008 shows that efforts to collect data from players of World of Warcraft started that year with the development of specialised exploits by GCHQ. The operation was based at Menwith Hill in the UK: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 […]
TOP SECRET//COMINT//REL TO USA, FVEY (TS//SI//REL) MHS and GCHQ “Get in the Game” with Target Development for World of Warcraft Online Gaming (TS//SI//REL) Although online gaming may seem...
0.0

Making Network Sense of the encryption problem

Document

Release Date: 2014-12-13 Document Date: 2011-01-01
This 2011 presentation by the head of GCHQ’s Network Analysis Centre outlines the agency’s interest in exploiting telecommunications companies, namely to “get at the data before it is encrypted”: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
TOP SECRET STRAP 2 // REL TO USA, AUS, CAN, GBR, NZL ------m/\cz NETWORK ^IM^ySIS CSfSJTRe Making Network Sense of the encryption problem Roundtable Head of GCHQ NAC This info...
0.0

Conference Eyes Data Flow Among Second Parties

Document

Release Date: 2017-04-24 Document Date: 2004-11-16
The Five Eyes partners held a conference to discuss the standardization of data formats to ease the exchange of voice, text, fax, and digital network intelligence.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Conference Eyes Data Flow Among Second Parties<br>FROM: <br>Chief, Data Flow an...
0.0

NSA and GCHQ Senior Leaders Hold Annual Talks

Document

Release Date: 2017-04-24 Document Date: 2004-11-12
The NSA and GCHQ leadership held their annual Joint Management Review and recommitted themselves to working together on SIGINT missions.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) NSA and GCHQ Senior Leaders Hold Annual Talks<br>FROM: <br>FAD/Country Desk Off...
0.0

Interview with... Charlie Meals, Signals Intelligence Deputy Director

Document

Release Date: 2017-04-24 Document Date: 2004-10-13
In an interview, the deputy director describes his early days in the NSA's "weather shop," decrypting Soviet weather reports.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) Interview with... Charlie Meals, Signals Intelligence<br>Deputy Director<...
0.0

NSA and GCHQ Team Up to Tackle HF

Document

Release Date: 2017-04-24 Document Date: 2004-07-14
After realizing that their technologies for collecting high frequency signals were obsolete, the NSA and GCHQ established the Joint Strategic Off-Air Programme, which jointly manages all HF/VHF/UHF collection as well as updates to legacy systems.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(C) NSA and GCHQ Team Up to Tackle HF<br>FROM: <br>Deputy Chief, RFO/Corporate HF S...
0.0

Profiling SSL and Attributing Private Networks

Document

Release Date: 2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL PROFILING SSL AND ATTRIBUTING PRIVATE NETWORKS An introduction to FLYING PIG and HUSH PUPPY ICTR - Network Exploitation GCHQ T R J...
0.0

Transnational DNI Training

Document

Release Date: 2018-03-01
This undated NSA instructional presentation, along with instructor’s notes, provides a briefing on metadata sharing between the Five Eyes: see the Intercept article How London’s 7/7 Bombings Led to “Unprecedented” Surveillance Tactics, 1 March 2018.
TOPSECRET//COMINT/REL TO USA, AUS, CAN, GBR, NZL//20291123 (U) Instructional Content/Activities (U) Instructor Notes - (U) This lesson will provide you with an overview of sensitive ...
0.0

JFK Assassination Records Classification/Declassification Guide Number: 385-00

Document

Release Date: 2017-10-25 Document Date: 2000-06-23
This classification guide from 2000 shows that aspects of NSA investigations related to the Kennedy assassination were still classed as top secret, decades later: see the Intercept article NSA Concealed Records on JFK Assassination for Decades, 25 October 2017.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 (U) JFK ASSASSINATION RECORDS CLASSIFICATION/ DECLASSIFICATION GUIDE NUMBER: 385-00 (U) PUBLICATION DATE: 23 JUNE 2000 (U) PRO...
0.0

Primary FORNSAT Collection Operations

Document

Release Date: 2014-06-18
This undated NSA slide provides the locations of FORNSAT sites run by the agency and its Five Eyes partners worldwide: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
.fc-L' 11K: ¿UribtA I---. :RET//CDMINT//REL TO USA, AUS, CAN, GBR, and NZLy/Xl JIMKKNIPB Yakima TI M BE RU N E S ugar Grove CORALINE Sabena Seca, Geraldto S...
0.0

QUANTUMTHEORY

Document

Release Date: 2014-03-12 Document Date: 2010-01-01
This presentation from the 2010 SIGDEV Conference describes the contribution made by GCHQ to the development of Quantum techniques: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL TO USA, FVEY//20320108 TOP SECRET//COMINT//REL TO USA, FVEY//20320108 SIGDEV: Discovery in the Cyber Ag> TOP SECRET//COMINT//REL TO USA, FVEY//20320108 (U) Clas...
0.0

Write Right: Don't Change 'Happy' to 'Glad'

Document

Release Date: 2017-04-24 Document Date: 2004-10-07
A columnist giving advice on writing and editing reports at the NSA warns against making unnecessary changes to another writer's text. Another tip: Be wary of inserting colloquial expressions in reports, especially when they are distributed to non-U.S. customers.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Write Right: Don't Change 'Happy' to 'Glad'<br>FROM:<br>of the Reporting Board ...
0.0

SIGINT Travels with Charlie

Document

Release Date: 2017-04-24 Document Date: 2004-08-20
Charlie Meals will travel to England for site visits and meetings with the GCHQ.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) SIGINT Travels with Charlie<br>FROM: SIGINT Communications<br>Unknown<br>Run Da...
0.0

NSA Hosts Conference on Support to Law Enforcement

Document

Release Date: 2017-04-24 Document Date: 2004-11-08
NSA hosted a conference on cryptanalytic support to law enforcement for partners from all Five Eyes countries, including representatives from general counsel, policy, cryptanalytic offices, and representatives of FBI, Royal Canadian Mounted Police, and the UK's National Technical Assistance Center.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(C) NSA Hosts Conference on Support to Law Enforcement<br>FROM:<br>Exploitation Ope...
0.0

UN Peacekeeping in Sub-Saharan Africa: A Growth Industry

Document

Release Date: 2016-12-07 Document Date: 2004-03-16
An article describes the current state of U.N. peacekeeping operations in sub-Saharan Africa and predicts growth in missions and personnel. There is no mention of NSA or SID participation.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) UN Peacekeeping in Sub-Saharan Africa: A Growth Industry<br>FROM:<br>Deputy SIN...
0.0

CATAPULT: A Bilateral Data Port

Document

Release Date: 2016-05-16 Document Date: 2003-05-08
This describes CATAPULT, a prototype of a data portal for sharing SIGINT product between NSA and second-party partners, based on a Canadian project that uses an XML-based standard format.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(C//SI) CATAPULT: A Bilateral Data Port<br>FROM:<br>Deputy Chief, Customer Relations...
0.0

Introduction to XKS Application IDs and Fingerprints

Document

Release Date: 2015-07-01 Document Date: 2009-08-27
This 60-page NSA presentation from 27 August 2009 explains the use of different kinds of metadata tags in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Application IDs and Fingerprints 27 August 2009 .... ‘s 01 Ol A l • DERIVED FROM: NSA/CSSM...
0.0

Second Party National Identity Rules, continued

Document

Release Date: 2015-03-08 Document Date: 2012-01-01
This extract from a 2012 NSA document detailing how different Five Eyes countries define their own nationals shows that the GCSB allowed itself the right to surveil the governments of the Cook Islands and Nuie “but not their citizens”: see the Sunday Star Times article Snowden files: Inside Waihopai’s domes, 8 March 2015.
SECRET//COMINT//REL TO USA, FVEY (U) Second Party National Identity Rules, Continued Section B.4. - (U) New Zealand: Government Communications Security Bureau (GCSB) B.4.1. (U) Governmen...
0.0

Sensitive Metadata Analytic Collaboration (SMAC) Concept of Operations

Document

Release Date: 2018-03-01 Document Date: 2006-10-01
This NSA briefing from October 2006 underlines how the Alice Springs Resolution of 2004, designed to allow “unfettered” metadata sharing within the Five Eyes, was put into action in the aftermath of the 7/7 London bombings, with procedures for use of the resulting SMAC system: see the Intercept article How London’s 7/7 Bombings Led to […]
SECRET//REL TO USA, AUS, CAN, GBR, NZL//22012031 Sensitive Metadata Analytic Collaboration (SMAC) Concept of Operations October 2006 Background In June 2004 via the Alice Springs Resolut...
0.0

National Information Assurance Research Laboratory (NIARL) Newsletter – September 2008

Document

Release Date: 2014-12-28 Document Date: 2008-09-01
This September 2008 newsletter from the National Information Assurance Research Laboratory (NIARL), an unit within the NSA’s Research Directorate gives an indication of the agency’s progress with cryptanalysis – which, with “only a handful of in-house techniques” – appears to be modest: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet […]
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 September 2008 Edition ■ (U) Message from the NIARL Director: (U//FOUO) Welcome to the September 2008 edition of the National ...
0.0

TURMOIL

Document

Release Date: 2014-03-12
These slides from an NSA presentation show how the automated malware deployment tool Turbine depends on a network of passive collection sensors (Turmoil), installed at locations including Fort Meade in Maryland, Misawa in Japan and Menwith Hill in the UK: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, […]
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Sensors: Passive Collection \ Internet * Cloud Internet 1 Cloud Internet <1 Cloud pUttMQJ.l I (S//SI//REÜ High-spe...
0.0

InSIDer's View of History: 'Soviet Rocket' Strikes Chicksands

Document

Release Date: 2016-12-07 Document Date: 2004-04-02
Author shares an anecdote about a fake Soviet rocket that lieutenants made as a prank in 1957 during the race between the U.S. and the Soviet Union to launch an ICBM.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) InSIDer's View of History : 'Soviet Rocket' Strikes Chicksands<br>FROM: Al Gray...
0.0

CRD Launches 'CRD Forward' Initiative with Roadshow to Germany and the UK

Document

Release Date: 2016-12-07 Document Date: 2004-03-23
The Customer Relationships Directorate leadership traveled to U.S. Europe Command in the United Kingdom and Germany.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) CRD Launches 'CRD Forward' Initiative with Roadshow to<br>Germany and the UK<br...
0.0

MG Q, Where Are You?

Document

Release Date: 2016-08-10 Document Date: 2003-09-10
The SID director and other leadership will attend an annual conference with Australia and New Zealand partners.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) MG Q, Where Are You?<br>FROM:<br>SIGINT Communications<br>Run Date: 09/10/2003<b...
0.0

ConSIDer This: The ABC's of Second Party Liaison

Document

Release Date: 2016-05-16 Document Date: 2003-08-13
Special U.S. Liaison Offices are representatives to the second-party countries (the U.K., Canada, Australia, and New Zealand) for cryptologic collaboration. The Foreign Affairs Directorate has officers overseeing second-party matters at Fort Meade, and each second party maintains a senior liaison at NSA.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) ConSIDer This: The ABC's of Second Party Liaison<br>FROM: SIGINT Communica...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh