Results
1879 Total
0.0
Interview with an SID “Hacker” — Part 2: Hacker Culture and Worker Retention
Document
Release Date:
2015-06-11
Document Date:
2012-07-13
This 12 July 2012 post from the NSA newsletter SIDToday describes the internal culture of Tailored Access Operations (TAO) from the perspective of a practitioner: see the Intercept article What the Snowden Files Say About the Osama Bin Laden Raid, 18 May 2015.
sidtoday-interview-with-a-sid-hacker-p1-normal.gif:
DYNAMIC PAGE - HIGHEST
POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA
AUS CAN GBR NZL
Welcome! Saturday, 10 Nov 2012
•...
0.0
What does the death of Usama bin Laden mean?
Document
Release Date:
2015-05-18
Document Date:
2011-05-17
In this 17 May 2011 article from the internal newsletter SIDToday, the NSA Signals Intelligence Directorate’s Associate Deputy Director for Counterterrorism, Jon Darby, decribes how the NSA played a “critical” role in the raid in bon Laden’s Abbottabad compound: see the Intercept article What the Snowden Files Say About the Osama Bin Laden Raid, 18 […]
DYNAMIC PAGE - HIGHES I P0SS1BLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
Welcome! Friday, 09 Nov 2012
• Web search
• Agcncv-all Emails
• SID-all Emails
...
0.0
FAIRVIEW and STORMBREW: ‘Live’ – On the Net
Document
Release Date:
2016-08-10
Document Date:
2003-11-19
This post from internal NSA newsletter SIDToday dated 19 November 2003 provides an early description of FAIRVIEW and STORMBREW, later known as Upstream collection: see the Intercept article Iraqi Insurgents Stymied the NSA and Other Highlights from 263 Internal Agency Reports, 10 August 2016.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(S//SI) FAIRVIEW and STORMBREW: 'Live' - On the Net
FROM: and
Special Source Oper...
0.0
Special Source Operations Weekly – 18 April 2013
Document
Release Date:
2016-08-10
Document Date:
2013-04-18
This extract from the 18 April 2013 edition of the internal NSA newsletter Special Source Operations Weekly provides details of five PRISM reports based on the output of Iranian academics working in the field of medical science. The presentation says the universities “are suspected of being linked to Iranian CBW [chemical and biological warfare] programs”: […]
UNCLASSIFIED//FOR OFFICIAL USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE ONLY
The overall classification of this briefing is:
TOP SECRET//SI//ORCON/NOFORN
Approval for dissemination of infor...
0.0
HIMR Data Mining Research Problem Book
Document
Release Date:
2016-02-02
Document Date:
2011-09-20
This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The […]
UK TOP SECRET STRAP1 COMINT
AUS/CAN/NZ/UK/US EYES ONLY
Reference: OPC-M/TECH.A/455 (v1.0, r206)
Date: 20 September 2011
Copy no:
HIMR Data Mining Research Problem Book
OPC-MCR, G...
0.0
MHS FISINT Successfully Collects Israeli F-16 Heads Up Display
Document
Release Date:
2016-01-29
Document Date:
2008-02-01
This March 2008 post from the internal NSA newsletter SIDToday, describes the Menwith Hill station’s success in intercepting the video feeds from Israeli F-16 fighter jets and drones: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016.
TOP SECRET//COMINT/TALENT KEYHOLE// REL TO USA, FVEY
published March 2008
MHS FISINT Successfully Collects Israeli F-16 Heads-Up Display
(S//SI//REL)
, Menwith Hill Station (F77)
(S...
0.0
Assessment of Intelligence Opportunity – Juniper
Document
Release Date:
2015-12-23
Document Date:
2011-02-03
This GCHQ report dated 3 February 2011 and written by a seconded NSA staff member, alludes to the agencies’ capabilities against 13 models of firewalls produced by Juniper Networks, Inc: see the Intercept article NSA Helped British Spies Find Security Holes In Juniper Firewalls, 23 December 2015.
TOP SECRET STRAP1
ASSESSMENT OF INTELLIGENCE OPPORTUNITY - JUNIPER
03 February 2011
Executive Summary
Background
• Juniper Networks, Inc. headquartered in Sunnyvale, California, USA is...
Australia (AUS/AU), Barbados (BRB/BB), Canada (CAN/CA), Cayman Islands (CYM/KY), China (CHN/CN), Hong Kong (HKG/HK), France (FRA/FR), Germany (DEU/DE), India (IND/IN), Japan (JPN/JP), Netherlands (NLD/NL), Pakistan (PAK/PK), Saudi Arabia (SAU/SA), United Kingdom (GBR/GB), United States (USA/US), Yemen (YEM/YE)
0.0
Gold Medal Support to the Summer Games
Document
Release Date:
2015-09-29
Document Date:
2004-09-14
This 14 September 2004 post from the internal NSA newsletter SIDToday reviews the agency’s operations at the Athens Olympics, which had just concluded: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
id-827-redacted-formatted-p1-normal.gif:
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(U) Gold Medal Support to the Summer Games
...
0.0
Another Successful Olympics Story
Document
Release Date:
2015-09-29
Document Date:
2004-10-06
This post from the NSA’s internal SIDToday newsletter, dated 6 October 2004, reviews the agency’s operations for the recently-concluded Athens Olympics: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
id-863-redacted-formatted-p1-normal.gif:
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(U) Another Successful Olympics Story
FROM:...
0.0
DEFIANTWARRIOR and the NSA’s Use of Bots
Document
Release Date:
2015-01-17
Document Date:
2010-05-24
This 24 May 2010 NSA presentation describes the ways the agency uses botnets (“bot herding”): see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL USA, FVEY
DEFIANTWARRIO R 7
/ //and the ;
NSA's Uè^ojÆotá/
Overall Classification: TOP SECRET//COMINT//REL FVEY
Current As Of: 24 May 2010
Derived From: NSA/CSS...
DEFIANTWARRIOR, FREEFLOW-compliant, INCENSER, ISLANDTRANSPORT (IT), OLYMPUS, PUZZLECUBE, QUANTUMBOT, TREASUREMAP (TM), TURBINE, TURBULENCE (TU), UNITEDRAKE, XKEYSCORE (XKS), STELLABLUE
0.0
Chinese Exfiltrate Sensitive Military Technology
Document
Release Date:
2015-01-17
These three undated NSA slides describe alleged Chinese cyberattacks against US military targets, codenamed BYZANTINE HADES: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
(U) Acquired radar design
- (U) Numbers and types of
modules
(U) Detailed engine
schematics
(U) Methods for cooling gases
(U) Leading and trailing edge
treatments
(U) Aft deck he...
0.0
BYZANTINE HADES: An Evolution of Collection
Document
Release Date:
2015-01-17
Document Date:
2010-06-01
This June 2010 NSA presentation for the SIGDEV conference describes efforts to trace a suspected Chinese cyber attack: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL
(S//REL)BYZANTINE HADES: An
Evolution of Collection
NTOC, V225
SIGINT Development Conference
June 2010
TOP SECRET//COMINT//REL TO...
0.0
TUTELAGE
Document
Release Date:
2015-01-17
This undated NSA presentation describes techniques for repurposing third party attack tools: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA,
FVEY
TOP SECRET//COMINT//REL TO USA,
TOP SECRET//COMINT//REL TO USA,
FVEY
Before TUTELAGE...
AFTERk
INTRUSION
Manual Analysis of Reporting Lo...
0.0
SNOWGLOBE: From Discovery to Attribution
Document
Release Date:
2015-01-17
Document Date:
2011-01-01
This 2011 CSEC presentation describes how the agency analysed SNOWGLOBE, which it considered “to be a state-sponsored CNO effort, put forth by a French intelligence agency”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Overall Classification: TOP SECRET II COMINT II REL TO CAN, AUS, GBR, NZL, USA
■ ■ Communications Security
Establishment Canada
SNOWGLOBE:
From Discovery to Attribution
CSEC CNT/Cyb...
0.0
TRANSGRESSION Overview for Pod58
Document
Release Date:
2015-01-17
Document Date:
2010-02-07
This 7 February 2010 NSA presentation outlines techniques to “discover, understand, evaluate, and exploit foreign CNE/CNA exploits”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOPSECRET//COMINT//REL TO USA, FVEY
TRANSGRESSION Overview for Pod58
S31177
7 Feb 2010
DERIVED FROM: NSA/CSSM 1-52
DATED 08 JAN 2007
DECLASSIFY ON: 20320108
TOPSECRET//COMINT//REL T...
0.0
‘4th Party Collection’: Taking Advantage of Non-Partner Computer Network Exploitation Activity
Document
Release Date:
2015-01-17
Document Date:
2008-01-07
This 7 January 2008 post from NSA Menwith Hill Station’s internal Horizon newsletter describes the practice of piggybacking on other states’ computer network exploitation operations: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
SIDToday - '4th Party Collection': Taking Advantage of Non-Partner Computer Network Exploitation Activity
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA ...
0.0
Moving Data Through Disconnected Networks
Document
Release Date:
2015-01-17
Document Date:
2012-06-18
This June 2012 NSA presentation describes methods to exfiltrate data, even from networks that are apparently offline: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Moving Data Through
Disconnected Networks
Delay-Tolerant Networking and
the IC (U//FOUO)
June ;
The overall classification of this briefing is:
TOP SECRET//COMINT//REL TO USA, FVEY
...
0.0
Mobile apps doubleheader: BADASS Angry Birds
Document
Release Date:
2015-01-17
This undated joint GCHQ/CSEC presentation provides an overview of “exploring and exploiting leaky mobile apps”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Mobile apps doubleheader: BADASS Angry Birds
From 6 weeks to 6 minutes: protocols exploitation in a rapidly changing world
Exploring and Exploiting Leaky Mobile Apps with BADASS
GTE/GCHQ GA...
0.0
CNE Presence in CT10 Status Report
Document
Release Date:
2015-01-17
This undated NSA paper describes a project to recognise and process data that comes from third party attacks on computers: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//NOFORN//20291123
CNE Presence in CT10 Status Report
Authors:
SNIP Intern
1LT
(U//FOUO) Executive Summary
(S//SI//REL USA, FVEY) This paper discusses the work ...
0.0
CyberCOP
Document
Release Date:
2015-01-12
Document Date:
2013-04-11
These three slides, taken from a 11 April 2013 NSA presentation show screenshots from a tool called CyberCOP, which appears to monitor botnets and the DDOS attacks they perform: see the NDR.de article Cyberkrieg: Wie gefährdet ist Deutschland?, 12 January 2015.
TOP SECRET//SI//REL TO USA, FVEY
CYBER
COP
CDOSG
Apr 11, 2013
CyberCOP Product Manager
Overall Classification: TOP SECRET//SI//REL TO USA,FVEY
TOP SECRET//SI//REL TO USA, FVEY
...
0.0
To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; US SIGINT Provides Key Support
Document
Release Date:
2014-12-28
Document Date:
2009-06-12
This 12 June 2009 post from NSA’s internal SIDToday newsletter recounts a German/Afghan targeted operation and its support from the agency: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
SIDToday - To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; U.S. SIGINT Prov...
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS C...
0.0
Secure Sockets Layer (SSL) / Transport Layer Security (TLS)
Document
Release Date:
2014-12-28
This undated NSA presentation gives a basic overview of SSL internet encryption: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
Secure Sockets Layer (SSL
) / Transport Layer Security
(TLS)
Network Security Products
S31213
UNCLASSIFIED
Example
^ http://www.greatstuff.com
^ Wants credit card number
^ Look ...
0.0
TLS Trends: A roundtable discussion on current usage and future directions
Document
Release Date:
2014-12-28
This CSEC presentation from 2012 outlines the agency’s capabilities against SSL encryption at that point: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO CAN, AUS, GBR, NZL, USA
rs
TLS Trends:
A roundtable discussion on current
usage and future directions
Communications Security Establishment Canada (CSEC)
...
0.0
GCHQ Analytic Cloud Challenges
Document
Release Date:
2015-09-25
Document Date:
2012-05-14
This GCHQ presentation dated 14 May 2012 describes the agency receiving “more than 50 billion events [metadata records] per day” and some of the tools available for analysing that mass of data: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
gchq-analytic-cloud-challenges-p1-normal.gif:
GCHQ Analytic Cloud Challenges
Innovation Lead for Data, Analytics &
Visualisation Engineering
This information is exempt from Disclosure unde...
0.0
The SIGINT Philosopher: Descartes Would Have Been a Lousy SIGINT Reporter
Document
Release Date:
2015-08-11
Document Date:
2012-06-15
This 15 June 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column tackles the subject of partial information: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST
POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // RELTO USA
AUS CAN GBR NZL
Welcome! Saturday, 10 Nov 2012
• Web search
• Agency-all Emails
• SID-all Email...
0.0
The SIGINT Philosopher: In Praise of Not Knowing
Document
Release Date:
2015-08-11
Document Date:
2012-08-16
This 16 August 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, considers how analysts should tackle the situation where they cannot fully answer the questions they are tasked with: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST
POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA
AUS CAN GBR NZL
Welcome! Saturday, 10 Nov 2012
• Web search
• Agency-all Emails
• SID-all Emai...
0.0
The SIGINT Philosopher Is Back — with a New Face!
Document
Release Date:
2015-08-11
Document Date:
2012-05-29
This 29 May 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, gives a first person account of how an analyst became reconciled to the idea of total surveillance during a polygraph test: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST
POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA
AUS CAN GBR NZL
Welcome! Saturday, 10 Nov 2012
• Web search
• Agency-all Emails
• SID-all Emai...
0.0
XKEYSCORE Workflows 2009
Document
Release Date:
2015-07-01
Document Date:
2009-03-05
This NSA presentation dated 5 March 2009 outlines the use of Workflows within XKeyScore and includes screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-workflows-2009-p1-normal.gif:
XKEYSCORE
Workflows
05 March 2009
i3I
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, MZL
i —*
DERIVED FROM: NSA/CSSM 1-52
DATED: 20070108
...
0.0
Tech Strings in Documents (aka Tech Extractor) 2009
Document
Release Date:
2015-07-01
Document Date:
2009-12-01
This December 2009 NSA presentation explains how keyword selection works within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-tech-extractor-2009-p1-normal.gif:
TOP SECRET//COMINT//REL TO USA. AUS, CAN, GBR. NZU/20291123
Tech Strings in
Documents
(aka Tech Extractor)
December 2009xks-tech-extractor-2009-p2...
0.0
NSA Extended Enterprise Report: July 2008
Document
Release Date:
2015-04-02
Document Date:
2008-07-08
This extract from a July 2008 NSA document describes Argentina as GCHQ’s “primary interest” in Latin America: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET//REL TO USA, AUS, CAN, GBR, NZL//20291123
Extended Enterprise Report: July 2008
This document summarises key activities of interest to GCHQ at the NSA
Regional Cryptologic Center...