Filtered By
United States (USA/US)X
Countries Mentioned [filter]
Results
469 Total
1.0

Classification guide for ECI Pawleys (PAW)

Document

Document Date: 2006-11-14Release Date: 2014-10-10
This 2006 NSA classification guide outlines the sensitivity of the agency’s clandestine human and electronic access to systems in order to “obtain cryptographic information and material”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE 0^ftUJDt54 SD7 AôEWf b<Kf' DTBb3LP HDEYI D0<XS«X 0*YR Jfi! (55^ BUH 5654 ...
1.0

Net Defense from Encrypted Communications

Document

Release Date: 2014-12-28
This February 2012 presentation from NSA’s Technology Directorate describes a system codenamed BLUESNORT and its relationship to associated systems: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
(U//FOUO) Net Defense from Encrypted Communications irt i ir\ / 1 HI 1 SECRET//SI//REL TO USA, FVEY Increment 3 Requirement SYSREQ10322.2 (S//REL) TURMOIL shall reinject decrypted ...
1.0

Intro to the VPN Exploitation Process

Document

Document Date: 2010-09-13Release Date: 2014-12-28
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
1.0

VS MALIBU IKE And ESP Metadata Flows

Document

Release Date: 2014-12-28
These four undated NSA slides show a workflow for defeating VPN encryption: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL VS MALIBU IKE And ESP Metadata Flows /20291123 TUBE TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//COMIN...
1.0

AURORAGOLD

Document

Document Date: 2011-01-01Release Date: 2014-12-04
This 4-page NSA document, presented at a Five Eyes SIGDEV conference 2011, gives an overview of the AURORAGOLD (AG) project, in which technical intelligence is gathered to ensure future agency access to mobile phone networks worldwide: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (u//fouo) AURORAGOLD (S//SI//REL) Project Overview: The mission of the AURORAGOLD (AG) project is to maintain data about international GSM/UMT...
1.0

Quadrennial Intelligence Community Review Final Report, April 2009

Document

Document Date: 2009-04-01Release Date: 2014-09-05
This April 2009 report from the Office of the Director of National Intelligence considers the challenges the US intelligence community may face by 2025 and suggests that the competitive advantage of US firms may need to be supported by espionage: see the Intercept article The U.S. Government’s Secret Plans to Spy for American Corporations, 5 […]
SECRET//REL T FINAL REPORT '¿[\ns »' National Intelligenc Derived From: ODNI POL-08 Declassify On: 20340306 □ SECRET//REL TO USA, FVEY FINAL REPORT April 2009 □ SECR...
1.0

Expanding Endpoint Operations

Document

Document Date: 2004-09-17Release Date: 2015-01-17
This 17 September 2004 article from the internal NSA newsletter SIDToday describes the establishment of a new Remote Operations Center (ROC) for performing endpoint (hacking) attacks: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
SIDToday - Expanding Endpoint Operations DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) Expanding Endpoint Operations FRO...
1.0

COMSAT Advisory Board (CAB) GCSB Update 22 April 2010

Document

Document Date: 2010-04-21Release Date: 2015-03-08
This GCSB presentation dated 22 April 2010 details some of the systems available at the agency’s Waihopai base: see the Sunday Star Times article Snowden files: Inside Waihopai’s domes, 8 March 2015.
COMSAT Advisory Board (CAB) GCSB Update 22 April 2010 The Overall Classification of this briefing is: S E C R E T COMINT REL TO USA, FVEY o Economic Climate o Court Decision o S...
1.0

NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks

Document

Document Date: 2010-01-01Release Date: 2013-09-16
These three slides from an NSA presentation made for the 2010 SIGDEV conference show that the agency is actively targeting payments networks: see the Der Spiegel article ‘Follow the Money’: NSA Monitors Financial World, 13 September 2013.
(S//REL TO USA, FVEY) NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks (U//FOUO) NSA, Network Analysis Center 2010 SIGDEV Conference 09/13/13 SE...
1.0

Roger Dingledine at NSA NOV 2007

Document

Document Date: 2007-11-01Release Date: 2013-10-04
This NSA memo summarises a talk given by Roger Dingledine of the Tor Project on 1 November 2007: see the Secret NSA documents show campaign against Tor encrypted network, 4 October 2013.
TOP SECRET // COMINT // REL TO USA, AUS, CAN, GBR, NZL Roger Dingledine at NSA NOV 2007 From PE Contents * 1 (U) Talk by Roger Dingledine at NSA, 11/01/2007 at R&E (Sponsored by NSA RT) o 1...
1.0

SUSLOW monthly report for March 2013

Document

Document Date: 2013-03-01Release Date: 2015-03-10
This NSA document from March 2013 gives an update on GCSB activities, including the use of WARRIOR PRIDE malware against an ASEAN country and the Kim Dotcom case: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY (U//FOUO) SUSLOW Monthly Report for March 2013 (U) March highlights: - (U) Intelligence update: o (TS//SI//REL TO USA, FVEY) GCSB has a WARRIORPRIDE ca...
1.0

HIDDENSALAMANDER: Alerting and Characterization of Botnet Activity in TURMOIL

Document

Release Date: 2015-01-17
This undated NSA presentation describes techniques for detecting botnets: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
P SECRET//COMINT//REL TO USA, FVEY HIDDENSALAMANDER Alerting and Characterization of _____iyiissiQr\] CAPABILIT, ES Botnet Activity in TURMOIL Briefers: SECRET//REL TO USA, FV...
1.0

Classification Guide for Human Language Technology (HLT) Models

Document

Document Date: 2011-05-18Release Date: 2015-05-05
This NSA classification guide dated 18 May 2011 delineates the sensitivity of particular aspects of the agency’s speech-to-text capabilities: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
UNCLASSIFIED//FOR OFFICIAL USE ONLY NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) Classification Guide for Human Language Technology (HLT) Models 2-20 Effective Date: 18 May ...
1.0

Finding and Querying on Document Metadata

Document

Document Date: 2009-04-01Release Date: 2015-07-01
This NSA presentation from April 2009 explains how analysts can make use of document metadata available through XKeyScore, together with worked examples and screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Finding and Querying on Document Metadata tooz|/ 1 Booz|Allen| Hamilton Sigint Development Support / SIGINT Technica...
1.0

HTTP Activity vs. User Activity

Document

Document Date: 2009-06-19Release Date: 2015-07-01
This NSA presentation from 19 June 2009 explains the metadata capabilities of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL m V HTTP Activity vs User Activity 19 June 2009 Derived From: NSA/CSSM 1-52 Bated :l2007i MM TOP SEC...
1.0

Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints

Document

Document Date: 2010-05-01Release Date: 2015-07-01
This 61-page NSA presentation from May 2010 provides analysts with a guide to tracking individuals within XKeyScore using the system’s fingerprint capability: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints May 2010 TOP SECRET //COMINT //REL TO USA, AUS, CAN, GBR, NZL ...
1.0

YRS Gears up to Celebrate 40 Years

Document

Document Date: 2012-07-02Release Date: 2015-08-03
This July 2012 article from Northwest Passage, the NSA internal newsletter for the Yakima Research Station, marks the 40th anniversary of the base, including its involvement in ECHELON: see the Intercept article GCHQ and Me: My Life Unmasking British Eavesdroppers, 3 August 2015.
,he NORTHWEST PASSAGE TOP SECRET//SI//REL TO USA, FVEY Volume 3, Issue 7 Your Connection to the Yakima Research Station July 2012 (U) YRS Gears Up to Celebrate 40th Anniversary (S...
1.0

XKEYSCORE for Counter-CNE

Document

Document Date: 2011-03-01Release Date: 2015-07-01
This NSA presentation from March 2011 discusses the use of the XKeyScore tool for countering foreign CNE attacks: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-for-counter-cne-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, FVEY Using the XKS CNE dataset and a DISGRUNTLEDDUCK fingerprint, we now see at least 21 TAO boxes with evidence of this in...
1.0

The SIGINT Philosopher: In Praise of Not Knowing

Document

Document Date: 2012-08-16Release Date: 2015-08-11
This 16 August 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, considers how analysts should tackle the situation where they cannot fully answer the questions they are tasked with: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 • Web search • Agency-all Emails • SID-all Emai...
1.0

The SIGINT Philosopher: When Brevity Is Just the Soul of “Huh?”

Document

Document Date: 2012-07-16Release Date: 2015-08-11
This 16 July 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, discusses the hardships of writing reports for the agency: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 • Web search • Agency-all Emails • SID-all Emai...
1.0

XKEYSCORE Workflows 2011

Document

Document Date: 2011-09-19Release Date: 2015-07-01
This NSA presentation dated 19 September 2011 outlines the use of Workflows within XKeyScore and includes screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-workflows-2011-p1-normal.gif: XKEYSCORE Workflows 19 September 2011 SECRET7/COMINT//REL TO USA, AUS, CAN, GBR, MZL i —* DERIVED FROM: NSA/CSSM 1-52 DATED: 20070108...
1.0

XKEYSCORE Appids & Fingerprints

Document

Release Date: 2015-07-01
This undated NSA presentation gives a technical introduction to the treatment of AppIDs within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-application-ids-p1-normal.gif: XKEYSCORE Appids & Fingerprints xkeyscore@nsaxks-application-ids-p2-normal.gif: • Syntax is similar to C: functionCname', level, coptional info ) = 'se...
1.0

VOIP in XKEYSCORE

Document

Document Date: 2009-03-01Release Date: 2015-07-01
This NSA presentation from March 2009 shows how VOIP intercepts are handled in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
voip-in-xks-p1-normal.gif: TOP SECRET//COMINT7/REL TO USA. AUS, CAN, GBR, NZL//20291123 VOIP in XKEYSCORE March 2009 TOP SECRET//COMINT//REL TO USA. AUS. CAN, GBR, NZL//20291123voip-in-...
1.0

Writing XKS Fingerprints

Document

Document Date: 2010-11-22Release Date: 2015-07-01
This 67-page NSA presentation from November 2010 explains how to create the “Fingerprints” which enable analysts to trace individuals within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
writing-xks-fingerprints-p1-normal.gif: Writing XKS Fingerprints November 2010 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZLwriting-xks-fingerprints-p2-normal.gif: Agenda • Naming...
1.0

Using XKEYSCORE to Enable TAO

Document

Document Date: 2009-07-16Release Date: 2015-07-01
This NSA presentation from 16 July 2009 explains how the XKeyScore system supports the agency’s Tailored Access Operations: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
using-xks-to-enable-tao-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. AUS, CAN. GBR. NZL//20291123 Ait* tuv. Using XKEYSCORE to Enable TAO Booz I AJIen l Hamilton SDS Analyst 16 July ...
1.0

MHS FISINT Successfully Collects Israeli F-16 Heads Up Display

Document

Document Date: 2008-02-01Release Date: 2016-01-29
This March 2008 post from the internal NSA newsletter SIDToday, describes the Menwith Hill station’s success in intercepting the video feeds from Israeli F-16 fighter jets and drones: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016.
TOP SECRET//COMINT/TALENT KEYHOLE// REL TO USA, FVEY published March 2008 MHS FISINT Successfully Collects Israeli F-16 Heads-Up Display (S//SI//REL) , Menwith Hill Station (F77) (S...
1.0

From SIGINT to HUMINT to SIGINT (through HUMINT) – part 1

Document

Document Date: 2005-03-10Release Date: 2016-05-11
This SIDToday article from 10 March 2005 details the experiences of Eric Fair, a US interrogator in Iraq who went on to work for the NSA. In his memoirs, published in 2016, Fair admits self-censoring in order not to disclose his moral qualms to colleagues: see the Intercept article The Secret NSA Diary of an […]
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) From SIGINT to HUMINT to SIGINT (through HUMINT) -- part 1 FROM: Eric Fai...
1.0

Another Successful Olympics Story

Document

Document Date: 2004-10-06Release Date: 2015-09-29
This post from the NSA’s internal SIDToday newsletter, dated 6 October 2004, reviews the agency’s operations for the recently-concluded Athens Olympics: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
id-863-redacted-formatted-p1-normal.gif: DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Another Successful Olympics Story FROM:...
1.0

GCHQ Analytic Cloud Challenges

Document

Document Date: 2012-05-14Release Date: 2015-09-25
This GCHQ presentation dated 14 May 2012 describes the agency receiving “more than 50 billion events [metadata records] per day” and some of the tools available for analysing that mass of data: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
gchq-analytic-cloud-challenges-p1-normal.gif: GCHQ Analytic Cloud Challenges Innovation Lead for Data, Analytics & Visualisation Engineering This information is exempt from Disclosure unde...
1.0

HIMR Data Mining Research Problem Book

Document

Document Date: 2011-09-20Release Date: 2016-02-02
This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The […]
UK TOP SECRET STRAP1 COMINT AUS/CAN/NZ/UK/US EYES ONLY Reference: OPC-M/TECH.A/455 (v1.0, r206) Date: 20 September 2011 Copy no: HIMR Data Mining Research Problem Book OPC-MCR, G...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh