Filtered By
United States (USA/US) X
Countries Mentioned [filter]
Results
1879 Total
0.0

SUSLOW monthly report for March 2013

Document

Release Date: 2015-03-10 Document Date: 2013-03-01
This NSA document from March 2013 gives an update on GCSB activities, including the use of WARRIOR PRIDE malware against an ASEAN country and the Kim Dotcom case: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY (U//FOUO) SUSLOW Monthly Report for March 2013 (U) March highlights: - (U) Intelligence update: o (TS//SI//REL TO USA, FVEY) GCSB has a WARRIORPRIDE ca...
0.0

COMSAT Advisory Board (CAB) GCSB Update 22 April 2010

Document

Release Date: 2015-03-08 Document Date: 2010-04-21
This GCSB presentation dated 22 April 2010 details some of the systems available at the agency’s Waihopai base: see the Sunday Star Times article Snowden files: Inside Waihopai’s domes, 8 March 2015.
COMSAT Advisory Board (CAB) GCSB Update 22 April 2010 The Overall Classification of this briefing is: S E C R E T COMINT REL TO USA, FVEY o Economic Climate o Court Decision o S...
0.0

Continued effort against the South Pacific region

Document

Release Date: 2015-03-05 Document Date: 2009-06-06
This extract from the NSA’s minutes of a June 2009 meeting at the agency’s headquarters in Fort Meade, where a GCSB officer was present: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 May 2015.
TOP SECRET//COMINT//REL10 USA, AUS, CAN, GBR, NZL Continued effort against the South Pacific region - GCSB s access development activities will be focused on the South Pacific region and entai...
0.0

NATO Civilian Intelligence Council – Cyber Panel – Talking Points

Document

Release Date: 2015-02-04 Document Date: 2011-09-14
This US National Intelligence Council memo dated 14 September 2011 provides US talking points for a forthcoming NATO meeting and includes the assessment that the threat presented by Anonymous and hacktivist activity is “minimal”: see the Intercept article Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise, 4 February 2015.
SECRET//REL TO USA, NATO NIM/Cyber 14 September 2011 Talking Points Subject: (S//REL NATO) NATO Civilian Intelligence Council—Cyber Panel National Input A. Threat Overview (U) (U...
0.0

Roger Dingledine at NSA NOV 2007

Document

Release Date: 2013-10-04 Document Date: 2007-11-01
This NSA memo summarises a talk given by Roger Dingledine of the Tor Project on 1 November 2007: see the Secret NSA documents show campaign against Tor encrypted network, 4 October 2013.
TOP SECRET // COMINT // REL TO USA, AUS, CAN, GBR, NZL Roger Dingledine at NSA NOV 2007 From PE Contents * 1 (U) Talk by Roger Dingledine at NSA, 11/01/2007 at R&E (Sponsored by NSA RT) o 1...
0.0

LEVIATHAN and the FFU Hypothesis

Document

Release Date: 2015-01-28 Document Date: 2012-01-01
This CSE (then CSEC) presentation from 2012 describes the Canadian agency’s file download monitoring operation: see the Intercept article Canada Casts Global Surveillance Dragnet Over File Downloads, 28 January 2015. cse-presentation-on-the-levitation-project
TOP SECRET//SI//REL CAN, AUS, GBR, NZL, USA LEVITATION and the FFU Hypothesis cse-cst.gc.ca TOP SECRET//SI//REL CAN, AUS, GBR, NZL, USA What is LEVITATION? A behaviour-based target...
0.0

The Alice Springs Resolution

Document

Release Date: 2018-03-01 Document Date: 2004-06-25
This NSA document contains the short text of the Alice Springs Resolution, a 2014 agreement designed to allow common metadata sharing between the Five Eyes intelligence alliance: see the Intercept article How London’s 7/7 Bombings Led to “Unprecedented” Surveillance Tactics, 1 March 2018.
The Alice Springs Resolution In view of the increasing importance of the analysis of metadata to the genera tion of into! licence, particularly against I he Icrnorift target, Elic SIC; IN I Age...
0.0

SIGINT Seniors Making History – in a Good Way

Document

Release Date: 2018-03-01 Document Date: 2005-08-02
This 2005 article from the internal NSA newsletter SIDToday describes the conclusions of a meeting of the SIGINT Seniors group – the participants committed the 12 nations to deploy a tactical communications system in Afghanistan and build on the successful partnership during the Athens Olympics Games in advance of the 2006 Winter Olympics in Italy […]
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) SIGINT Seniors Making History - in a Good Way FROM: FAD's MultiNational/Second P...
0.0

Global Collaboration Environment (GCE)

Document

Release Date: 2018-03-01 Document Date: 2013-04-10
This set of NSA talking points, dated 10 April 2013, outlines a plan for continuing the GCE intelligence-sharing arrangement beyond the Afghan war, which NSA and GCHQ would collaborate on closely: see the Intercept article The Powerful Global Spy Alliance You Never Knew Existed, 1 March 2018.
SECRET//SI//REL TO USA, GBR (U) Topic: Global Collaboration Environment (GCE) (U//FOUO) Director's Talking Points: • (S//REL TO USA, GBR) Thank GCHQ for giving full support to GCE, and for...
0.0

SIGINT Partnership Agrees to Greater Sharing

Document

Release Date: 2018-03-01 Document Date: 2010-08-12
This 12 August 2010 post from the NSA’s internal newsletter SIDToday describes the outcomes of the annual Sigint Seniors Europe (SSEURP) conference, which agreed in principle to increase information sharing: see the Intercept article The Powerful Global Spy Alliance You Never Knew Existed, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI//REL) SIGINT Partnership Agrees to Greater Sharing on Afghanistan, CT, Piracy, and ...
0.0

GSM Temporary Selectors – Breakthroughs in Automated Identification

Document

Release Date: 2018-03-01 Document Date: 2005-07-27
This 2005 post from the NSA’s internal newsletter SIDToday explains how the agency overcame the obfuscation of IMSI codes by mobile phone companies: see the Intercept article NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (TS//SI) GSM Temporary Selectors - Breakthroughs in Automated Identification Target An...
0.0

Can ‘Motor City’ Manufacture Some Arabic Language Assistance for NSA?

Document

Release Date: 2018-03-01 Document Date: 2005-12-15
This December 2005 post from the NSA’s internal newsletter SIDToday describes the agency’s efforts to recruit Arabic-language specialists; a Detroit-based recruitment effort “unearthed significant issues”: see the Intercept article NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI) Can 'Motor City' Manufacture Some Arabic Language Assistance for NSA? FROM: Ci...
0.0

Now You’re Speaking My Language: NSA’s Linguistic Resources (Part I)

Document

Release Date: 2018-03-01 Document Date: 2004-06-29
This post from the NSA’s internal newsletter SIDToday introduces a series on the agency’s struggle to find qualified language experts: see the Intercept article NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Now You're Speaking My Language: NSA's Linguistic Resources (Part I) FROM: SIGINT ...
0.0

OAKSTAR Travel Handbook: A Guide for Traveling

Document

Release Date: 2018-03-20 Document Date: 2013-03-01
This internal document for NSA employees dated 1 March 2013 provides a guide for visiting facilities related with the OAKSTAR programme,which are largely based in the United States, save for the MONKEYROCKET source, which has information forwarded to the European Technical Center in Germany: see the Intercept article The NSA Worked To “track Down” Bitcoin […]
TOP SECRET//COMINT//NOFORN (U) OAKSTAR Travel Handbook: A Guide for Traveling Initials Revision 20060925 Initial draft template 20061124 Initial draft for site 20061130 ...
0.0

The International Security Issues Build-Out

Document

Release Date: 2017-04-24 Document Date: 2006-05-17
This section of a 17 May 2006 article from an internal NSA newsletter makes it clear that Japanese foreign policy and trade activities are surveillance targets for the agency: see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017.
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI TK 7 REL TO USA AUS CAN GBR NZL (C) The International Seemin’ Issues Build-Out Global Capabilities Manager. ISI (S2C) Ru...
0.0

Advanced HTTP Activity Analysis

Document

Release Date: 2015-07-01 Document Date: 2009-01-01
This 114-page NSA training presentation from 2009 explains how agency analysts can exploit HTTP traffic within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
Advanced HTTP Activity Analysis 2009 Goal The goal of this training is to get you familiar with basic HTTP traffic and understand how to target and expliot it using X-KEYSCORE Ag...
0.0

SUSLOW monthly report for March 2013

Document

Release Date: 2015-04-19 Document Date: 2013-03-01
This monthly report from the NSA’s Special US Liaison Officer in Wellington outlines progress on FROSTBITE (BASILHAYDEN) – a project to infiltrate the Chinese diplomatic computer network: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
| TOP SECRET//SI//REL TO USA, FVEY (U//FOUO) SUSLOW Monthly Report for March 2013 (U) March highlights: (U) Intelligence update: o (S//SI//REL TO USA, FVEY) GCSB project FROSTBITE / TA...
0.0

XKEYSCORE, Cipher Detection, and You!

Document

Release Date: 2013-12-11 Document Date: 2008-08-21
This presentation from NSA’s Mathematics Research Group, dated 21 August 2008 provides an introduction to the XKeyScore system’s data sources and fingerprinting capabilities: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
xks-cipher-detection-and-you-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, FVEY , Cipher Detection, and You! Mathematics Research Group 21 August 2008 TOP SECRET//COMINT//REL TO USA, F...
0.0

TRAFFICTHIEF Configuration Readme

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration information for TRAFFICTHIEF, the live alerts element of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
trafficthief-readme-p1-normal.gif: SECRET//REL TO USA, FVEY (U//FOUO) TRAFFICTHIEF Configuration Read Me (U) Overview (S//REL) TRAFFICTHIEF (TT) is the NSA corporate alerting and tippin...
0.0

Tracking Targets on Online Social Networks

Document

Release Date: 2014-05-13 Document Date: 2009-09-01
This September 2009 NSA presentation outline some of the insights that analysts can gather from online social networks (OSNs) and show the XKeyScore interface for performing such searches: see the book No Place To Hide, 13 May 2014.
TOP SECRET//COMINT//REL TO USA, FVEY (S//SI//REL) Tracking Targets on Online Social Networks The overall classification of this briefing to TOP SECRET//COMINT//REL TO USA, FVEY Online...
0.0

HTTP Activity in XKEYSCORE

Document

Release Date: 2015-07-01 Document Date: 2009-03-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HTTP Activity in XKEYSCORE March 2009 Derived From: NSA/QSSM 1-52 Dated: 200701 (T Declassify On: 202911 ...
0.0

Email Address vs User Activity

Document

Release Date: 2015-07-01 Document Date: 2009-06-24
This NSA presentation from 24 June 2009 explains how to use the email search functionality within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 vs User Activity 24 June 2009 "»Ol 01 t » «4 Ha#f* IWt De rived From: NSA/CSSM 1-52 ...
0.0

Special-Delivery SIGINT: How NSA Got Reports to US Negotiators In Time for Them To Be of Value

Document

Release Date: 2017-04-24 Document Date: 2007-07-13
This 13 July 2007 article from the internal NSA newsletter SIDToday describes how the agency surveilled the Japanese delegation at the 59th annual meeting of the International Whaling Commission, with the help of their New Zealand partner: see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017. […]
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI//REL) Special-Delivery SIGINT: How NSA Got Reports to US Negotiators In Time for Th...
0.0

Back in Time: The KAL-007 Shootdown

Document

Release Date: 2017-04-24 Document Date: 2006-07-19
This 19 July 2006 article from the internal NSA newsletter Foreign Affairs digest explains the ramifications of the Soviet attack on Korean Airlines flight 007 in 1983 for US-Japanese intelligence cooperation: see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017.
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Back in Time: The KAL-007 Shootdown FROM: the Foreign Affairs Digest Unknown Run...
0.0

SIGINT Development Support II Program Management Review

Document

Release Date: 2016-08-19 Document Date: 2013-04-24
Four slides taken from a 24 April 2013 NSA presentation detail how SECONDDATE man-in-the-middle attacks were used against targets in Pakistan and Lebanon: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//SI//NOFORN The overall classification of this brief is (U) SIGINT Development Support II Program Management Review ► 24 April 2013 TOP SECRET//COMINT//NOFORN Derived Fro...
0.0

DNI Processing of RINGBILL Access

Document

Release Date: 2016-11-16 Document Date: 2013-04-23
This NSA technical memo from April 2013 describes deployments of agency personnel to the facility codenamed TITANPOINTE: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
TOP SECRET//COMINT//REL TO USA, FVEY (Report generated on:4/23/2013 7:00:17AM ) Blarney-40-12 Work in Progress ECP Lead: Title of Change: DNI Processing of RINGBILL Access Site(s): TIT...
0.0

FAIRVIEW TDY Handbook

Document

Release Date: 2016-11-16 Document Date: 2013-02-06
This internal document for NSA employees dated 6 February 2013 provides a guide for visiting facilities related with the FAIRVIEW programme, including the TITANPOINTE building in New York City: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20301121 FAIRVIEW TDY Handbook (U) A guide for traveling to Site Last Updated: 6 February 2013 POC: I Derived From: NSA/CSSM 1-52 Date...
0.0

How Is Human Language Technology Progressing?

Document

Release Date: 2018-01-19 Document Date: 2011-09-06
This article from the NSA internal newsletter SIDToday discusses the progress of the agency’s voice recognition efforts, particularly in Spanish and the languages spoken in Afghanistan: see the Intercept article Finding Your Voice, 19 January 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI//REL) How Is Human Language Technology (HLT) Progressing? FROM: (U//FOUO) La...
0.0

Perseverance Pays Off: Eight-Year SIGINT Effort Culminates in Arrest of Elusive Colombian Terrorist

Document

Release Date: 2017-11-30 Document Date: 2008-05-16
In this 2008 post from the NSA’s internal SIDToday newsletter the agency claims responsibility for the arrest of FARC member Doris Adriana: see the Intercept article NSA Secretly Helped Convict Defendants in U.S. Courts, 30 November 2017.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI/REL) Perseverance Pays Off: Eight-Year SIGINT Effort Culminates in Arrest of Elusiv...
0.0

FISA: Teaming with the FBI in the Global War on Terrorism

Document

Release Date: 2017-11-30 Document Date: 2005-08-17
This 2005 article from the NSA internal newsletter SIDToday makes it clear that, at that time, 40% of all the agency’s counterterrorism information was drawn from FISA sources, in collaboration with the FBI: see the Intercept article NSA Secretly Helped Convict Defendants in U.S. Courts, 30 November 2017.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) FISA: Teaming with the FBI in the Global War on Terrorism FROM: Special Source O...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh