Filtered By
Internal Procedures X
Document Topic [filter]
Results
166 Total
0.0

Content or Metadata?

Document

Release Date: 2015-09-25
This undated GCHQ spreadshhet clarifies how the agency categorises different aspects of intercepted communications: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
content-metadata-matrix-p1-normal.gif: UK SECRET STRAP1 COMINT AUSiCAN'NZiUMJS EYES ONLY ORCON CONTENT OR METADATA? Categorisation of aspects of intercepted communications - GCHQ policy ...
0.0

HRA auditing

Document

Release Date: 2015-09-25
This undated page from GCHQ’s internal GCWiki describes the agency’s audit procedure to document compliance with the UK Human Rights Act: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
hra-auditing-p1-normal.gif: UK CONFIDENTIAL The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webtea...
0.0

Events analysis

Document

Release Date: 2015-09-25 Document Date: 2008-11-27
This GCHQ slide taken from a presentation dates 27 November 2008 confirms that agency metadata repositories can be datamined for information relating to individuals within the UK: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
Events analysis SALAMANCA, HAUSTORIUM, THUGGEE, IMMINGLE less intrusive than communications content authorisation not needed for individuals in the UK necessity and proportionality st...
0.0

The SIGINT Philosopher: Descartes Would Have Been a Lousy SIGINT Reporter

Document

Release Date: 2015-08-11 Document Date: 2012-06-15
This 15 June 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column tackles the subject of partial information: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // RELTO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 • Web search • Agency-all Emails • SID-all Email...
0.0

The SIGINT Philosopher: In Praise of Not Knowing

Document

Release Date: 2015-08-11 Document Date: 2012-08-16
This 16 August 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, considers how analysts should tackle the situation where they cannot fully answer the questions they are tasked with: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 • Web search • Agency-all Emails • SID-all Emai...
0.0

The SIGINT Philosopher Is Back — with a New Face!

Document

Release Date: 2015-08-11 Document Date: 2012-05-29
This 29 May 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, gives a first person account of how an analyst became reconciled to the idea of total surveillance during a polygraph test: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 • Web search • Agency-all Emails • SID-all Emai...
0.0

NSA Extended Enterprise Report: July 2008

Document

Release Date: 2015-04-02 Document Date: 2008-07-08
This extract from a July 2008 NSA document describes Argentina as GCHQ’s “primary interest” in Latin America: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET//REL TO USA, AUS, CAN, GBR, NZL//20291123 Extended Enterprise Report: July 2008 This document summarises key activities of interest to GCHQ at the NSA Regional Cryptologic Center...
0.0

Can ‘Motor City’ Manufacture Some Arabic Language Assistance for NSA?

Document

Release Date: 2018-03-01 Document Date: 2005-12-15
This December 2005 post from the NSA’s internal newsletter SIDToday describes the agency’s efforts to recruit Arabic-language specialists; a Detroit-based recruitment effort “unearthed significant issues”: see the Intercept article NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI) Can 'Motor City' Manufacture Some Arabic Language Assistance for NSA? FROM: Ci...
0.0

Now You’re Speaking My Language: NSA’s Linguistic Resources (Part I)

Document

Release Date: 2018-03-01 Document Date: 2004-06-29
This post from the NSA’s internal newsletter SIDToday introduces a series on the agency’s struggle to find qualified language experts: see the Intercept article NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Now You're Speaking My Language: NSA's Linguistic Resources (Part I) FROM: SIGINT ...
0.0

The International Security Issues Build-Out

Document

Release Date: 2017-04-24 Document Date: 2006-05-17
This section of a 17 May 2006 article from an internal NSA newsletter makes it clear that Japanese foreign policy and trade activities are surveillance targets for the agency: see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017.
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI TK 7 REL TO USA AUS CAN GBR NZL (C) The International Seemin’ Issues Build-Out Global Capabilities Manager. ISI (S2C) Ru...
0.0

Legal Authorisation Flowcharts: TARGETING and COLLECTION

Document

Release Date: 2015-06-22 Document Date: 2008-11-01
This GCHQ document from November 2008 provides a guide to the legal authorisations required for different forms of agency activity: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
UK CONFIDENTIAL Version 6, dated 11/08 Side l The issue on GCVYeb is die definitive version; printed copies may be out of date. Terms are defined in the glossary at http w.v ope rations^'po...
0.0

Intrusion Analysis / JeAC

Document

Release Date: 2015-06-22 Document Date: 2008-07-23
This GCHQ document, last updated on 23 July 2008, provides information about the agency’s systems for detecting network threats and authorisation procedures: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
SECRET STRAP1 Intrusion Analysis/JeAC The IA team conducts all-source analysis both of emerging and current electronic attack types. It forms part of the Joint Electronic Attack Cell (JeAC)...
0.0

ACNO Skill Levels: Malware Analysis & Reverse Engineering

Document

Release Date: 2015-06-22
This undated GCHQ training document details the requirements for analysts engaged in the reverse engineering of commercial antivirus software: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
SECRET ACNO Skill 12: Malware Analysis & Reverse Engineering Knowledge of: • Relevant Operating Systems. • Current trends in attack vectors & targeted applications / protocols / services...
0.0

TRAFFICTHIEF Configuration Readme

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration information for TRAFFICTHIEF, the live alerts element of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
trafficthief-readme-p1-normal.gif: SECRET//REL TO USA, FVEY (U//FOUO) TRAFFICTHIEF Configuration Read Me (U) Overview (S//REL) TRAFFICTHIEF (TT) is the NSA corporate alerting and tippin...
0.0

DEEPDIVE Configuration Read Me

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration instructions for DEEPDIVE, a system that can be integrated with XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CONFIDENTIAL (U//FOUO) DEEPDIVE Configuration Read Me (U) Overview (C) The purpose of this document is to provide procedures to configure an XKEYSCORE server as a DEEPDIVE server. DEEPD...
0.0

Back in Time: The KAL-007 Shootdown

Document

Release Date: 2017-04-24 Document Date: 2006-07-19
This 19 July 2006 article from the internal NSA newsletter Foreign Affairs digest explains the ramifications of the Soviet attack on Korean Airlines flight 007 in 1983 for US-Japanese intelligence cooperation: see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017.
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Back in Time: The KAL-007 Shootdown FROM: the Foreign Affairs Digest Unknown Run...
0.0

Perseverance Pays Off: Eight-Year SIGINT Effort Culminates in Arrest of Elusive Colombian Terrorist

Document

Release Date: 2017-11-30 Document Date: 2008-05-16
In this 2008 post from the NSA’s internal SIDToday newsletter the agency claims responsibility for the arrest of FARC member Doris Adriana: see the Intercept article NSA Secretly Helped Convict Defendants in U.S. Courts, 30 November 2017.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI/REL) Perseverance Pays Off: Eight-Year SIGINT Effort Culminates in Arrest of Elusiv...
0.0

Protocol note for Japan visit

Document

Release Date: 2018-05-19 Document Date: 2013-01-01
This undated NSA protocol note provides a short briefing for a visit to the agency’s Deputy Director of Foreign Affairs by his Japanese counterpart, due to happen sometime after January 2013: see the Intercept article The Untold Story of Japan’s Secret Spy Agency, 19 May 2018.
SECRET//NOFORN Clearances: Accompanying NSA/CSS Senior: Photographer: Memento Presented: Uniform of the Day: Purpose of Visit: Justification for Directorate Involvement: Ex...
0.0

Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities

Document

Release Date: 2013-12-09 Document Date: 2007-01-01
A 2007 proposal to the NSA from contractor SAIC, promoting the company’s ability to support “intelligence collection in the games space”: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 December 2013.
Games: A Look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities Table of Contents FORWARD......................................................................4 ...
0.0

Classification Guide for SIGINT Material Dating from 16 August 1945 – 31 December 1967

Document

Release Date: 2014-06-18 Document Date: 2011-11-21
This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
TOP SECRET//SjyTK//NOFÜRN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR SIGINT Material Dating from 16 August 1945 *31 December 1967 Effects Dale: 21 De...
0.0

DNI/AG 702(g) Certification 2010-A

Document

Release Date: 2014-06-30 Document Date: 2010-07-15
This 2010 certification from the Director of National Intelligence and the Attorney General asserts that procedures are in place to ensure foreign intelligence gathering stays within the boundaries of the law by targeting people “who are reasonably believed to be outside the United States.” The breadth of the authority is, however, very wide, allowing surveillance […]
SECRET//ORCON,NOFORN CERTIFICATION OF THE DIRECTOR OF NATIONAL INTELLIGENCE AND THE ATTORNEY GENERAL PURSUANT TO SUBSECTION 702(g) OF TfififFORpGN INTELLIGENCE SURVEILLANCE ACT OF 1978, AS ...
0.0

Dragons, Shrimp, and XKEYSCORE: Tales from the Land of Brothers Grimm

Document

Release Date: 2014-06-18 Document Date: 2012-04-13
This internal NSA post dated 13 April 2012 from the European Cryptologic Center in Darmstadt, Germany recounts an “XKS training blitz”: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) Dragons, Shrimp, and XKEYSCORE; Tales from the Land of Brothers Grimm European Cryptologic Center, SIGDEV (F22) Run Date: 04/13/2012 (S//REL) The European Cryptologic Center ...
0.0

Provision of XKeyScore software to the BfV

Document

Release Date: 2014-06-18
This short extract from an NSA document shows that cooperation with Germany’s intelligence services went as far as providing the country’s domestic intelligence service, the Federal Office for the Protection of the Constitution (BfV), with access to XKeyScore: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
exchange. [TS//SI//NF) Germany: Provision of XKEYSCORE software to the ES1V will expand their ability to support NSA as we jointly prosecute CT targets. Technical support forXKEYSCGRE will be...
0.0

On the Road Again: SID Team Visits Germany

Document

Release Date: 2014-06-18 Document Date: 2006-02-01
This internal NSA post from 1 February 2006 describes the visit several agency personnel to bases in Germany: see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.
(U//FOUO) On. the Road Again: SID Team Visits Germany Assistant Deputy Director for Analysis & Production (S2) Run Date: 02/01/2006 (U//FOUO) After staying around headquarters for the las...
0.0

A Little Bad Aibling Nostalgia

Document

This post from the NSA intranet dated 6 April 2001 gives the reactions of staff to the announced closure of the Bad Aibling station in Bavaria (in the event, the NSA retained a presence at the base): see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.
(U//FOUO) A Little Bad Aibling Nostalgia FROM: Some DA Veterans Unknown Run Date: 06/04/2004 (U//FOUO) Once the closure of Bad Aibling Station (located in southern Bavaria in Germany) b...
0.0

National Security Agency: Overview Briefing

Document

Release Date: 2014-05-13
This slide, taken from an undated NSA presentation, outlines what the agency considers to the ‘the threat today’: see the book No Place To Hide, 13 May 2014.
Page 168 ërrorists UNCLASSIFIED THE THREAT TODAY Internet ions Wireless Criminal Elements Hackers High-Speed Circuits Insiders Pagers Facsimile Traditi...
0.0

Tier B allies

Document

Release Date: 2014-05-13
This undated internal NSA document illustrates the degrees of cooperation in the agency’s relationships with different foreign powers. “Tier A” and “Tier B” are elsewhere referred to as Second and Third Parties: see the book No Place To Hide, 13 May 2014.
Page 123 CONFIDENT1AL//NOFORN//20291123 TIER A Comprehensive Cooperation Australia Canada New Zealand United Kingdom TIERB Focused Cooperation Austria Belgium Czech Republic Denmark G...
0.0

Applications Made to the Foreign Intelligence Surveillance Court During Calendar Year 2012

Document

Release Date: 2014-05-13
This extract, part of an undated disclosure given to congress each year as required under the 2008 FISA Amendments Act, shows that the FISA Court only denied one application made by the US government over the course of 2012: see the book No Place To Hide, 13 May 2014.
Page 129 r Applications Made to the Foreign Intelligence Surveillance Court During Calendar Year 2012 (section 107 of the Act, 50 U. S.C. § 1807) During calendar year 2012, the Governmen...
0.0

NSA Washington Mission

Document

Release Date: 2014-05-13 Document Date: 2006-01-01
This excerpt from a 2006 NSA memo written by the global resources manager of the International Security Issues (ISI) mission underlines the importance of data on energy resources, production and international investment to the agency: see the book No Place To Hide, 13 May 2014.
Page 138 (U) NSA Washington Mission (U) Regional (TS//SI) ISI is responsible for 13 individual nation states in three continents. One significant tie that binds all these countries togethe...
0.0

WORDGOPHER

Document

Release Date: 2014-05-13 Document Date: 2009-01-01
An extract from a 2009 memo from the technical director of NSA Mission Operations, describing improvements at Misawa Security Operations Center (MSOC), the agency’s collection point in Misawa, Japan: see the book No Place To Hide, 13 May 2014.
Page 98 Future Plans (U) (TS//SI//REL) In the future, MSOC hopes to expand the number of WORDGOPHER platforms to enable demodulation of thousands of additional low-rate carriers. These ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh