Filtered By
Internal ProceduresX
Document Topic [filter]
Results
160 Total
1.0

Third Party Partners

Document

Release Date: 2013-12-08
This short excerpt from an NSA document shows that nine European States – Belgium, Denmark, France, Germany, Italy, The Netherlands, Norway, Spain and Sweden – have a second-tier ‘third party’ relationship with the agency: see the SVT article NSA “asking for” specific exchanges from FRA – Secret treaty since 1954, 8 December 2013.
* (S//SI. REU) SSEU’R. members are the Five Eyes nations (Australia, Canada. New Zealand, United Kingdom and United States] and the following Tliird Party partners: Belgium, Denmark, France, Germ...
1.0

Discovery SIGINT Targeting Scenarios and Compliance

Document

Document Date: 2011-07-01Release Date: 2014-02-18
This page from the NSA intranet dated July 2011 supplies advice from the NSA Offices of General Counsel (OGC) and Oversight and Compliance (NOC) on the admissibility of targeting strategies against the users of popular websites (including WikLeaks and the Pirate Bay): see the Intercept article Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed […]
TOP SECRET//SI//REL TO USA, FVEY Navigation Main Page Community portal Recent changes Random page Help Toolbox What links here Related changes Upload file Special pages Printab...
1.0

Notes for Dutch SIGINT/Cyber Analytic Exchange

Document

Document Date: 2013-02-14Release Date: 2013-11-30
This partially redacted report dated 14 February 2013 summarises a meeting between the NSA and the Dutch intelligence agencies MIVD and AIVD: see the NRC Handelsblad article Dutch intelligence agency AIVD hacks internet fora, 30 November 2013.
TOP SECRET//SI* REL TO USA. NLD Notes for Dutch SIGEN’T/Cvber Analvric Exchange w m- CT Mt\'D AIVD AIVD a rvi> ■ AIVD 14 Februarv 2013 Organization of C'vber in the Neth...
1.0

Geopolitical trends for 2014-2019

Document

Release Date: 2013-12-02
Three redacted slides from an NSA presentation name several states as subjects of ongoing interest: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
slide1.jpg: slide2.jpg: TOP SECRET//SI//REL TO USA, FVEY U//JEQUOslide3.jpg: rTO USA, FYEY Geopolitical Trends: Global Drivers (S//REL) Geopolitical Trend driver»: • St re**orc to...
1.0

2008-13 Strategic Plan

Document

Document Date: 2007-10-03Release Date: 2013-11-02
This eleven page document describes how the NSA sees its own mission, internal culture and the challenges it faces: see the New York Times article No Morsel Too Minuscule for All-Consuming N.S.A., 2 November 2013.
nsa-mission-plan-1.png: TOP SECRET//COMINT//REL TO USA, FVEY//20320108 (U) SIGINT Mission Strategic Plan FY2008-2013 3 October 2007 Release ¡Signals Intelligence Derived From: N...
1.0

Court Orders

Document

Document Date: 2013-03-01Release Date: 2014-03-29
This slide from a March 2013 NSA Special Source Operations presentation reveals the existence of a FISA Court order (case number 13-319) relating to “Germany”, among others: see the Der Spiegel article ‘A’ for Angela: GCHQ and NSA Targeted Private German Companies and Merkel, 29 March 2014.
TOP SECRET//SI//NOFORN Last Week: Germany (13-319) This week: NTR jlIp.Cfl.rn.ing: Jordan (12-470) Morocco (12-481) 9/24/13 -L Signed: 7 Mar 13 Expires: 29 Mar 13 Expires...
1.0

2009 SIGDEV Conference: ‘Best Yet and Continuing to Improve’

Document

Document Date: 2009-08-14Release Date: 2014-04-04
This internal NSA report dated 14 August 2009 describes that year’s SIGDEV (Sigint Development) Conference, in which representatives of 5 Eyes agencies and the wider US intelligence community meet “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis”: see the Intercept article: The “Cuban Twitter” Scam Is a Drop in […]
(U//FOUO) 2009 SIGDEV Conference: ’Best Yet and Continuing to Improve' FROM: HHmHI SIGDEV Strategy and Governance (SSG) Run Date: 08/14/2009 (U//FOUO) SIGINT Development Strategy and G...
1.0

Procedures for the dissemination by NSA to foreign governments of information from FISA electronic surveillance or physical search carried out by the FBI

Document

Document Date: 2002-08-20Release Date: 2014-03-12
This 20 August 2002 memo from US Attorney General John Ashcroft refers to the “modified minimization procedures” now in operation following the FISA Court’s “Raw Take” order of 22 July 2002 and expands on that order by allowing the sharing of information with foreign governments without the need for authorisation to be sought: see the […]
SECRET//X1 This document found at: I:\J3\J34\FISA\fbi.doc I:\J3\NDD\FISA\ fbi.doc Office of the Attorney CjeneraC 'Washington, <D.C- 20530 PROCEDURES FOR THE DISSEMINATION BY NS A T...
1.0

Recommended Requirements for cryptanalysts at CCs in Texas, Georgia and Hawaii to access NSA and FBI FISA material

Document

Document Date: 2006-09-06Release Date: 2014-03-12
This NSA Staff Processing form from 6 September 2006 describes some of the problems relating to the expansion of the raw FISA information made available to NSA field offices. Referring to different classes of FISA information being stored together the memo concludes that “it is possible that there are already FISA violations resulting from the […]
TOP SECREWCOM1NTHNOFORNII2029U23 SECURITY CLASSIFICATION NSA STAFF PROCESSING FORM TO EXREG CONTROL NUMBER SIGINT DIR KCC CONTROL NUMBER S3109-080-06 THRU ACTl Ci 3N _ APPROVAL EX ...
1.0

Cryptologic Services Groups (CSGs)

Document

Release Date: 2014-06-18
This undated NSA slide provides the locations of the agency’s Cryptologic Services Groups worldwide: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
TRANSCOM STATE 'NMJIC ^CIA ^ONI ¿çlifTi PTOLOGIC SERVICES GROUPS (CSGs) STRATCOM JSSPACECOM SAN \ FRANCISCO S FORSCOM SOCOM CENTCOM KEY WEST JFCOM SO...
1.0

US Sites with NSA Personnel in Germany

Document

Release Date: 2014-06-18
This undated document lists the locations of US-operated signals intelligence stations in Germany (some have been redacted): see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
K, (S//5L7REL) NSA Presence - For the following locations, the fact of NSA personnel assigned to these sites/adivides is UNCLASSIFIED, Jt is therefore UNCLASSIFIED, for example, to display plaqu...
1.0

Israel

Document

Document Date: 2008-01-01Release Date: 2014-08-04
This short extract from a GCHQ planning document from 2008 makes clear concerns about Israel’s “less desirable activities”: see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.  
TOP SECRET STRAP 1 Israel. Policy makers remain deeply concerned over the potential threat that Israel poses to a peaceful resolution of the Iran problem, and to some of Israel’s less desirab...
1.0

The ECC — NSA’s Cryptologic Center

Document

Document Date: 2011-06-10Release Date: 2014-06-18
This internal NSA post from 10 June 2011 describes the further evolution of US-German signals intelligence cooperation and the focus of the NSA’s “long-term mission presence in Germany”: see the Der Spiegel article Terrorverdächtige: NSA nutzte Erkenntnisse aus Deutschland-Filiale für Tötungen, 15 June 2014.
^{U//FOUDKThe ECC -- NSA's Newest Cryptologic Center FROM: SIGINT Director Run Dates: 06/10/2011,06/13/2011 (S//REL) On 9 May NSA established the European Cryptologic Center^H (ECC) f...
1.0

One-Year Anniversary for SUSLAG

Document

Document Date: 2005-06-10Release Date: 2014-06-21
This article from the internal NSA newsletter Foreign Affairs Digest, dated 10 June 2005, marks the one-year anniversary of the US Special Liaison Activity Germany (SUSLAG)  – NSA personnel working on German soil: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(S//SI) One-Year Anniversary for SUSLAG FROM: (S//SI) SUSLAG (F28) Run Date: 06/10/2005 Special US Liaison Activity Germany has spent a year in a "tin can" (It's better than it sounds...
1.0

NSA’s Oldest Third Party SIGINT Partnership

Document

Document Date: 2005-10-07Release Date: 2014-08-31
This October 2005 article, taken from the internal NSA newsletter Foreign Affairs Digest, provides a brief history of the agency’s past and current relationship with its Turkish counterparts, which includes a staff of 40 NSA employees stationed in Ankara: see the Intercept article How the NSA Helped Turkey Kill Kurdish Rebels, 31 August 2014. Download […]
dynamic: page - HIGHEST possible classification js TOP SECRET // SI tTK // REL TO USA AUS CAN GBR NZL (U) NS As Oldest Third Party SJGJNT Partnership Countiy Desk Officer (CiDO) Turkey R...
1.0

On the Road Again: SID Team Visits Germany

Document

Document Date: 2006-02-01Release Date: 2014-06-18
This internal NSA post from 1 February 2006 describes the visit several agency personnel to bases in Germany: see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.
(U//FOUO) On. the Road Again: SID Team Visits Germany Assistant Deputy Director for Analysis & Production (S2) Run Date: 02/01/2006 (U//FOUO) After staying around headquarters for the las...
1.0

Running Strategic Analytics Affecting Europe and Africa

Document

Release Date: 2014-06-18
This undated presentation from the NSA’s European Cryptologic Center explains some of the activities of the agency’s main European base: see the Der Spiegel article Terrorverdächtige: NSA nutzte Erkenntnisse aus Deutschland-Filiale für Tötungen, 15 June 2014.
(Uj Running btrategic Analytics Affecting Europe and Africa The overall classification of this briefing is: TOP SECRET//COM INT//REL USA, FVEYS//2D291 Region: Europe, Middle East (Isra...
1.0

Formatting internal memos

Document

Document Date: 2005-07-05Release Date: 2014-07-09
This excerpt from a 2005 NSA document demonstrating to personnel how to format internal memos shows how anti-Muslim prejudice has found its way into official documents: see the Intercept article Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On, 9 July 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZLV/20291123 05 July 2005 E-mail: address: badASGguy@holmail.com Identity: Mohammed Raghcad (ASG Sales Associate) ASG background (below is...
1.0

Quadrennial Intelligence Community Review Final Report, April 2009

Document

Document Date: 2009-04-01Release Date: 2014-09-05
This April 2009 report from the Office of the Director of National Intelligence considers the challenges the US intelligence community may face by 2025 and suggests that the competitive advantage of US firms may need to be supported by espionage: see the Intercept article The U.S. Government’s Secret Plans to Spy for American Corporations, 5 […]
SECRET//REL T FINAL REPORT '¿[\ns »' National Intelligenc Derived From: ODNI POL-08 Declassify On: 20340306 □ SECRET//REL TO USA, FVEY FINAL REPORT April 2009 □ SECR...
1.0

History of the US – Israel SIGINT Relationship, post 1992

Document

Document Date: 2007-01-01Release Date: 2014-05-13
This short extract, taken from a 2007 NSA report on the history of intelligence cooperation between the US and Israel, describe some of the difficulties of that relationship: see the book No Place To Hide, 13 May 2014.
(TS//S1//NF) As close as the ISNU relationship has become, it has not been without tension. The Jonathan Pollard incident is one example that had a negative, albeit temporary, impact to the S1G1...
1.0

TECA Product Centre

Document

Document Date: 2011-04-28Release Date: 2015-06-22
This page from GCHQ’s internal GCWiki, last modified on 28 April 2011 provides a brief introduction to the work of the agency’s Technical Enabling Covert Access (TECA) Project Centre: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
TECA Product Centre - GCWiki TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help con...
1.0

Classification Guide for Human Language Technology (HLT) Models

Document

Document Date: 2011-05-18Release Date: 2015-05-05
This NSA classification guide dated 18 May 2011 delineates the sensitivity of particular aspects of the agency’s speech-to-text capabilities: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
UNCLASSIFIED//FOR OFFICIAL USE ONLY NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) Classification Guide for Human Language Technology (HLT) Models 2-20 Effective Date: 18 May ...
1.0

GCHQ Ministry Stakeholder Relationships spreadsheets

Document

Document Date: 2008-01-01Release Date: 2015-06-22
This collection of 13 spreadsheets illustrates the relationship between GCHQ and various ministries within the UK government and that agency’s work is by no means restricted to matters of national security, but also extends to domestic issues: see the Intercept article Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research, 22 June […]
 Bank of England GCO Name(s) 3CHQ Top level Aim with Customer BANK MISSION Contribute to Bank decision-making on issues affecting UK economic stability. To support UK economic stability. ...
1.0

YRS Gears up to Celebrate 40 Years

Document

Document Date: 2012-07-02Release Date: 2015-08-03
This July 2012 article from Northwest Passage, the NSA internal newsletter for the Yakima Research Station, marks the 40th anniversary of the base, including its involvement in ECHELON: see the Intercept article GCHQ and Me: My Life Unmasking British Eavesdroppers, 3 August 2015.
,he NORTHWEST PASSAGE TOP SECRET//SI//REL TO USA, FVEY Volume 3, Issue 7 Your Connection to the Yakima Research Station July 2012 (U) YRS Gears Up to Celebrate 40th Anniversary (S...
1.0

The SIGINT Philosopher: In Praise of Not Knowing

Document

Document Date: 2012-08-16Release Date: 2015-08-11
This 16 August 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, considers how analysts should tackle the situation where they cannot fully answer the questions they are tasked with: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 • Web search • Agency-all Emails • SID-all Emai...
1.0

The SIGINT Philosopher: When Brevity Is Just the Soul of “Huh?”

Document

Document Date: 2012-07-16Release Date: 2015-08-11
This 16 July 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, discusses the hardships of writing reports for the agency: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 • Web search • Agency-all Emails • SID-all Emai...
1.0

Content or Metadata?

Document

Release Date: 2015-09-25
This undated GCHQ spreadshhet clarifies how the agency categorises different aspects of intercepted communications: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
content-metadata-matrix-p1-normal.gif: UK SECRET STRAP1 COMINT AUSiCAN'NZiUMJS EYES ONLY ORCON CONTENT OR METADATA? Categorisation of aspects of intercepted communications - GCHQ policy ...
1.0

Events analysis

Document

Document Date: 2008-11-27Release Date: 2015-09-25
This GCHQ slide taken from a presentation dates 27 November 2008 confirms that agency metadata repositories can be datamined for information relating to individuals within the UK: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
Events analysis SALAMANCA, HAUSTORIUM, THUGGEE, IMMINGLE less intrusive than communications content authorisation not needed for individuals in the UK necessity and proportionality st...
1.0

HRA auditing

Document

Release Date: 2015-09-25
This undated page from GCHQ’s internal GCWiki describes the agency’s audit procedure to document compliance with the UK Human Rights Act: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
hra-auditing-p1-normal.gif: UK CONFIDENTIAL The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webtea...
1.0

Report on Architectural Risk 2012 – Summary

Document

Document Date: 2012-03-12Release Date: 2015-09-25
This GCHQ report summary from 12 March 2012 discusses the impact of the move to a “end-end big data strategy” on the agency’s infrastructure: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
architecture-risk-2012-p1-normal.gif: TOP SECRET STRAP 1 Report on Architectural Risk 2012 - Summary TOP SECRET STRAP 1architecture-risk-2012-p2-normal.gif: TOP SECRET STRAP1 Introduc...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh