Filtered By
Internal Procedures X
Document Topic [filter]
Results
157 Total
0.0

HRA auditing

Document

Release Date: 2015-09-25
This undated page from GCHQ’s internal GCWiki describes the agency’s audit procedure to document compliance with the UK Human Rights Act: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
hra-auditing-p1-normal.gif: UK CONFIDENTIAL The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webtea...
0.0

Events analysis

Document

Release Date: 2015-09-25 Document Date: 2008-11-27
This GCHQ slide taken from a presentation dates 27 November 2008 confirms that agency metadata repositories can be datamined for information relating to individuals within the UK: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
Events analysis SALAMANCA, HAUSTORIUM, THUGGEE, IMMINGLE less intrusive than communications content authorisation not needed for individuals in the UK necessity and proportionality st...
0.0

The SIGINT Philosopher: Descartes Would Have Been a Lousy SIGINT Reporter

Document

Release Date: 2015-08-11 Document Date: 2012-06-15
This 15 June 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column tackles the subject of partial information: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // RELTO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 • Web search • Agency-all Emails • SID-all Email...
0.0

The SIGINT Philosopher: In Praise of Not Knowing

Document

Release Date: 2015-08-11 Document Date: 2012-08-16
This 16 August 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, considers how analysts should tackle the situation where they cannot fully answer the questions they are tasked with: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 • Web search • Agency-all Emails • SID-all Emai...
0.0

The SIGINT Philosopher Is Back — with a New Face!

Document

Release Date: 2015-08-11 Document Date: 2012-05-29
This 29 May 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, gives a first person account of how an analyst became reconciled to the idea of total surveillance during a polygraph test: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 • Web search • Agency-all Emails • SID-all Emai...
0.0

Are YOU the SIGINT Philosopher?

Document

Release Date: 2015-08-11 Document Date: 2010-11-30
This 30 November 2010 notice taken from the NSA’s internal newsletter SIDToday calls for an employee to write a regular ethics column as the “Socrates of SIGINT”: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Friday, 09 Nov 2012 • Web search • Agency-all Emails • SID-all Emails...
0.0

TRAFFICTHIEF Configuration Readme

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration information for TRAFFICTHIEF, the live alerts element of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
trafficthief-readme-p1-normal.gif: SECRET//REL TO USA, FVEY (U//FOUO) TRAFFICTHIEF Configuration Read Me (U) Overview (S//REL) TRAFFICTHIEF (TT) is the NSA corporate alerting and tippin...
0.0

DEEPDIVE Configuration Read Me

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration instructions for DEEPDIVE, a system that can be integrated with XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CONFIDENTIAL (U//FOUO) DEEPDIVE Configuration Read Me (U) Overview (C) The purpose of this document is to provide procedures to configure an XKEYSCORE server as a DEEPDIVE server. DEEPD...
0.0

Legal Authorisation Flowcharts: TARGETING and COLLECTION

Document

Release Date: 2015-06-22 Document Date: 2008-11-01
This GCHQ document from November 2008 provides a guide to the legal authorisations required for different forms of agency activity: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
UK CONFIDENTIAL Version 6, dated 11/08 Side l The issue on GCVYeb is die definitive version; printed copies may be out of date. Terms are defined in the glossary at http w.v ope rations^'po...
0.0

Intrusion Analysis / JeAC

Document

Release Date: 2015-06-22 Document Date: 2008-07-23
This GCHQ document, last updated on 23 July 2008, provides information about the agency’s systems for detecting network threats and authorisation procedures: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
SECRET STRAP1 Intrusion Analysis/JeAC The IA team conducts all-source analysis both of emerging and current electronic attack types. It forms part of the Joint Electronic Attack Cell (JeAC)...
0.0

ACNO Skill Levels: Malware Analysis & Reverse Engineering

Document

Release Date: 2015-06-22
This undated GCHQ training document details the requirements for analysts engaged in the reverse engineering of commercial antivirus software: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
SECRET ACNO Skill 12: Malware Analysis & Reverse Engineering Knowledge of: • Relevant Operating Systems. • Current trends in attack vectors & targeted applications / protocols / services...
0.0

NSA Extended Enterprise Report: July 2008

Document

Release Date: 2015-04-02 Document Date: 2008-07-08
This extract from a July 2008 NSA document describes Argentina as GCHQ’s “primary interest” in Latin America: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET//REL TO USA, AUS, CAN, GBR, NZL//20291123 Extended Enterprise Report: July 2008 This document summarises key activities of interest to GCHQ at the NSA Regional Cryptologic Center...
0.0

Which Foreign Intelligence Service Is the Biggest Threat to the US?

Document

Release Date: 2014-04-13 Document Date: 2008-01-01
This small extract from a 2008 document, an interview with NSA Global Capabilities Manager for Countering Foreign Intelligence, names Israel as “the third most aggressive intelligence service against the US”: see the book No Place To Hide, 13 May 2014.
Israel also targets us. On the one hand, the Israelis are extraordinarily good SIGINT partners for us, but on the other, they target us to learn our positions on Middle East problems. A NIE (Nati...
0.0

CNO Core Secrets

Document

Release Date: 2014-10-10
This undated selection of seven NSA slides highlights the activities the agency regards as its “core secrets”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN NSA/CSS and JFCC-NW National Initiative Task - Security Framework SAP Authority NSA/CSS/JFCC-NW SAPS DNI CNE DoD CND CNA wm Information Released to...
0.0

Exceptionally Controlled Information (ECI) Compartments January 2013

Document

Release Date: 2014-10-10 Document Date: 2013-01-01
This NSA document from January 2013 lists the codenames of those agency activities sufficiently sensitive to qualify as “exceptionally controlled information”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.ah
CONFIDENTIAL//REL TO USA, AUS, CAN, GBR, NZL (U) Exceptionally Controlled Information (ECI) Compartments January 2013 ECI Name and Trigraph Organization Control Authority AMBULANT AMB...
0.0

NSA’s Oldest Third Party SIGINT Partnership

Document

Release Date: 2014-08-31 Document Date: 2005-10-07
This October 2005 article, taken from the internal NSA newsletter Foreign Affairs Digest, provides a brief history of the agency’s past and current relationship with its Turkish counterparts, which includes a staff of 40 NSA employees stationed in Ankara: see the Intercept article How the NSA Helped Turkey Kill Kurdish Rebels, 31 August 2014. Download […]
dynamic: page - HIGHEST possible classification js TOP SECRET // SI tTK // REL TO USA AUS CAN GBR NZL (U) NS As Oldest Third Party SJGJNT Partnership Countiy Desk Officer (CiDO) Turkey R...
0.0

OPA~TAS Covert Mobile Phones Policy

Document

Release Date: 2014-08-12 Document Date: 2010-06-28
These GCHQ guidelines from 23 June 2010 describe procedures for operating mobile phones overseas which are not intended to be associated with agency activity: see the Intercept article NPR Is Laundering CIA Talking Points to Make You Scared of NSA Reporting, 12 August 2014.
SECRET Ref: DOT/1636/5040/102 28 June 2010 OPA~TAS Covert Mobile Phones Policy Author: Issue 1.0 Page 1 of 6 SECRET This information is exempt from disclosure under the Fr...
0.0

Israel

Document

Release Date: 2014-08-04 Document Date: 2008-01-01
This short extract from a GCHQ planning document from 2008 makes clear concerns about Israel’s “less desirable activities”: see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.  
TOP SECRET STRAP 1 Israel. Policy makers remain deeply concerned over the potential threat that Israel poses to a peaceful resolution of the Iran problem, and to some of Israel’s less desirab...
0.0

NSA Intelligence Relationship with Saudi Arabia

Document

Release Date: 2014-07-25 Document Date: 2013-04-08
This NSA information paper dated 8 April 2013 details the agency’s deepening signals intelligence relationship with Saudi Arabia: see the Intercept article The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police, 25 July 2014.
TOP SECRET//SI//NOFORN National Security 8 April 2013 Agency/Central Security Service Information Paper (S//SI//REL TO USA, SAU) Subject: NSA Intelligence Relationship with Saudi Ara...
0.0

SIGINT Authority decision tree

Document

Release Date: 2014-07-23
This undated image, taken from NSA training materials, shows the role played by Executive Order 12333 in authorising the agency’s activities: see the Washington Post article Privacy watchdog’s next target: the least-known but biggest aspect of NSA surveillance, 23 July 2014.
Start Here! SIGINT Authority decision tree For targeting in response to a valid Foreign Intelligence requirement LEGEND: FISA = Foreign Intelligence Surveillance Act of 1978 FISC =...
0.0

Classification Guide for SIGINT Material Dating from 16 August 1945 – 31 December 1967

Document

Release Date: 2014-06-18 Document Date: 2011-11-21
This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
TOP SECRET//SjyTK//NOFÜRN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR SIGINT Material Dating from 16 August 1945 *31 December 1967 Effects Dale: 21 De...
0.0

DNI/AG 702(g) Certification 2010-A

Document

Release Date: 2014-06-30 Document Date: 2010-07-15
This 2010 certification from the Director of National Intelligence and the Attorney General asserts that procedures are in place to ensure foreign intelligence gathering stays within the boundaries of the law by targeting people “who are reasonably believed to be outside the United States.” The breadth of the authority is, however, very wide, allowing surveillance […]
SECRET//ORCON,NOFORN CERTIFICATION OF THE DIRECTOR OF NATIONAL INTELLIGENCE AND THE ATTORNEY GENERAL PURSUANT TO SUBSECTION 702(g) OF TfififFORpGN INTELLIGENCE SURVEILLANCE ACT OF 1978, AS ...
0.0

Dragons, Shrimp, and XKEYSCORE: Tales from the Land of Brothers Grimm

Document

Release Date: 2014-06-18 Document Date: 2012-04-13
This internal NSA post dated 13 April 2012 from the European Cryptologic Center in Darmstadt, Germany recounts an “XKS training blitz”: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) Dragons, Shrimp, and XKEYSCORE; Tales from the Land of Brothers Grimm European Cryptologic Center, SIGDEV (F22) Run Date: 04/13/2012 (S//REL) The European Cryptologic Center ...
0.0

Provision of XKeyScore software to the BfV

Document

Release Date: 2014-06-18
This short extract from an NSA document shows that cooperation with Germany’s intelligence services went as far as providing the country’s domestic intelligence service, the Federal Office for the Protection of the Constitution (BfV), with access to XKeyScore: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
exchange. [TS//SI//NF) Germany: Provision of XKEYSCORE software to the ES1V will expand their ability to support NSA as we jointly prosecute CT targets. Technical support forXKEYSCGRE will be...
0.0

On the Road Again: SID Team Visits Germany

Document

Release Date: 2014-06-18 Document Date: 2006-02-01
This internal NSA post from 1 February 2006 describes the visit several agency personnel to bases in Germany: see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.
(U//FOUO) On. the Road Again: SID Team Visits Germany Assistant Deputy Director for Analysis & Production (S2) Run Date: 02/01/2006 (U//FOUO) After staying around headquarters for the las...
0.0

A Little Bad Aibling Nostalgia

Document

This post from the NSA intranet dated 6 April 2001 gives the reactions of staff to the announced closure of the Bad Aibling station in Bavaria (in the event, the NSA retained a presence at the base): see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.
(U//FOUO) A Little Bad Aibling Nostalgia FROM: Some DA Veterans Unknown Run Date: 06/04/2004 (U//FOUO) Once the closure of Bad Aibling Station (located in southern Bavaria in Germany) b...
0.0

National Security Agency: Overview Briefing

Document

Release Date: 2014-05-13
This slide, taken from an undated NSA presentation, outlines what the agency considers to the ‘the threat today’: see the book No Place To Hide, 13 May 2014.
Page 168 ërrorists UNCLASSIFIED THE THREAT TODAY Internet ions Wireless Criminal Elements Hackers High-Speed Circuits Insiders Pagers Facsimile Traditi...
0.0

Tier B allies

Document

Release Date: 2014-05-13
This undated internal NSA document illustrates the degrees of cooperation in the agency’s relationships with different foreign powers. “Tier A” and “Tier B” are elsewhere referred to as Second and Third Parties: see the book No Place To Hide, 13 May 2014.
Page 123 CONFIDENT1AL//NOFORN//20291123 TIER A Comprehensive Cooperation Australia Canada New Zealand United Kingdom TIERB Focused Cooperation Austria Belgium Czech Republic Denmark G...
0.0

Applications Made to the Foreign Intelligence Surveillance Court During Calendar Year 2012

Document

Release Date: 2014-05-13
This extract, part of an undated disclosure given to congress each year as required under the 2008 FISA Amendments Act, shows that the FISA Court only denied one application made by the US government over the course of 2012: see the book No Place To Hide, 13 May 2014.
Page 129 r Applications Made to the Foreign Intelligence Surveillance Court During Calendar Year 2012 (section 107 of the Act, 50 U. S.C. § 1807) During calendar year 2012, the Governmen...
0.0

NSA Washington Mission

Document

Release Date: 2014-05-13 Document Date: 2006-01-01
This excerpt from a 2006 NSA memo written by the global resources manager of the International Security Issues (ISI) mission underlines the importance of data on energy resources, production and international investment to the agency: see the book No Place To Hide, 13 May 2014.
Page 138 (U) NSA Washington Mission (U) Regional (TS//SI) ISI is responsible for 13 individual nation states in three continents. One significant tie that binds all these countries togethe...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh