Results
166 Total
0.0
Content or Metadata?
Document
Release Date:
2015-09-25
This undated GCHQ spreadshhet clarifies how the agency categorises different aspects of intercepted communications: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
content-metadata-matrix-p1-normal.gif:
UK SECRET STRAP1
COMINT AUSiCAN'NZiUMJS EYES ONLY ORCON
CONTENT OR METADATA?
Categorisation of aspects of intercepted communications - GCHQ policy ...
0.0
HRA auditing
Document
Release Date:
2015-09-25
This undated page from GCHQ’s internal GCWiki describes the agency’s audit procedure to document compliance with the UK Human Rights Act: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
hra-auditing-p1-normal.gif:
UK CONFIDENTIAL
The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report
inappropriate content.
For GCWiki help contact: webtea...
0.0
Events analysis
Document
Release Date:
2015-09-25
Document Date:
2008-11-27
This GCHQ slide taken from a presentation dates 27 November 2008 confirms that agency metadata repositories can be datamined for information relating to individuals within the UK: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
Events analysis
SALAMANCA, HAUSTORIUM, THUGGEE, IMMINGLE
less intrusive than communications content
authorisation not needed for individuals in
the UK
necessity and proportionality st...
0.0
The SIGINT Philosopher: Descartes Would Have Been a Lousy SIGINT Reporter
Document
Release Date:
2015-08-11
Document Date:
2012-06-15
This 15 June 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column tackles the subject of partial information: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST
POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // RELTO USA
AUS CAN GBR NZL
Welcome! Saturday, 10 Nov 2012
• Web search
• Agency-all Emails
• SID-all Email...
0.0
The SIGINT Philosopher: In Praise of Not Knowing
Document
Release Date:
2015-08-11
Document Date:
2012-08-16
This 16 August 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, considers how analysts should tackle the situation where they cannot fully answer the questions they are tasked with: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST
POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA
AUS CAN GBR NZL
Welcome! Saturday, 10 Nov 2012
• Web search
• Agency-all Emails
• SID-all Emai...
0.0
The SIGINT Philosopher Is Back — with a New Face!
Document
Release Date:
2015-08-11
Document Date:
2012-05-29
This 29 May 2012 article from the internal NSA newsletter SIDToday “SIGINT Philosopher” column, gives a first person account of how an analyst became reconciled to the idea of total surveillance during a polygraph test: see the Intercept article The Philosopher of Surveillance, 11 August 2015.
DYNAMIC PAGE -- HIGHEST
POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA
AUS CAN GBR NZL
Welcome! Saturday, 10 Nov 2012
• Web search
• Agency-all Emails
• SID-all Emai...
0.0
NSA Extended Enterprise Report: July 2008
Document
Release Date:
2015-04-02
Document Date:
2008-07-08
This extract from a July 2008 NSA document describes Argentina as GCHQ’s “primary interest” in Latin America: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET//REL TO USA, AUS, CAN, GBR, NZL//20291123
Extended Enterprise Report: July 2008
This document summarises key activities of interest to GCHQ at the NSA
Regional Cryptologic Center...
0.0
Can ‘Motor City’ Manufacture Some Arabic Language Assistance for NSA?
Document
Release Date:
2018-03-01
Document Date:
2005-12-15
This December 2005 post from the NSA’s internal newsletter SIDToday describes the agency’s efforts to recruit Arabic-language specialists; a Detroit-based recruitment effort “unearthed significant issues”: see the Intercept article NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(S//SI) Can 'Motor City' Manufacture Some Arabic Language
Assistance for NSA?
FROM: Ci...
0.0
Now You’re Speaking My Language: NSA’s Linguistic Resources (Part I)
Document
Release Date:
2018-03-01
Document Date:
2004-06-29
This post from the NSA’s internal newsletter SIDToday introduces a series on the agency’s struggle to find qualified language experts: see the Intercept article NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(U) Now You're Speaking My Language: NSA's Linguistic Resources
(Part I)
FROM: SIGINT ...
0.0
The International Security Issues Build-Out
Document
Release Date:
2017-04-24
Document Date:
2006-05-17
This section of a 17 May 2006 article from an internal NSA newsletter makes it clear that Japanese foreign policy and trade activities are surveillance targets for the agency: see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017.
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI TK 7 REL TO USA AUS CAN GBR NZL
(C) The International Seemin’ Issues Build-Out
Global Capabilities Manager. ISI (S2C)
Ru...
0.0
Legal Authorisation Flowcharts: TARGETING and COLLECTION
Document
Release Date:
2015-06-22
Document Date:
2008-11-01
This GCHQ document from November 2008 provides a guide to the legal authorisations required for different forms of agency activity: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
UK CONFIDENTIAL Version 6, dated 11/08
Side l
The issue on GCVYeb is die definitive version; printed copies may be out of date. Terms are defined in the glossary at
http w.v ope rations^'po...
0.0
Intrusion Analysis / JeAC
Document
Release Date:
2015-06-22
Document Date:
2008-07-23
This GCHQ document, last updated on 23 July 2008, provides information about the agency’s systems for detecting network threats and authorisation procedures: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
SECRET STRAP1
Intrusion Analysis/JeAC
The IA team conducts all-source analysis both of emerging and current electronic
attack types. It forms part of the Joint Electronic Attack Cell (JeAC)...
0.0
ACNO Skill Levels: Malware Analysis & Reverse Engineering
Document
Release Date:
2015-06-22
This undated GCHQ training document details the requirements for analysts engaged in the reverse engineering of commercial antivirus software: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
SECRET
ACNO Skill 12: Malware Analysis & Reverse Engineering
Knowledge of:
• Relevant Operating Systems.
• Current trends in attack vectors & targeted applications / protocols / services...
0.0
TRAFFICTHIEF Configuration Readme
Document
Release Date:
2015-07-01
This undated NSA technical document provides configuration information for TRAFFICTHIEF, the live alerts element of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
trafficthief-readme-p1-normal.gif:
SECRET//REL TO USA, FVEY
(U//FOUO) TRAFFICTHIEF
Configuration Read Me
(U) Overview
(S//REL) TRAFFICTHIEF (TT) is the NSA corporate alerting and tippin...
0.0
DEEPDIVE Configuration Read Me
Document
Release Date:
2015-07-01
This undated NSA technical document provides configuration instructions for DEEPDIVE, a system that can be integrated with XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CONFIDENTIAL
(U//FOUO) DEEPDIVE
Configuration Read Me
(U) Overview
(C) The purpose of this document is to provide procedures to configure an XKEYSCORE server as a
DEEPDIVE server. DEEPD...
0.0
Back in Time: The KAL-007 Shootdown
Document
Release Date:
2017-04-24
Document Date:
2006-07-19
This 19 July 2006 article from the internal NSA newsletter Foreign Affairs digest explains the ramifications of the Soviet attack on Korean Airlines flight 007 in 1983 for US-Japanese intelligence cooperation: see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017.
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(U) Back in Time: The KAL-007 Shootdown
FROM: the Foreign Affairs Digest
Unknown
Run...
0.0
Perseverance Pays Off: Eight-Year SIGINT Effort Culminates in Arrest of Elusive Colombian Terrorist
Document
Release Date:
2017-11-30
Document Date:
2008-05-16
In this 2008 post from the NSA’s internal SIDToday newsletter the agency claims responsibility for the arrest of FARC member Doris Adriana: see the Intercept article NSA Secretly Helped Convict Defendants in U.S. Courts, 30 November 2017.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(S//SI/REL) Perseverance Pays Off: Eight-Year SIGINT Effort Culminates in Arrest of Elusiv...
0.0
Protocol note for Japan visit
Document
Release Date:
2018-05-19
Document Date:
2013-01-01
This undated NSA protocol note provides a short briefing for a visit to the agency’s Deputy Director of Foreign Affairs by his Japanese counterpart, due to happen sometime after January 2013: see the Intercept article The Untold Story of Japan’s Secret Spy Agency, 19 May 2018.
SECRET//NOFORN
Clearances:
Accompanying NSA/CSS
Senior:
Photographer:
Memento Presented:
Uniform of the Day:
Purpose of Visit:
Justification for
Directorate
Involvement:
Ex...
0.0
Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities
Document
Release Date:
2013-12-09
Document Date:
2007-01-01
A 2007 proposal to the NSA from contractor SAIC, promoting the company’s ability to support “intelligence collection in the games space”: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 December 2013.
Games: A Look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities
Table of Contents
FORWARD......................................................................4
...
Bahrain (BHR/BH), China (CHN/CN), Egypt (EGY/EG), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Israel (ISR/IL), Japan (JPN/JP), Jordan (JOR/JO), Kazakhstan (KAZ/KZ), Korea (KOR/KR), Kuwait (KWT/KW), Lebanon (LBN/LB), Malaysia (MYS/MY), Mexico (MEX/MX), Oman (OMN/OM), Pakistan (PAK/PK), Palestine (PSE/PS), Qatar (QAT/QA), Saudi Arabia (SAU/SA), Singapore (SGP/SG), Sudan (SDN/SD), Turkmenistan (TKM/TM), United Arab Emirates (ARE/AE), United Kingdom (GBR/GB), United States (USA/US), Uzbekistan (UZB/UZ)
0.0
Classification Guide for SIGINT Material Dating from 16 August 1945 – 31 December 1967
Document
Release Date:
2014-06-18
Document Date:
2011-11-21
This NSA classification guide, dated 21 November 2011, covers signals intelligence material that as to be kept secret for more than the standard 60 years: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
TOP SECRET//SjyTK//NOFÜRN
NATIONAL SECURITY AGENCY
CENTRAL SECURITY SERVICE
(U) CLASSIFICATION GUIDE FOR
SIGINT Material Dating from 16 August 1945 *31 December 1967
Effects Dale: 21 De...
Albania (ALB/AL), Algeria (DZA/DZ), Austria (AUT/AT), Belgium (BEL/BE), Bulgaria (BGR/BG), Cambodia (KHM/KH), China (CHN/CN), Denmark (DNK/DK), France (FRA/FR), Germany (DEU/DE), Hungary (HUN/HU), Israel (ISR/IL), Italy (ITA/IT), Japan (JPN/JP), Jordan (JOR/JO), North Korea (PRK/KP), Korea (KOR/KR), Netherlands (NLD/NL), Norway (NOR/NO), Pakistan (PAK/PK), Poland (POL/PL), Romania (ROU/RO), Saudi Arabia (SAU/SA), Singapore (SGP/SG), Sweden (SWE/SE), Taiwan (TWN/TW), Tunisia (TUN/TN), Turkey (TUR/TR), United Kingdom (GBR/GB), United States (USA/US), Vietnam (VNM/VN)
0.0
DNI/AG 702(g) Certification 2010-A
Document
Release Date:
2014-06-30
Document Date:
2010-07-15
This 2010 certification from the Director of National Intelligence and the Attorney General asserts that procedures are in place to ensure foreign intelligence gathering stays within the boundaries of the law by targeting people “who are reasonably believed to be outside the United States.” The breadth of the authority is, however, very wide, allowing surveillance […]
SECRET//ORCON,NOFORN
CERTIFICATION OF THE DIRECTOR OF NATIONAL INTELLIGENCE AND THE
ATTORNEY GENERAL PURSUANT TO SUBSECTION 702(g) OF TfififFORpGN
INTELLIGENCE SURVEILLANCE ACT OF 1978, AS ...
0.0
Dragons, Shrimp, and XKEYSCORE: Tales from the Land of Brothers Grimm
Document
Release Date:
2014-06-18
Document Date:
2012-04-13
This internal NSA post dated 13 April 2012 from the European Cryptologic Center in Darmstadt, Germany recounts an “XKS training blitz”: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) Dragons, Shrimp, and XKEYSCORE; Tales from the Land of
Brothers Grimm
European Cryptologic Center, SIGDEV (F22)
Run Date: 04/13/2012
(S//REL) The European Cryptologic Center ...
0.0
Provision of XKeyScore software to the BfV
Document
Release Date:
2014-06-18
This short extract from an NSA document shows that cooperation with Germany’s intelligence services went as far as providing the country’s domestic intelligence service, the Federal Office for the Protection of the Constitution (BfV), with access to XKeyScore: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
exchange.
[TS//SI//NF) Germany: Provision of XKEYSCORE software to the ES1V will
expand their ability to support NSA as we jointly prosecute CT targets.
Technical support forXKEYSCGRE will be...
0.0
On the Road Again: SID Team Visits Germany
Document
Release Date:
2014-06-18
Document Date:
2006-02-01
This internal NSA post from 1 February 2006 describes the visit several agency personnel to bases in Germany: see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.
(U//FOUO) On. the Road Again: SID Team Visits Germany
Assistant Deputy Director for Analysis & Production (S2)
Run Date: 02/01/2006
(U//FOUO) After staying around headquarters for the las...
0.0
A Little Bad Aibling Nostalgia
Document
This post from the NSA intranet dated 6 April 2001 gives the reactions of staff to the announced closure of the Bad Aibling station in Bavaria (in the event, the NSA retained a presence at the base): see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.
(U//FOUO) A Little Bad Aibling Nostalgia
FROM: Some DA Veterans
Unknown
Run Date: 06/04/2004
(U//FOUO) Once the closure of Bad Aibling Station (located in southern Bavaria in
Germany) b...
0.0
National Security Agency: Overview Briefing
Document
Release Date:
2014-05-13
This slide, taken from an undated NSA presentation, outlines what the agency considers to the ‘the threat today’: see the book No Place To Hide, 13 May 2014.
Page 168
ërrorists
UNCLASSIFIED
THE THREAT TODAY
Internet
ions
Wireless
Criminal
Elements
Hackers
High-Speed
Circuits
Insiders
Pagers
Facsimile
Traditi...
0.0
Tier B allies
Document
Release Date:
2014-05-13
This undated internal NSA document illustrates the degrees of cooperation in the agency’s relationships with different foreign powers. “Tier A” and “Tier B” are elsewhere referred to as Second and Third Parties: see the book No Place To Hide, 13 May 2014.
Page 123
CONFIDENT1AL//NOFORN//20291123
TIER A Comprehensive Cooperation Australia Canada New Zealand United Kingdom
TIERB Focused Cooperation Austria Belgium Czech Republic Denmark G...
Australia (AUS/AU), Austria (AUT/AT), Belgium (BEL/BE), Canada (CAN/CA), Czech Republic (CZE/CZ), Denmark (DNK/DK), Germany (DEU/DE), Greece (GRC/GR), Hungary (HUN/HU), Iceland (ISL/IS), Italy (ITA/IT), Japan (JPN/JP), Korea (KOR/KR), Netherlands (NLD/NL), New Zealand (NZL/NZ), Norway (NOR/NO), Poland (POL/PL), Portugal (PRT/PT), Spain (ESP/ES), Sweden (SWE/SE), Switzerland (CHE/CH), Turkey (TUR/TR), United Kingdom (GBR/GB)
0.0
Applications Made to the Foreign Intelligence Surveillance Court During Calendar Year 2012
Document
Release Date:
2014-05-13
This extract, part of an undated disclosure given to congress each year as required under the 2008 FISA Amendments Act, shows that the FISA Court only denied one application made by the US government over the course of 2012: see the book No Place To Hide, 13 May 2014.
Page 129
r
Applications Made to the Foreign Intelligence Surveillance Court During Calendar
Year 2012 (section 107 of the Act, 50 U. S.C. § 1807)
During calendar year 2012, the Governmen...
0.0
NSA Washington Mission
Document
Release Date:
2014-05-13
Document Date:
2006-01-01
This excerpt from a 2006 NSA memo written by the global resources manager of the International Security Issues (ISI) mission underlines the importance of data on energy resources, production and international investment to the agency: see the book No Place To Hide, 13 May 2014.
Page 138
(U) NSA Washington Mission
(U) Regional
(TS//SI) ISI is responsible for 13 individual nation states in three continents. One
significant tie that binds all these countries togethe...
0.0
WORDGOPHER
Document
Release Date:
2014-05-13
Document Date:
2009-01-01
An extract from a 2009 memo from the technical director of NSA Mission Operations, describing improvements at Misawa Security Operations Center (MSOC), the agency’s collection point in Misawa, Japan: see the book No Place To Hide, 13 May 2014.
Page 98
Future Plans (U)
(TS//SI//REL) In the future, MSOC hopes to expand the number of WORDGOPHER platforms to
enable demodulation of thousands of additional low-rate carriers.
These
...