Filtered By
Internal Procedures X
Document Topic [filter]
Secret X
Classification [filter]
Results
26 Total
0.0

Intrusion Analysis / JeAC

Document

Release Date: 2015-06-22 Document Date: 2008-07-23
This GCHQ document, last updated on 23 July 2008, provides information about the agency’s systems for detecting network threats and authorisation procedures: see the Intercept article Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law, 22 June 2015.
SECRET STRAP1 Intrusion Analysis/JeAC The IA team conducts all-source analysis both of emerging and current electronic attack types. It forms part of the Joint Electronic Attack Cell (JeAC)...
0.0

ACNO Skill Levels: Malware Analysis & Reverse Engineering

Document

Release Date: 2015-06-22
This undated GCHQ training document details the requirements for analysts engaged in the reverse engineering of commercial antivirus software: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
SECRET ACNO Skill 12: Malware Analysis & Reverse Engineering Knowledge of: • Relevant Operating Systems. • Current trends in attack vectors & targeted applications / protocols / services...
0.0

Protocol note for Japan visit

Document

Release Date: 2018-05-19 Document Date: 2013-01-01
This undated NSA protocol note provides a short briefing for a visit to the agency’s Deputy Director of Foreign Affairs by his Japanese counterpart, due to happen sometime after January 2013: see the Intercept article The Untold Story of Japan’s Secret Spy Agency, 19 May 2018.
SECRET//NOFORN Clearances: Accompanying NSA/CSS Senior: Photographer: Memento Presented: Uniform of the Day: Purpose of Visit: Justification for Directorate Involvement: Ex...
0.0

DNI/AG 702(g) Certification 2010-A

Document

Release Date: 2014-06-30 Document Date: 2010-07-15
This 2010 certification from the Director of National Intelligence and the Attorney General asserts that procedures are in place to ensure foreign intelligence gathering stays within the boundaries of the law by targeting people “who are reasonably believed to be outside the United States.” The breadth of the authority is, however, very wide, allowing surveillance […]
SECRET//ORCON,NOFORN CERTIFICATION OF THE DIRECTOR OF NATIONAL INTELLIGENCE AND THE ATTORNEY GENERAL PURSUANT TO SUBSECTION 702(g) OF TfififFORpGN INTELLIGENCE SURVEILLANCE ACT OF 1978, AS ...
0.0

Procedures for the dissemination by NSA to foreign governments of information from FISA electronic surveillance or physical search carried out by the FBI

Document

Release Date: 2014-03-12 Document Date: 2002-08-20
This 20 August 2002 memo from US Attorney General John Ashcroft refers to the “modified minimization procedures” now in operation following the FISA Court’s “Raw Take” order of 22 July 2002 and expands on that order by allowing the sharing of information with foreign governments without the need for authorisation to be sought: see the […]
SECRET//X1 This document found at: I:\J3\J34\FISA\fbi.doc I:\J3\NDD\FISA\ fbi.doc Office of the Attorney CjeneraC 'Washington, <D.C- 20530 PROCEDURES FOR THE DISSEMINATION BY NS A T...
0.0

OPA~TAS Covert Mobile Phones Policy

Document

Release Date: 2014-08-12 Document Date: 2010-06-28
These GCHQ guidelines from 23 June 2010 describe procedures for operating mobile phones overseas which are not intended to be associated with agency activity: see the Intercept article NPR Is Laundering CIA Talking Points to Make You Scared of NSA Reporting, 12 August 2014.
SECRET Ref: DOT/1636/5040/102 28 June 2010 OPA~TAS Covert Mobile Phones Policy Author: Issue 1.0 Page 1 of 6 SECRET This information is exempt from disclosure under the Fr...
0.0

NSA High Frequency (HF) Collaboration efforts with Japan

Document

Release Date: 2017-04-24 Document Date: 2013-01-02
This internal briefing dated 2 January 2013 provides talking points for the NSA Director on restoring Japanese participation in the CROSSFIRE programme, which had stopped in 2009: see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017.
SECRET//COMINT//NOFORN (S//REL TO USA, FVEY) Topic: NSA High Frequency (HF) Collaboration efforts with Japan (S//REL TO USA, FVEY) Background: For many years, NSA collaborated with the DFS on...
0.0

NSA Assistance to Japanese Directorate for SIGINT in Developing Capabilities to Provide SIGINT Support to CND

Document

Release Date: 2017-04-24 Document Date: 2013-01-29
This internal briefing dated 29 January 2013 provides talking points for the NSA Director on improving cooperation with Japan in the cyber realm : see the Intercept article Japan Made Secret Deals With The NSA That Expanded Global Surveillance, 24 April 2017.
SECRET//SI//NOFORN (S//REL TO USA, JPN) Topic: NSA Assistance to Japanese Directorate for SIGINT in Developing Capabilities to Provide SIGINT Support to CND. (U) Background: (S//NF) The J...
0.0

Quadrennial Intelligence Community Review Final Report, April 2009

Document

Release Date: 2014-09-05 Document Date: 2009-04-01
This April 2009 report from the Office of the Director of National Intelligence considers the challenges the US intelligence community may face by 2025 and suggests that the competitive advantage of US firms may need to be supported by espionage: see the Intercept article The U.S. Government’s Secret Plans to Spy for American Corporations, 5 […]
SECRET//REL T FINAL REPORT '¿[\ns »' National Intelligenc Derived From: ODNI POL-08 Declassify On: 20340306 □ SECRET//REL TO USA, FVEY FINAL REPORT April 2009 □ SECR...
0.0

Starting Up a New Mission at the European Security Operations Center: End-to-End Sigint

Document

Release Date: 2014-06-18 Document Date: 2007-12-05
This internal NSA post from 5 December 2007 describes one official’s experiences at the European Security Operations Center (ESOC) at Darmstadt, Germany: see the Der Spiegel article Terrorverdächtige: NSA nutzte Erkenntnisse aus Deutschland-Filiale für Tötungen, 15 June 2014.
(S//SI//REL) Starting Up a New Mission at the European Security Operations Center: End-to-End SIGINT FROM Intelligence Analysis Intern Run Date; 12/05/2007 (S//SI//REL) When considering...
0.0

Statistics Configuration Read Me

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration information for XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
SECRET//RELTO USA, AUS, CAN, GBR, NZL (s//rel) Statistics Configuration Read Me (S//REL) Statistics configurations are stored in two locations: xks.config and xks.advanced.config. Some o...
0.0

Atomic SIGINT Data Format (ASDF) Configuration Readme

Document

Release Date: 2015-07-01
This undated NSA document explains how to set up an aspect of the XKeyScore architecture: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
SECRET (U//FOUO) Atomic SIGINT Data Format (ASDF) Configuration Read Me (U) Overview (U//FOUO) The ASDF Configuration Read Me is designed to provide procedures for other organizations ...
0.0

Second Party National Identity Rules, continued

Document

Release Date: 2015-03-08 Document Date: 2012-01-01
This extract from a 2012 NSA document detailing how different Five Eyes countries define their own nationals shows that the GCSB allowed itself the right to surveil the governments of the Cook Islands and Nuie “but not their citizens”: see the Sunday Star Times article Snowden files: Inside Waihopai’s domes, 8 March 2015.
SECRET//COMINT//REL TO USA, FVEY (U) Second Party National Identity Rules, Continued Section B.4. - (U) New Zealand: Government Communications Security Bureau (GCSB) B.4.1. (U) Governmen...
0.0

Third Party Partners

Document

Release Date: 2013-12-08
This short excerpt from an NSA document shows that nine European States – Belgium, Denmark, France, Germany, Italy, The Netherlands, Norway, Spain and Sweden – have a second-tier ‘third party’ relationship with the agency: see the SVT article NSA “asking for” specific exchanges from FRA – Secret treaty since 1954, 8 December 2013.
* (S//SI. REU) SSEU’R. members are the Five Eyes nations (Australia, Canada. New Zealand, United Kingdom and United States] and the following Tliird Party partners: Belgium, Denmark, France, Germ...
0.0

One-Year Anniversary for SUSLAG

Document

Release Date: 2014-06-21 Document Date: 2005-06-10
This article from the internal NSA newsletter Foreign Affairs Digest, dated 10 June 2005, marks the one-year anniversary of the US Special Liaison Activity Germany (SUSLAG)  – NSA personnel working on German soil: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(S//SI) One-Year Anniversary for SUSLAG FROM: (S//SI) SUSLAG (F28) Run Date: 06/10/2005 Special US Liaison Activity Germany has spent a year in a "tin can" (It's better than it sounds...
0.0

Forward Production at NCEUR — Inside the Customers’ Decision Space

Document

Release Date: 2014-06-18 Document Date: 2005-01-14
This internal NSA report, dated 14 January 2005, describes the contribution of operations in Germany (“NSA/CSS Europe”) to counter-terrorism operations in North Africa: see the Der Spiegel article Terrorverdächtige: NSA nutzte Erkenntnisse aus Deutschland-Filiale für Tötungen, 15 June 2014.
(S//SI) Forward Production at NCEUR -- Inside the Customers' Decision Space FROM: staff Unknown Run Date: 01/14/2005 Customer Account Manager for EUCOM (SI 12) and NCEUR Analy...
0.0

Classified annexes to 2009 White House Cyberspace Policy Review

Document

Release Date: 2015-06-04 Document Date: 2009-05-08
These classified annexes to the Obama administration’s Cyberspace Policy Review were not published with the rest of the report in May 2009 and acknowledge that cyber defence initiatives have civil liberties implications: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
SECRET//REL TO FVEY CYBERSPACE POLICY REVIEW (U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD-54/HSPD-23, Cybersecurity P...
0.0

How to configure category throttling in XKeyScore

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration instructions for XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
SECRET//COMINT//RELTO USA, AUS, CAN, GBR, NZL How to configure category throttling in XKEYSCORE Category throttling is performed by the selected output plugin, in the xks.config you need to ...
0.0

Classification Guide Title/Number: Cuban Missile Crisis, 10-18

Document

Release Date: 2017-10-25 Document Date: 2008-07-30
This NSA classification guide from 2008 shows that aspects of the agency’s activities during the Cuban Missile Crisis were still regarded as top secret, many decades later: see the Intercept article NSA Concealed Records on JFK Assassination for Decades, 25 October 2017.
SECRET//REL TO USA, AUS, CAN, GBR, NZL (U) CLASSIFICATION GUIDE TITLE/NUMBER: Cuban Missile Crisis, 10-18 (U) PUBLICATION DATE: 30 July 2008 (U) OFFICE OF ORIGIN: Information Security Pol...
0.0

German, NSA SIGINTers Share DNI Processing Knowledge

Document

Release Date: 2014-06-18 Document Date: 2006-05-22
This article, dated 22 May 2006 and taken from the internal NSA newsletter Foreign Affairs Digest, describes a meeting between agency personnel and officers from Germany’s BND: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(S//SI) German, NSA SIGINTers Share DNI Processing Knowledge SUSLAG (Special US Liaison Activity Germany) Run Date: 05/22/2006 (S//SI) A END* delegation responsible for building END'S nex...
0.0

US, German SIGINTers Increase Cooperation on African Targets

Document

Release Date: 2014-06-18 Document Date: 2007-12-13
This internal NSA post, dated 13 December 2007, discussed the US-German Joint Sigint Activity mission’s operations against African targets: see the Der Spiegel article rrorverdächtige: NSA nutzte Erkenntnisse aus Deutschland-Filiale für Tötungen, 15June 2014. africa
(S//SI//REL) US, German SIGINTers Increase Cooperation on African _________________________ Targets FROM: (S//SI//REL)^^^^^^^ SIGDEV Analyst, Joi^^^^^^^^S/ity (H52G1) Run Date; 12/13/200...
0.0

FISA court order authorising surveillance of foreign governments and organisations

Document

Release Date: 2014-06-30 Document Date: 2010-08-19
This FISA court order dated 19 August 2010 approves an annual certification allowing the NSA to surveil commincations of and about 193 governments and other entities for “foreign intelligence” purposes: see the Washington Post article Court gave NSA broad leeway in surveillance, 30 June 2014.
SECRET UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C. ) IN RE DNI/AG CERTIFICATION 2010-A. ) Docket Number 702(i)-10-02 _______________,_______________) ...
0.0

Guide to using Contexts in XKS Fingerprints

Document

Release Date: 2015-07-01
This undated NSA technical document provides detailed information for performing searches within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.s
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL Guide to using Contexts in XKS Fingerprints Version 1.0 Example 1 $a = cc('pk') and (web_search('jihad') or document_body('planning for ...
0.0

GCHQ COMSAT Report

Document

Release Date: 2015-08-03 Document Date: 2010-07-02
This page taken from a longer 2 July 2010 GCHQ report on the state of its COMSAT capabilities (against communications satellites) confirms that “NSA has historically been a large source of funding” for this aspect of the agency’s activies: see the Intercept article GCHQ and Me: My Life Unmasking British Eavesdroppers, 3 August 2015. Download […]
SECRET MTI/00001CPO/4521/S03006/000/07 TCP-MP69-STG-001 2 July 2010 I. BACKGROUND 5. GCHQ currently owns three sites that are involved in COMSAT access: CARBOY, SOUNDER and SNICK. Thes...
0.0

SSO’s Support to the FBI for the Implementation of their Cyber FISA Orders

Document

Release Date: 2015-06-04 Document Date: 2012-03-27
This NSA Staff Processing Form dated 27 March 2012 describes the type of assistance the agency will provide to the FBI on the basis of the new FAA702 “cyberwar” certification: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
SECRET//REL TO USA, FVEY SECURITY CLASSIFICATION NSA STAFF PROCESSING FORM TO EXREG CONTROL NUMBER KCC CONTROL NUMBER SIGINT DIR 2012-704 S353-113-11 THRU ACTION |x] APPROVAL 1 1 SIG...
0.0

US Sites with NSA Personnel in Germany

Document

Release Date: 2014-06-18
This undated document lists the locations of US-operated signals intelligence stations in Germany (some have been redacted): see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
K, (S//5L7REL) NSA Presence - For the following locations, the fact of NSA personnel assigned to these sites/adivides is UNCLASSIFIED, Jt is therefore UNCLASSIFIED, for example, to display plaqu...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh