Filtered By
SecretX
Classification [filter]
Results
98 Total
1.0

FISA court order authorising surveillance of foreign governments and organisations

Document

Document Date: 2010-08-19Release Date: 2014-06-30
This FISA court order dated 19 August 2010 approves an annual certification allowing the NSA to surveil commincations of and about 193 governments and other entities for “foreign intelligence” purposes: see the Washington Post article Court gave NSA broad leeway in surveillance, 30 June 2014.
SECRET UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C. ) IN RE DNI/AG CERTIFICATION 2010-A. ) Docket Number 702(i)-10-02 _______________,_______________) ...
1.0

DNI/AG 702(g) Certification 2010-A

Document

Document Date: 2010-07-15Release Date: 2014-06-30
This 2010 certification from the Director of National Intelligence and the Attorney General asserts that procedures are in place to ensure foreign intelligence gathering stays within the boundaries of the law by targeting people “who are reasonably believed to be outside the United States.” The breadth of the authority is, however, very wide, allowing surveillance […]
SECRET//ORCON,NOFORN CERTIFICATION OF THE DIRECTOR OF NATIONAL INTELLIGENCE AND THE ATTORNEY GENERAL PURSUANT TO SUBSECTION 702(g) OF TfififFORpGN INTELLIGENCE SURVEILLANCE ACT OF 1978, AS ...
1.0

NSAers Make First-Ever Visit to FORNSAT Collection Site in Schöningen, Germany

Document

Document Date: 2006-10-31Release Date: 2014-06-18
This article from the internal NSA newsletter Foreign Affairs Digest, dated 31 October 2006, describes the visit of agency personnel to a BND FORNSAT site and the degree to which data is shared between the US and German services: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014. Download […]
(S//SI//REL) NSAers Make First-Ever Visit to FORNSAT Collection Site in Germany FROM Joint SIGINT Activity (H52G) Run Date: 10/31/2006 (U) Visitors impressed with software demos. ...
1.0

Classification guide for the NSA/CSS Target Exploitation (TAREX) program

Document

Document Date: 2012-02-06Release Date: 2014-10-10
This 2012 classification guide details the NSA’s human intelligence (TAREX) operations: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
SECRET//SI//NOFORN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR THE NSA/CSS TARGET EXPLOITATION (TAREX) PROGRAM 2-52 Effective Date: 6 February 2012...
1.0

Sharing of MetaData across the IC —- Dissemination of SIGINT Metadata Beyond NSA

Document

Document Date: 2005-07-06Release Date: 2014-08-25
This memorandum dated 6 July 2005 describes features of the intelligence sharing systems that preceded ICREACH: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
SECRET//NOFORN//MR UNITED STATES GOVERNMENT memorandum TAC-0xx-05 DATE: 06 July 2005 REPLY TO ATTN OF: TD/TAC SUBJECT: Sharing of MetaData across the IC —Dissemination of SIGINT ...
1.0

AURORAGOLD Working Group

Document

Document Date: 2012-06-06Release Date: 2014-12-04
This 26-page NSA document, originally presented at 2012’s Five Eyes SIGDEV conference, gives a detailed overview of the agency’s information gathering on world mobile phone networks. Some intercepted technical and contact details have been redacted: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//SI//REL TO FVEY (U//FOUO) AURORAGOLD Working Group (S//SI//REL) Shaping understanding of the global GSm/uMTS/LTE landscape SIGDEV Conference - 6 June 2012 This briefing is cl...
1.0

IR.21 – A Technology Warning Mechanism

Document

Document Date: 2010-01-08Release Date: 2014-12-04
This 19-page NSA paper, delivered at the 2010 Five Eyes SIGDEV conference, gives a technical explanation of the importance of sourcing mobile carriers’ roaming agreements (IR.21): see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014. ir21-a-technology-warning-mechanism
(S//REL TO USA, FVEY ) IR.21 - A Technology Warning Mechanism SDC2010 SSG4/T3C Technical Director Derived From: NSA/CSSM 1 -52 Dated: 20070108 Declassify On: 20341201 TOP SE...
1.0

New Contact-Chaining Procedures to Allow Better, Faster Analysis

Document

Document Date: 2011-01-03Release Date: 2013-09-28
This NSA memo, dated 3 January 2011, draws analysts’ attention to a rule change, allowing “contact chaining, and other analysis, from and through any selector, irrespective of nationality and location, in order to follow or discover valid foreign intelligence targets”: see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, […]
(S//SI//REL) New Contact-Chaining Procedures to Allow Better, Faster Analysis FROM: Run Date: 01/03/2011 (U//FOUO) Editor’s note: A briefing will be held on 7 January from 1000-1130 in ...
1.0

Apple A4/A5 Application Processors Analysis

Document

Document Date: 2011-01-10Release Date: 2015-03-10
This extract from a 2011 NSA wiki page introduces a presentation given by Sandia Labs analysts on hacking the GID key in Apple processors: see the Intercept article iSpy: The CIA Campaign to Steal Apple’s Secrets, 10 March 2015.
[edit] (S//NF) Apple A4/A5 Application Processors Analysis (S) Presenter: and/orSandia National Laboratories (U//FOUO) Please contact for more information on this talk. He can be reached at ...
1.0

NATO Civilian Intelligence Council – Cyber Panel – Talking Points

Document

Document Date: 2011-09-14Release Date: 2015-02-04
This US National Intelligence Council memo dated 14 September 2011 provides US talking points for a forthcoming NATO meeting and includes the assessment that the threat presented by Anonymous and hacktivist activity is “minimal”: see the Intercept article Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise, 4 February 2015.
SECRET//REL TO USA, NATO NIM/Cyber 14 September 2011 Talking Points Subject: (S//REL NATO) NATO Civilian Intelligence Council—Cyber Panel National Input A. Threat Overview (U) (U...
1.0

How to configure category throttling in XKeyScore

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration instructions for XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
SECRET//COMINT//RELTO USA, AUS, CAN, GBR, NZL How to configure category throttling in XKEYSCORE Category throttling is performed by the selected output plugin, in the xks.config you need to ...
1.0

ISUAV Video Descrambling

Document

Document Date: 2008-01-01Release Date: 2016-01-29
This GCHQ manual from 2008 explains how analysts would unscramble the video signals from Israeli drones: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016.
SECRET ISUAV Video Descrambling Author: vereîon^ra Introduction Analogue video from Israeli UAVs has been intercepted in both clear (i.e. unencrypted) and scrambled (i.e. encrypted...
1.0

Fusing Signals Data, with WARGODDESS

Document

Document Date: 2003-05-21Release Date: 2016-05-16
WARGODDESS is a system that fuses multiple sources of signal data to help characterize targets and threats and produce estimates about targets and their intentions.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Fusing Signals Data, with WARGODDESS<br>FROM:<br>WARGODDESS System Enginee...
1.0

Spanning The Globe...Misawa to Menwith Hill: Part 1

Document

Document Date: 2003-10-22Release Date: 2016-05-16
In part 1, a computer scientist compares tours in Misawa, Japan, and Menwith Hill in the U.K.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Spanning The Globe...Misawa to Menwith Hill: Part 1<br>FROM:<br>Software Develop...
1.0

Collecting in Afghanistan

Document

Document Date: 2003-05-01Release Date: 2016-05-16
NSA created MINUTEMAN PROMETHEUS for Special Forces to collect data from High Power Cordless Phones in Afghanistan.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) Collecting in Afghanistan<br>FROM: CPT (P) <br>Tactical Platforms Systems In...
1.0

MG Quirk and Charlie Meals Make the Rounds

Document

Document Date: 2003-05-02Release Date: 2016-05-16
Report from the new leaders of SID on their first weeks on the job.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) MG Quirk and Charlie Meals Make the Rounds<br>FROM: the SIGINT Communications Te...
1.0

SID Using New Classification Markings in Its Reports

Document

Document Date: 2003-05-02Release Date: 2016-05-16
SID is changing classification markings used in reports.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) SID Using New Classification Markings in Its Reports<br>FROM: the SIGINT C...
1.0

SIGINT Strategy: The Importance of Common Goals

Document

Document Date: 2003-04-02Release Date: 2016-05-16
SIGINT director announces the availability of a new SIGINT strategy document and encourages the whole team to read it.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) SIGINT Strategy: The Importance of Common Goals<br>FROM: Maureen Baginski<...
1.0

Why Have Names Changed in SEARCHLIGHT? (repost)

Document

Document Date: 2003-05-30Release Date: 2016-05-16
Repost: SEARCHLIGHT, the NSA internal directory, is adding middle names to link to identification systems.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Why Have Names Changed in SEARCHLIGHT? (repost)<br>FROM: SIGINT Communicat...
1.0

Dynamic Methods of Interaction with New and Existing Customers

Document

Document Date: 2003-04-22Release Date: 2016-05-16
After 9/11, SID suddenly got an influx of requests from previously minor customers (like the departments of Interior and Agriculture), acquired many new customers, and had to interact differently with law enforcement. In response, CRD designed new products to be more flexible with secret documents (allowing them to be accessed outside of SCIFs, on mobile devices, etc.).
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Dynamic Methods of Interaction with New and Existing Customers<br>FROM:<br>Actin...
1.0

Third Party Partners

Document

Release Date: 2013-12-08
This short excerpt from an NSA document shows that nine European States – Belgium, Denmark, France, Germany, Italy, The Netherlands, Norway, Spain and Sweden – have a second-tier ‘third party’ relationship with the agency: see the SVT article NSA “asking for” specific exchanges from FRA – Secret treaty since 1954, 8 December 2013.
* (S//SI. REU) SSEU’R. members are the Five Eyes nations (Australia, Canada. New Zealand, United Kingdom and United States] and the following Tliird Party partners: Belgium, Denmark, France, Germ...
1.0

Procedures for the dissemination by NSA to foreign governments of information from FISA electronic surveillance or physical search carried out by the FBI

Document

Document Date: 2002-08-20Release Date: 2014-03-12
This 20 August 2002 memo from US Attorney General John Ashcroft refers to the “modified minimization procedures” now in operation following the FISA Court’s “Raw Take” order of 22 July 2002 and expands on that order by allowing the sharing of information with foreign governments without the need for authorisation to be sought: see the […]
SECRET//X1 This document found at: I:\J3\J34\FISA\fbi.doc I:\J3\NDD\FISA\ fbi.doc Office of the Attorney CjeneraC 'Washington, <D.C- 20530 PROCEDURES FOR THE DISSEMINATION BY NS A T...
1.0

US Sites with NSA Personnel in Germany

Document

Release Date: 2014-06-18
This undated document lists the locations of US-operated signals intelligence stations in Germany (some have been redacted): see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
K, (S//5L7REL) NSA Presence - For the following locations, the fact of NSA personnel assigned to these sites/adivides is UNCLASSIFIED, Jt is therefore UNCLASSIFIED, for example, to display plaqu...
1.0

One-Year Anniversary for SUSLAG

Document

Document Date: 2005-06-10Release Date: 2014-06-21
This article from the internal NSA newsletter Foreign Affairs Digest, dated 10 June 2005, marks the one-year anniversary of the US Special Liaison Activity Germany (SUSLAG)  – NSA personnel working on German soil: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(S//SI) One-Year Anniversary for SUSLAG FROM: (S//SI) SUSLAG (F28) Run Date: 06/10/2005 Special US Liaison Activity Germany has spent a year in a "tin can" (It's better than it sounds...
1.0

AURORAGOLD

Document

Document Date: 2011-01-01Release Date: 2014-12-04
This 4-page NSA document, presented at a Five Eyes SIGDEV conference 2011, gives an overview of the AURORAGOLD (AG) project, in which technical intelligence is gathered to ensure future agency access to mobile phone networks worldwide: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (u//fouo) AURORAGOLD (S//SI//REL) Project Overview: The mission of the AURORAGOLD (AG) project is to maintain data about international GSM/UMT...
1.0

Quadrennial Intelligence Community Review Final Report, April 2009

Document

Document Date: 2009-04-01Release Date: 2014-09-05
This April 2009 report from the Office of the Director of National Intelligence considers the challenges the US intelligence community may face by 2025 and suggests that the competitive advantage of US firms may need to be supported by espionage: see the Intercept article The U.S. Government’s Secret Plans to Spy for American Corporations, 5 […]
SECRET//REL T FINAL REPORT '¿[\ns »' National Intelligenc Derived From: ODNI POL-08 Declassify On: 20340306 □ SECRET//REL TO USA, FVEY FINAL REPORT April 2009 □ SECR...
1.0

Strawhorse: Attacking the MacOS and iOS Software Development Kit

Document

Document Date: 2012-02-10Release Date: 2015-03-10
This NSA summary of a talk presented at the 2012 TCB Jamboree describes a Sandia National Laboratories approach to attacking Apple technology using compromised developer tools: see the Intercept article iSpy: The CIA Campaign to Steal Apple’s Secrets, 10 March 2015.
[edit] (S//NF) Strawhorse: Attacking the MacOS and iOS Software Development Kit (S) Presenter: Sandia National Laboratories (S//NF) Ken Thompson's gcc attack (described in his 1984 Turing aw...
1.0

NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks

Document

Document Date: 2010-01-01Release Date: 2013-09-16
These three slides from an NSA presentation made for the 2010 SIGDEV conference show that the agency is actively targeting payments networks: see the Der Spiegel article ‘Follow the Money’: NSA Monitors Financial World, 13 September 2013.
(S//REL TO USA, FVEY) NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks (U//FOUO) NSA, Network Analysis Center 2010 SIGDEV Conference 09/13/13 SE...
1.0

HIDDENSALAMANDER: Alerting and Characterization of Botnet Activity in TURMOIL

Document

Release Date: 2015-01-17
This undated NSA presentation describes techniques for detecting botnets: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
P SECRET//COMINT//REL TO USA, FVEY HIDDENSALAMANDER Alerting and Characterization of _____iyiissiQr\] CAPABILIT, ES Botnet Activity in TURMOIL Briefers: SECRET//REL TO USA, FV...
1.0

How is Human Language (HTL) Progressing?

Document

Document Date: 2011-09-06Release Date: 2015-05-05
This 6 September 2011 post from the NSA’s internal SIDToday newsletter describes progress in the agency’s speech-to-text capability over the course of the year: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
(S//SI//REL) How Is Human Language Technology (HLT) Progressing? FROM: (U//FOUO)^^^H Language Analysis Modernization Lead (S2) Run Date: 09/06/2011 (S//SI//REL) Editor's intro: At the SI...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh