Filtered By
Top Secret X
Classification [filter]
Results
259 Total
0.0

A Visit to the USUN

Document

Release Date: 2016-12-07 Document Date: 2004-01-09
Staffers from the China Foreign Affairs Branch visited the NSA representatives at the United Nations. They were told the U.N. is a "tactical SIGINT environment." Reporting from SIGINT to U.N. changed history on Iraq War resolution.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) A Visit to the USUN<br>FROM:<br>and <br>China Foreign Affairs Branch (S2B34...
0.0

Media Leaks - Part I (repost)

Document

Release Date: 2016-08-10 Document Date: 2003-12-31
(Repost) NSA refers to media leaks as “cryptologic insecurities.” This article lists several examples from 2000-2002 (from CBS News, “New York Times Daily News,” the Washington Times, and WorldNetDaily) along with damage assessments and follow-on actions, like reporting to the DOJ and requesting an FBI investigation.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Media Leaks - Part I (repost)<br>FROM: SIGINT Communications<br>Run Date: 12/31/...
0.0

Post-war Iraq Plan

Document

Release Date: 2016-05-16 Document Date: 2003-04-11
Planning underway for post-war changes and challenges in April 2003.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) Post-war Iraq Plan<br>FROM: Iraq Issue Managers<br>Unknown<br>Run Date: 04/1...
0.0

Fourth Party Opportunities

Document

Release Date: 2015-01-17
This undated NSA presentation describes the process of Fourth Party collection – “I drink your milkshake”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, FVEY (U) Fourth Party Opportunities O TOP SECRET//COMINT//REL TO USA, FVEY SECRET//COMINT//REL TO USA, FVEY (U) What is 4th Party ..................
0.0

Is there “fifth party” collection?

Document

Release Date: 2015-01-17 Document Date: 2011-01-01
This undated post from an NSA discussion board describes “fourth party collection” – piggybacking on another state’s computer network exploitation operation: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
(TS//SI//REL) Is there "fifth party" collection? | Round Table Dynamic Page - Highest Possible Classification is TOP SECRET // SI / TK // REL TO USA, FVEY (TS//SI//REL) Is there "fifth part...
0.0

FASHIONCLEFT Interface Control Document

Document

Release Date: 2015-01-17 Document Date: 2009-06-15
This internal NSA document dated 15 June 2009 describes a protocol the agency uses to exfiltrate data from its computer network exploitation operations: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Classification: TOP SECRET//COMINT//X1 // COMINT // XI FASHIONCLEFT Interface Control Document Updated: 15 June 2009 Document Number: TAO.DNT_SE07_005_V1.1 28 March 2005 FASHIONCLE...
0.0

Case Studies of Integrated Cyber Operation Techniques

Document

Release Date: 2014-03-12
This undated NSA SIGINT presentation describes nine varieties of QUANTUM malware attack, their operational status and success in the field: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL USA, FVEY Case Studies of Integrated Cyber Operation Techniques NSA/CSS Threat Operations Center VS TOP SECRET//COMINT//REL USA, FVEY (U//FOUO) TUiT0t.EÄ,©i...
0.0

Black Budget entry on Computer Network Operations GENIE project

Document

Release Date: 2015-01-17 Document Date: 2012-02-18
This extract from the US Intelligence Community’s Congressional Budget Justification for the Fiscal Year 2013 (the “Black Budget”) provides the budget for GENIE the project “which underpins NSA/CSS’ Computer Network Operations (CNO) Endpoint capabilities conducted by the Tailored Access Operations (TAO) Group: see the Der Spiegel article The Digital Arms Race: NSA Preps America for […]
TOP SECRET//SI/TK//NOFORN (U) COMPUTER NETWORK OPERATIONS (U) GENIE This Exhibit is SECRET//NOFORN FY 20111 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 2013 Base...
0.0

Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints

Document

Release Date: 2015-07-01 Document Date: 2010-05-01
This 61-page NSA presentation from May 2010 provides analysts with a guide to tracking individuals within XKeyScore using the system’s fingerprint capability: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints May 2010 TOP SECRET //COMINT //REL TO USA, AUS, CAN, GBR, NZL ...
0.0

Profiling SSL and Attributing Private Networks

Document

Release Date: 2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL PROFILING SSL AND ATTRIBUTING PRIVATE NETWORKS An introduction to FLYING PIG and HUSH PUPPY ICTR - Network Exploitation GCHQ T R J...
0.0

VPN SigDev Basics

Document

Release Date: 2014-12-28
This undated NSA presentation describes how to perform attacks against VPNs: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (TS//SI//REL)VPN SigDev Basics S31244 - OTTERCREEK Derived From: NSA/CSSM 1-52 Dated: 20070108 ______Declassify On: 20341101 TOP S...
0.0

Analytic Challenges from Active-Passive Integration

Document

Release Date: 2014-12-28
This undated NSA presentation from the agency’s Information Technology Directorate, aimed at analysts, describes techniques for decrypting IPSec VPN traffic: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
This Briefing is Classified TOP SECRET//COMINT//REL USA, FVEY Analytic Challenges from Active-Passive Integration S324 This Briefing is Classified TOP SECRET//COMINT//REL USA,FVEY DER...
0.0

Tor: Overview of Existing Techniques

Document

Release Date: 2014-12-28 Document Date: 2012-01-01
This undated GCHQ presentation indicates the agency’s Tor research efforts as of 2012: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET STRAP1 Tor: Overview of Existing Techniques (15 minutes) TOP SECRET STRAP 1 C! X R «two THIS INCDRHftTION IS EXEMPT UNDER THE FREEDOM QC I hJTOR M ATIG R FTF n -SV “Q A ...
0.0

A potential technique to deanonymise users of the TOR network (presentation)

Document

Release Date: 2014-12-28
This undated GCHQ presentation proposes a deanonymisation attack against Tor users based on the collection of data from exit nodes owned by the agency: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
UK TOP SECRET STRAP1 COMINT A potential technique to deanonymise users of the TOR network OPC-MCR, GCHQ This information is exempt from disclosure under the Freedom of Information Act 20...
0.0

FININT Tasking

Document

Release Date: 2017-09-23 Document Date: 2012-04-24
This page from GCHQ’s internal GCWiki, dated 24 April 2012 describes procedures for searching through financial data retained by the agency, and cites examples of some of its sources: see the Intercept article Airport Police Demanded An Activist’s Passwords. He Refused. Now He Faces Prison In The UK, 23 September 2017.
TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webteam RUSSETT Support pag...
0.0

Tracking Targets Through Proxies and Anonymizers

Document

Release Date: 2016-06-28
This undated NSA presentation, written by the author of ‘I hunt sys admins’, outlines tactics for tracking users of Tor and other anonymising technologies: see the Intercept article The Hunter, 28 June 2016.
TOP SECRET//COMINT//RELTO USA, FVEY Tracking Targets Through Proxies & Anonymizers (and the air speed velocity of an unladen swallow) Also known as: I I I PaAatasvoaus TOP SECRET//COM...
0.0

Transnational DNI Training

Document

Release Date: 2018-03-01
This undated NSA instructional presentation, along with instructor’s notes, provides a briefing on metadata sharing between the Five Eyes: see the Intercept article How London’s 7/7 Bombings Led to “Unprecedented” Surveillance Tactics, 1 March 2018.
TOPSECRET//COMINT/REL TO USA, AUS, CAN, GBR, NZL//20291123 (U) Instructional Content/Activities (U) Instructor Notes - (U) This lesson will provide you with an overview of sensitive ...
0.0

OAKSTAR Weekly Update – 29 March 2013

Document

Release Date: 2018-03-20 Document Date: 2012-03-01
This internal NSA technical update from March 2013 provides metrics about the information from the access point codenamed MONEYROCKET, which was the NSA’s source for tracking Bitcoin users: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
TOP SECRET//COMINT//NOFORN OAKSTAR Weekly Update Program Highlights Week of: March 23-29, 2013 ETS: Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 TOP SECRET//...
0.0

GCHQ Cyprus

Document

Release Date: 2015-08-03
This two-page extract from a longer, undated, GCHQ document describing its presence in Cyprus, states that “Under the ECHELON Agreement, NSA provides 50% of the funding for the SOUNDER Comsat facility”: see the Intercept article GCHQ and Me: My Life Unmasking British Eavesdroppers, 3 August 2015.
TOP SECRET STRAP1 Technical Capability 24. Improve Mission Management to ensure efficient use of our Sigint resources. The UK hubs/Access Services will continue to simplify and improve per...
0.0

BRECKENRIDGE for STORMBREW Collection

Document

Release Date: 2015-08-15 Document Date: 2009-10-28
This 28 October 2009 post from the internal NSA newsletter SSO Weekly discusses the construction of a cable landing station that matches Verizon’s activities at that time: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN TOPSECRET//SI//REL USA, Cyber Threats and Special Source Operations A Current Perspective for NTOC March 22 2013 Classified...
0.0

Artemis DGO and DOC Special

Document

Release Date: 2016-06-07 Document Date: 2009-01-01
This extract from a 2009 GCHQ presentation includes a report on PRESTON, the agency’s programme for intercepting the communications of individuals or organisations who are subject to surveillance warrants. The report found that, in one six-month period, 97% of such communications had not been viewed by the authorities: see the Intercept article Facing Data Deluge, […]
TOP SECRET STRAP 1 DGO and DOC Special TOP SECRET STRAP 1 This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other...
0.0

JTRIG Operational Highlights, August 2009

Document

Release Date: 2015-04-02 Document Date: 2009-08-08
This short extract from a August 2009 GCHQ document describes the planning phase for Operation Quito, a “long-running, large scale, pioneering effects operation”: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET STRAP 1 • Op QUITO (TSI): Following a couple OMGs and a significant amount of prep work, the planning phase of Op QUITO, an effects op to support FCO's goals relating to Argentina ...
0.0

Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations

Document

Release Date: 2015-04-02 Document Date: 2011-03-10
These extracts from a GCHQ paper dated 10 March 2011 provide an indication of the agency’s ongoing effects (misinformation) and “online HUMINT” operations: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.s
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations PhD Human Systems Group, Information Management ...
0.0

JFK Assassination Records Classification/Declassification Guide Number: 385-00

Document

Release Date: 2017-10-25 Document Date: 2000-06-23
This classification guide from 2000 shows that aspects of NSA investigations related to the Kennedy assassination were still classed as top secret, decades later: see the Intercept article NSA Concealed Records on JFK Assassination for Decades, 25 October 2017.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 (U) JFK ASSASSINATION RECORDS CLASSIFICATION/ DECLASSIFICATION GUIDE NUMBER: 385-00 (U) PUBLICATION DATE: 23 JUNE 2000 (U) PRO...
0.0

PRISM FAA reporting highlight

Document

Release Date: 2017-10-24 Document Date: 2013-03-01
A single slide from an NSA PRISM presentation claims that Saudi Prince Salman bin Sultan ordered Syrian rebels to “light up” Damascus in March 2013, to mark the second anniversary of the Syrian revolution: see the Intercept report NSA Document Says Saudi Prince Directly Ordered Coordinated Attack By Syrian Rebels On Damascus, 24 October 2017. […]
TOP SECRET//SI//NOFORN TS//SI//NF1 PRISM FAA Syrian Oppo (TS//SI//NF) S2E332 issued three single source reports in March 2013 on Syrian opposition attacks against Damascus: - Reports g...
0.0

CSEC Cyber Threat Capabilities

Document

Release Date: 2015-03-23 Document Date: 2011-01-01
This CSE presentation from 2011 describes some of the cyber warfare tools at the agency’s disposal: see the article Communication Security Establishment’s cyberwarfare toolbox revealed, 23 March 2015.
■ ^ ■ Communications Security Centre de la sécurité TOP SECRET//COMINT//REL TO FVEY Establishment Canada des télécommunications Canada CSEC Cyber Threat Capabilities SIGINT and ITS: an en...
0.0

2013 Black Budget: Cryptanalysis & Exploitation services

Document

Release Date: 2015-03-10 Document Date: 2013-01-01
This extract from the US intelligence community’s 2013 Congressional Budget Justification shows expenditure on the Analysis of Target Systems project, which aims to defeat the encryption in commercial software and hardware: see the Intercept article iSpy: The CIA Campaign to Steal Apple’s Secrets, 10 March 2015.
TOP SECRET//SI/TK//NOFORN (U) CRYPTANALYSIS & EXPLOITATION SERVICES (U) ANALYSIS OF TARGET SYSTEMS This Exhibit Is SECRET//NOFORN FY 20111 Actual FY 2012 Enacted FY 2013 Request...
0.0

Iran – Current Topics, Interaction with GCHQ

Document

Release Date: 2015-02-10 Document Date: 2013-04-12
This NSA talking points memo dated 12 April 2013 notes that Iran “has demonstrated a clear ability to learn from the capabilities and actions of others”: see the Intercept article NSA Claims Iran Learned from Western Cyberattacks, 10 February 2015.
TOP SECRET//COMINT//NOFORN (U) Topic: Iran - Current Topics, Interaction with GCHQ (U) Director's Talking Points: * (TS//SI//REL TO USA, FVEY) Emphasize that we have successfully worked mu...
0.0

Computer Network Exploitation (CNE) Classification Guide / 2-59

Document

Release Date: 2014-10-10 Document Date: 2010-03-01
This 2010 NSA classication guide outlines the sensitivity of aspects of the agency’s hacking activities: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2010.
TOP SECRET//SI//REL TO USA, FVEY (U) CLASSIFICATION GUIDE TITLE/NUMBER: Computer Network Exploitation (CNE) Classification Guide / 2-59 (U) PUBLICATION DATE: 1 March 2010 (U) OFFICE OF O...
0.0

Sentry Eagle National Initiative – Security Framework

Document

Release Date: 2014-10-10
This group of three undated NSA slides provides a graphical representation of the sensitivity of aspects of the agency’s SENTRY EAGLE programme: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//NOFORN SENTRY EAGLE National Initiative - Security Framework DERIVED FROM: NSA/CSS Manual 1-52. Dated: 20041123. Declassify On: 20291123 TOP SECRET//COMINT//NOFORN ...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh