Filtered By
Top Secret X
Classification [filter]
Results
259 Total
0.0

Sharing Communications Metadata Across the US Intelligence Community

Document

Release Date: 2014-08-25 Document Date: 2007-05-15
This ODNI briefing from 15 May 2007 describes the rationale for ICREACH and the scale of metadata sharing that was envisioned: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
This Briefing is Classified TOP SECRET//COMINT//NOFORN//20320108 spates °v — — *i©#0*ie#a*i©#©'i©#©*iC#G*i©#©‘i©#0’i©#0*i©,©,iC#&‘ie#©*iC#3'i©#0*iC#©*ie#©*iC#3 1©#C*’€•©•’€...
0.0

NSA Intelligence Relationship with Jordan

Document

Release Date: 2014-08-04 Document Date: 2013-04-18
This extract from an NSA Information Paper dated 18 April 2013 shows that Jordan’s Electronc Warfare Directorate (EWD) is “the sole contributor to a large body of NSA’s reporting” on the Palestinian security forces: see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
TOP SECRET//SI//NOFORN National Security Agency/Central Security Service 18 April 2013 Information Paper (S//SI//REL TO USA, JOR) Subject: NSA Intelligence Relationship with Jordan (S//S...
0.0

NSA Intelligence Relationship with Israel

Document

Release Date: 2014-08-04 Document Date: 2013-04-19
This internal NSA information paper, dated 19 April 2013, describes a “far reaching technical and analytic relationship” with Israel’s SIGINT National Unit (ISNU): see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
TOP SECRET//SI//NOFORN National Security Agency/Central 19 April 2013 Security Service Information Paper (TS//REL TO USA, ISR) Subject: NSA Intelligence Relationship with Israel (U) I...
0.0

GSM classification guide

Document

Release Date: 2013-12-10 Document Date: 2006-09-20
This internal NSA document from 20 September 2006 outlines the agency’s ability to intercept, process and discern location data from mobile phone calls: see the Washington Post article New documents show how the NSA infers relationships based on mobile location data, 10 December 2013.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//MR Description of Information Classification/ Markings Reason Declass Remarks b. (U) In association with NSA, SIGINT or Intelligence. SECRE...
0.0

Summary of DNR and DNI Co-Travel Analytics

Document

Release Date: 2013-12-10 Document Date: 2012-10-01
This 24 page white paper dated 1 October 2012 describes and evaluates some of the Co-Traveller tools the NSA and partner agencies uses to analyse phone location data: see the Washington Post article New documents show how the NSA infers relationships based on mobile location data, 10 December 2013.
TOP SECRET//COMINT//REL TO USA, FVEY Summary of DNR and DNI Co-Travel Analytics S2I5 1 October 2012 Contact information TOP SECRET//COMINT//REL TO USA, FVEY TOP SECRET//COMINT//R...
0.0

Special Collection Service

Document

Release Date: 2014-06-18 Document Date: 2011-03-21
This presentation, prepared for the Pacific SIGDEV Conference in March 2011 describes the organisation, operations and modernisation of the NSA’s Special Collection Service division, which works out of US embassies and consultates across the world, in tandem with the CI see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 […]
TOP SECRET // COMINT // REL TO USA, AUS, CAN, GBR, NZL Special Collection Service Pacific SIGDEV Conference March 2011 The Overall Classification of this Briefing: TOP SECRET//COMIN...
0.0

Formatting internal memos

Document

Release Date: 2014-07-09 Document Date: 2005-07-05
This excerpt from a 2005 NSA document demonstrating to personnel how to format internal memos shows how anti-Muslim prejudice has found its way into official documents: see the Intercept article Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On, 9 July 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZLV/20291123 05 July 2005 E-mail: address: badASGguy@holmail.com Identity: Mohammed Raghcad (ASG Sales Associate) ASG background (below is...
0.0

Black Budget entry on Foreign Partner Access

Document

Release Date: 2014-06-18
This 4-page excerpt from the 2013 Black Budget describes the two elements of NSA’s Foreign Partner Access operations – RAMPART-A and WINSTSTOP – together with their funding: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 18 June 2014.
TOP SECRET//SI/TK//NOFORN (U) SPECIAL SOURCE ACCESS (U) FOREIGN PARTNER ACCESS This Exhibit is SECRET//NOFORN FY 20111 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 201...
0.0

BASECOAT

Document

Release Date: 2014-05-19 Document Date: 2013-05-02
This slide from a 2013 NSA Special Source Operations presentation shows that SOMALGET is used to investigate narcotics offenses: see the Intercept article: Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas, 19 May 2014.
TOP SECRET//SI//NOFORN (U) WHAT’S NEW >US-331OAI /A2/BASECOAT (Bahamas) reactivated mid- March. Five reports issued by end of March, four sole source. 2/00/501291-13 ______ (S//SI//REL...
0.0

NSA Intelligence Relationship with Canada’s Communications Security Establishment Canada (CSEC)

Document

Release Date: 2014-05-13 Document Date: 2013-04-03
This largely redacted information paper from NSA’s Central Security Service dated 3 April 2013 details the current state of the agency’s cooperative relationship with its Canadian counterpart: see the book No Place To Hide, 13 May 2014.
TOP SECRET//SI//REL USA, FVEY National Security Agency/ 3 April 2013 Central Security Service Information Paper Subject: (U//FOUO) NSA Intelligence Relationship with Canada’s Commun...
0.0

PRISM Operations Highlight: Olympics Support – GCHQ Using PRISM Access

Document

Release Date: 2014-04-30
This slide from a presentation on PRISM describes access granted to GCHQ employees during the 2012 London Olympics: see the Intercept article British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools, 30 April 2014.
TOP SECRET//SI//NOFORN (TS//SI//NF) PRISM Operations Highlight Olympics Support - GCHQ Using PRISM Access •Olympic Option Status as of 24 May 2012: -Trained/approved GCHQ users accessi...
0.0

Court Orders

Document

Release Date: 2014-03-29 Document Date: 2013-03-01
This slide from a March 2013 NSA Special Source Operations presentation reveals the existence of a FISA Court order (case number 13-319) relating to “Germany”, among others: see the Der Spiegel article ‘A’ for Angela: GCHQ and NSA Targeted Private German Companies and Merkel, 29 March 2014.
TOP SECRET//SI//NOFORN Last Week: Germany (13-319) This week: NTR jlIp.Cfl.rn.ing: Jordan (12-470) Morocco (12-481) 9/24/13 -L Signed: 7 Mar 13 Expires: 29 Mar 13 Expires...
0.0

QUANTUMTHEORY

Document

Release Date: 2014-03-12 Document Date: 2010-01-01
This presentation from the 2010 SIGDEV Conference describes the contribution made by GCHQ to the development of Quantum techniques: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL TO USA, FVEY//20320108 TOP SECRET//COMINT//REL TO USA, FVEY//20320108 SIGDEV: Discovery in the Cyber Ag> TOP SECRET//COMINT//REL TO USA, FVEY//20320108 (U) Clas...
0.0

Making Things Measurable: Technology Trending Challenges and Approaches

Document

Release Date: 2014-12-28 Document Date: 2012-06-06
This 40-page NSA presentation for the June 2012 SIGDEV conference includes a ranking of cryptographic protocols in order of ‘risk’ the they pose to the agency’s operations: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL FVEY//20340601 SIGDEV Conference 2012 (U) Making Things Measureable: Technology Trending Challenges and Approaches June 2012 TOP SECRET//COMINT//REL FVEY/...
0.0

Data Acquisition Update

Document

Release Date: 2017-04-24 Document Date: 2004-08-20
SID's deputy director for Data Acquisition gives an update on what his department has been doing. He points out that the capture of terrorist Umar Baziyani was an example of seamless interaction between many diverse parts of NSA, an operation that included "cryptoanalytic exploitation using special purpose hardware." He outlines some of Data Acquisition's activities to build tools and infrastructure to make similar operations much easier in the future, including the establishment of the Global Network Forum, "a 5 Eyes construct to manage midpoint accesses on a community basis."
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Data Acquisition Update<br>FROM: <br>SID's Deputy Director for Data Acquisition...
0.0

SIGINT Aids Capture of Major Terrorist in Iraq

Document

Release Date: 2016-12-07 Document Date: 2004-04-08
SIGINT reports led U.S. forces to the location of a meeting where Abu Abdullah, "one of the major facilitators of terrorist operations in Iraq," was captured.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S) SIGINT Aids Capture of Major Terrorist in Iraq<br>FROM: SIGINT Communications<b...
0.0

InSIDer's View of History: Desert One - The Iranian Hostage Rescue Mission

Document

Release Date: 2016-12-07 Document Date: 2004-05-21
Anecdote about signals intelligence during the 1980 Iranian hostage rescue mission.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) InSIDer's View of History : Desert One - The Iranian Hostage<br>Rescue Mission<...
0.0

SID and DIA Collaborate Virtually on Russian Targets

Document

Release Date: 2016-12-07 Document Date: 2004-05-18
An "outstanding" DIA analyst finds valuable SIGINT leads on Russian underground facilities by combing open-source literature like "newspapers, government decrees, and obscure websites." This sort of research may have helped identify the government organizations responsible for managing a long-studied underground facility at Yamantau Mountain in Russia's Ural Mountains.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) SID and DIA Collaborate Virtually on Russian Targets<br>FROM:<br><br>, Offi...
0.0

3 1/2 Months in Qatar: Supporting CENTCOM

Document

Release Date: 2016-08-10 Document Date: 2003-11-24
This intern worked in Qatar for 3 1/2 months, both before and after the Iraq War started, locating leadership in the Iraqi government.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) 3 1/2 Months in Qatar: Supporting CENTCOM<br>FROM:<br>IA Intern<br>Run Date: 11/...
0.0

New Release: The FORNSAT Plan

Document

Release Date: 2016-05-16 Document Date: 2003-06-03
Description of a plan for the modernization of collection and processing of international communications from foreign communications satellites.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(S//SI) New Release: The FORNSAT Plan<br>FROM:<br>Technical Director for FORNSAT<br>...
0.0

SIGINT Analysts: In-flight GSM Is No Joke

Document

Release Date: 2016-12-07 Document Date: 2010-05-18
This 18 May 2010 article from the NSA internal newsletter SIDToday outlines how the agency is reacting to the growth of mobile phone services on board commercial aircraft: see the Intercept article American and British Spy Agencies Targeted In-flight Mobile Phone Use, 7 December 2016.
TOP SECRET//COMINT//RELTO USA, FVEY \\ (U//FOUO) In-Flight GSM S32423/S3T1 The overall classification of this briefing is TOP SECRET//COMTNT//REI, TOP SECRET//COMINT//REL TO USA, FVE...
0.0

Introduction to WLAN / 802.11 Active CNE Operations

Document

Release Date: 2016-08-19 Document Date: 2010-12-15
This NSA presentation from December 2010 forms the second part of a course in using the agency’s CNE tools: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//COMINT//NOFORN CLOSE « ACCESS Introduction to WLAN / 802.11 Active CNE Operations December 15-16, 2010 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN Classifi...
0.0

Wireless LAN/CNE Tool Training Course and Evaluation

Document

Release Date: 2016-08-19 Document Date: 2010-12-15
This NSA presentation from December 2010 forms the first part of a course in using the agency’s CNE tools: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//COMINT//NOFORN CLOSE « ACCESS Wireless LAN / CNE Tool Training Course and Evaluation TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN Classification #4 CLOSE...
0.0

EP-3E Collision: Cryptologic Damage Assessment and Incident Review

Document

Release Date: 2017-04-10 Document Date: 2001-07-01
A joint US Navy and NSA report, prepared three months after a US spy plane was forced to crash land in China, assesses the degree to which surveillance secrets were compromised: see the Intercept article Burn After Reading: Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident, 10 April 2017. […]
TOP SECRET//COMINT//NOFORN//X1 EP-3E Collision: Cryptologic Damage Assessment and Incident Review Final Report Prepared by the EP-3 Cryptologic Assessment Team July 2001 Classifie...
0.0

SKIDROWE – Low Speed DNI Processing Solution Replacing WEALTHYCLUSTER2

Document

Release Date: 2016-11-16
This undated NSA presentation describes SKIDROWE, a FORNSAT operation that surveils signals being sent to and from satellites: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL Low Speed DNI processing solution TOP SECRET//COMINT// yJ SKIDROWE Components WEALTHYCLUSTER to TURNWEALTHY Capabilities o...
0.0

Communications Capability Development Programme

Document

Release Date: 2016-06-07 Document Date: 2012-01-01
This page from GCHQ’s internal GCWiki outlines the agency’s approach to maintaining the UK’s “lawful intercept” capability: see the Intercept article Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webteam . Support page ...
0.0

Introduction to XKS Application IDs and Fingerprints

Document

Release Date: 2015-07-01 Document Date: 2009-08-27
This 60-page NSA presentation from 27 August 2009 explains the use of different kinds of metadata tags in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Application IDs and Fingerprints 27 August 2009 .... ‘s 01 Ol A l • DERIVED FROM: NSA/CSSM...
0.0

DNI 101 How Do I Begin Analyzing a Target’s Email Address?

Document

Release Date: 2015-07-01
This undated NSA document provides a decision tree for the analysis of email addresses, IP addresses, cookies and phone numbers in XKeyScore and other agency tools: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//20291123 DNI101 How Do I Begin Analyzing a Target's Email Address? TOP SECRET//COMINT//20291i23 [ =Tool/Database^ What Things Are Found Doing DNI Analysis and What...
0.0

Communications System How To Guide

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration instructions for Communications System (Comms), one of the integral parts of the XKeyScore system: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET (TS//SCI) Communications System How To Guide The communications system (Comms) is the primary means that XKEYSCORE systems use to communicate among servers in the same cluster...
0.0

Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations

Document

Release Date: 2015-06-22 Document Date: 2011-03-22
This 42-page report from 10 March 2011 provides an overview of GCHQ’s information operations unit and the behavioural science theories that underpin its activities: see the Intercept article Controversial GCHQ Unit is Deeply Engaged in Law Enforcement, 22 June 2015.
TOP SECRET Behavioural Science Support for JTRIG’s (Joint Threat Research and Intelligence Group’s) Effects and Online HUMINT Operations Mandeep K. Dhami, PhD Human Systems Group, Infor...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh