Filtered By
Top Secret X
Classification [filter]
Results
259 Total
0.0

An Easy Way to Win: Using SIGINT to Learn about New Viruses (Project Camberdada)

Document

Release Date: 2015-06-22 Document Date: 2010-01-01
This 2010 NSA presentation describes Project Camberdada, an attempt to subvert popular antivirus software by means of surveilling email traffic: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL An Eas Using S about P fwmuuuu IGINT to Learn iew Viruses Project CAMBERDADA ByHH, 1412 (IAD) V252|| Derived From: NSA/CSSM...
0.0

Black Budget – Human Language Technology Research

Document

Release Date: 2015-05-05 Document Date: 2013-01-01
This extract from the 2013 Intelligence Community Budget Justification (“the Black Budget”) outlines the budget for speech recognition technologies: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
TOP SECRET//SI/TK//NOFORN THIS PAGE INTENTIONALLY LEFT BLANK 360 TOP SECRET//SI/TK//NOFORN TOP SECRET//SI/TK//NOFORN (U) RESEARCH & TECHNOLOGY (U) HUMAN LANGUAGE TECHNOLOGY RESEARC...
0.0

Comet News (March 2010)

Document

Release Date: 2015-04-02 Document Date: 2010-03-01
This excerpted GCHQ newsletter from March 2010 describes ongoing surveillance operations against Argentina: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET//STRAP 1 COMET NEWS (March 2010) This quick-read newsletter is intended to inform GCHQ primary target areas of some of the most recent technology developments/findings, tasking ...
0.0

Mobile Apps – Checkpoint meeting Archives

Document

Release Date: 2016-06-07 Document Date: 2012-05-01
This page from GCHQ’s internal GCWiki, last updated on 1 May 2012 documents progress in a variety of the agency’ projects: see Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webteam Support page Mob...
0.0

S455N – Israeli UAV Digital Video

Document

Release Date: 2016-01-29
This undated GCHQ report from the agency’s Cyprus (GOLF) division, describes, in technical data, the S455N signals sent out by Israeli drones: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016.
TOP SECRET STRAP1 SPOKE sigint.development S455N - Israeli UAV Digital Video Golf Section, JSSU(CYP) Analyst: 1 of 7 This information is exempt from disclosure under the Freedom ...
0.0

Significant TRF TROODOS stories over past 6 months

Document

Release Date: 2016-01-29 Document Date: 2012-01-01
This GCHQ presentation from 2012 describes the Troodos (Cyprus) station’s successes in intercepting signals from drones, including Israeli-made drones “carrying weapons” and Iranian-made drones being used in Syria, which were the subject of “presidential” interest: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016. […]
TOP SECRET STRAP1 Significant TRF TROODOS stories over past 6 months I TOP SECRET STRAP1 Success against Syria • 17th Feb 2012 collection on an undocumented frequency of 120...
0.0

Pay attention to that man behind the curtain: Discovering aliens on CNE infrastructure

Document

Release Date: 2015-01-17 Document Date: 2010-06-01
This June 2010 CSEC presentation for the CSEC conference outlines counter-computer network exploitation (CCNE) techniques: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT Pay attention to that man behind the curtain: Discovering aliens on CNE infrastructure CSEC Counter-CNE Target Analytics thread SIGDEV Conference NSA-June 201...
0.0

SPINALTAP: Making Passive Sexy for Generation Cyber

Document

Release Date: 2015-01-17
This undated NSA Menwith Hill presentation describes SPINALTAP, a project to combine data from active operations and passive signals intelligence: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, FVEY / '■%.^ (U//FOUO) SPINALTAP: Making Passive Sexy for Generation Cyber TOP SECRET//COMINT//REL TO USA, FVEY TOP SECRET//COMINT//REL TO USA, FVE...
0.0

Turmoil IPSec VPN Sessionization

Document

Release Date: 2014-12-28 Document Date: 2008-08-15
This NSA presentation from 15 August 2008 includes descriptions of VPN packets: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TURMOIL IPSEC VPN SESSIONIZ AT ION Issue No.l........... Issue Date 08/15/08.. Responsible Authority Author Tec...
0.0

History of the US – Israel SIGINT Relationship, post 1992

Document

Release Date: 2014-05-13 Document Date: 2007-01-01
This short extract, taken from a 2007 NSA report on the history of intelligence cooperation between the US and Israel, describe some of the difficulties of that relationship: see the book No Place To Hide, 13 May 2014.
(TS//S1//NF) As close as the ISNU relationship has become, it has not been without tension. The Jonathan Pollard incident is one example that had a negative, albeit temporary, impact to the S1G1...
0.0

CSEC ITS/2NE Cyber Threat Discovery

Document

Release Date: 2015-02-25 Document Date: 2010-01-01
This 2010 CSEC document complete with speakers’ notes shows that visits to Canadian government websites were monitored, and hundreds of thousands of emails to government email addresses retained every day, for cybersecurity purposes: see the CBC News article CSE monitors millions of Canadian emails to government, 25 February 2015.
TOP SECRET 1^1 Communications Security Centre de la sécurité Establishment Canada des télécommunications Canada CSEC ITS/N2E Cyber Threat Discovery I DISCOCON 2010 m/4 ...
0.0

LOVELY HORSE

Document

Release Date: 2015-02-04 Document Date: 2012-02-06
This page from GCHQ’s internal GCWiki, last updated on 6 February 2012, describes progress on LOVELY HORSE, a tool that automates the monitoring of open-source information related to information security: see the Intercept article Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise, 4 February 2015.
TOP SECRET STRAP1 COMINT The maximum classification allowed or i GCWiki is TOP SFf’RFT STR4P1 COMINT Click to report inappropriate content 1 1 J _U k-k- LOVELY HORSE From GC Wiki Ju...
0.0

MONKEYROCKET Achieves Initial Operational Capability

Document

Release Date: 2018-03-20 Document Date: 2012-07-24
This extract from the internal NSA newsletter SSO News dated 24 July 2012 describes the start of MONEYROCKET collection, at which point it was recording around 2000 events a day, from a user base concentrated in India and China: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 […]
(TS//SI//NF) MONKEYROCKET Achieves Initial Operational Capability By REDACTED on 2012-07-24 1442 (TS//SI//NF) Special Source Operations-OAKSTAR program MONKEYROCKET, a non- Western Internet an...
0.0

VS MALIBU IKE And ESP Metadata Flows

Document

Release Date: 2014-12-28
These four undated NSA slides show a workflow for defeating VPN encryption: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL VS MALIBU IKE And ESP Metadata Flows /20291123 TUBE TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//COMIN...
0.0

Intro to the VPN Exploitation Process

Document

Release Date: 2014-12-28 Document Date: 2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
0.0

A potential technique to deanonymise users of the TOR network (proposal)

Document

Release Date: 2014-12-28 Document Date: 2011-06-13
This GCHQ paper dated 13 June 2011 proposes an attack to deanonymise Tor users: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
UK TOP SECRET STRAP1 COMINT Reference: OPC-M/TECH.B/61 Date: 13 June 2011 Copy no: A potential technique to deanonymise users of the TOR network OPC-MCR, GCHQ Summary A new techn...
0.0

Intercept with OTR encrypted chat

Document

Release Date: 2014-12-28
This undated PRISM intercept from the NSA suggests the agency was unable to decrypt the content of an OTR-encrypted chat session: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS//20320108 Target User Target User IP Address [MINIMIZED US IP ADDRESS] Start Mar 16, 2012 13:31:17 GMT Stop Mar 16, 2012 13:34:26 GMT Other User IP A...
0.0

Voice/Fax User Group Minutes of October 2008 meeting

Document

Release Date: 2018-01-19 Document Date: 2008-10-01
These GCHQ minutes from October 2008 describes how the agency and its partners can re-use voice recognition data in different situations: see the Intercept article Finding Your Voice, 19 January 2018.
TOP SECRET STRAP1 Speaker identification systems (SID^ Result: A couple of months ago we deployed a 5-way speaker id system against a network of high level individuals involved with the A...
0.0

National Information Assurance Research Laboratory (NIARL) Newsletter – September 2008

Document

Release Date: 2014-12-28 Document Date: 2008-09-01
This September 2008 newsletter from the National Information Assurance Research Laboratory (NIARL), an unit within the NSA’s Research Directorate gives an indication of the agency’s progress with cryptanalysis – which, with “only a handful of in-house techniques” – appears to be modest: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet […]
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 September 2008 Edition ■ (U) Message from the NIARL Director: (U//FOUO) Welcome to the September 2008 edition of the National ...
0.0

Crypt Discovery Joint Collaboration Activity

Document

Release Date: 2014-12-28 Document Date: 2011-01-20
This document dated 20 January 2011 provides the research agenda for a joint NSA/GCHQ group tasked with developing “a sound understanding of the threat that encryption brings to our ability to do target discovery/development as well as devising mitigations”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December […]
TOP SECRET Crypt Discovery Joint Collaboration Activity 20 January 2011 Activity Owners [NSA GCHQ Overview Our Internet Exploitation capability is built upon our ability to eff...
0.0

Mobile Networks in MyNOC World

Document

Release Date: 2014-12-13 Document Date: 2011-01-01
This GCHQ presentation from 2011 provides the background to the agency’s hacking attack on Belgacom: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014. gchq-mobile-networks-in-my-noc-world
TOP SECRET STRAP 2 Mobile Networks in World Head of GCHQ NAC n/\c This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemptio...
0.0

Automated NOC Detection

Document

Release Date: 2014-12-13 Document Date: 2011-01-01
This 2011 presentation, created by GCHQ’s Network Analysis Centre describes new techniques for gathering reconnaissance on the IT personnel of targeted organisations (their “Network Operations Centres”), using Belgacom as an example in several slides: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014. Download […]
TOP SECRET STRAP 2 Automated NOC Detection , Head of GCHQ NAC Senior Network Analyst, CSEC NAC n/\c This information is exempt from disclosure under the Freedom of Information Act ...
0.0

OPULENT PUP

Document

Release Date: 2014-12-04 Document Date: 2009-09-18
This extract from a September 2009 GCHQ document describes a project codenamed OPULENT PUP, intended to clear the way for exploitation of the A5/3 GSM cipher: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
TOP SECRET STRAP1 TALKS Pnase 2 Test & TTO Plan SMO/00007CPO/4524/P02003/000/05 18 September 2009 3.6 A5/3 crypt attack proof-of-concept demonstrator 3.6.1 Scope To successfully pr...
0.0

Site Makes First-Ever Collect of High-Interest 4G Cellular Signal

Document

Release Date: 2014-12-04 Document Date: 2010-02-23
This 23 Febrauary 2010 post from the internal NSA newsletter SIDToday describes advances in the agency’s capabilities against 4G signals, described as “a very high priority for NSA and the Intelligence Community”: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014. site-makes-first-ever-collect-of-high-interest
(TS//SI//REL) Site Makes First-Ever Collect of High-Interest 4G Cellular Signal FROM: ■HU and ■HUH RAINFALL (F78) Run Date: 02/23/2010 (TS//SI//REL) A collaborative effort between on-sit...
0.0

Select Accomplishments: Production

Document

Release Date: 2013-12-11 Document Date: 2013-04-01
This short excerpt from an April 2013 NSA presentation given to Five Eyes partners provides evidence of Sweden’s involvement in the “trilat” behind Quantam malware operations: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
TOP SECRET//COMINT//REL USA. AUS, CAN, GBR, NZL Select Accomplishments: Production Sweden: Realization of DZRNSA-proposed trilat to work Quantum.
0.0

Final Agenda SWEDUSA

Document

Release Date: 2013-12-11 Document Date: 2013-04-23
The agenda for the SWEDUSA 2013 Strategic Planning Conference on 24-26 April 2013, showing extensive discussion between the NSA and FRA at the most senior level: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
TOP SECRET//SI//NOFORN As of: 23 April//1000 Protocol Rep: Visit manager: Date/Time of Visit: (U) 24-26 April 2013 24 April 2013//0745-1600; 25 April 2013//0845-1545; 26 April...
0.0

Satellite Transport Knowledge

Document

Release Date: 2014-09-14
This undated GCHQ document reporting on the activities of its installation at Bude in Cornwall, describes the infiltration of three German satellite comnunications providers, Stellar, Cetel and IABG. The document includes server details, network graphs, customer login details and the personal details of network engineers: see the Intercept article New Zealand Launched Mass Surveillance Project […]
TOP SECRET STR A PI iijj Çjp ■ GCHQ Bude Sigint Development NAC BUDE Partnership SATELLITE TELEPORT KNOWLEDGE Contents UStellar Auton om ou s Sy ste m : 35207 IP Ranges: ...
0.0

Exhibit F

Document

Release Date: 2014-06-30 Document Date: 2010-07-16
This document lists the 193 governments, intragovernmental organisations and other entities which the NSA was granted the legal authority to intercept communications “about” for foreign intelligence purposes in August 2010: see the Washington Post article Court gave NSA broad leeway in surveillance, 30 June 2014.
TOP SECRET//NOFORN EXHIBIT F IN THE MATTER OF FOREIGN GOVERNMENTS, FOREIGN FACTIONS Ns?F^yyiG#i 11- ENTITIES, AND FOREIGN-BASED POLITICAL ORGANIZATIONS >■,, f;f |:VV DNI/AG 70...
Afghanistan (AFG/AF), Albania (ALB/AL), Algeria (DZA/DZ), Andorra (AND/AD), Angola (AGO/AO), Antigua and Barbuda (ATG/AG), Argentina (ARG/AR), Armenia (ARM/AM), Austria (AUT/AT), Azerbaijan (AZE/AZ), Bahamas (BHS/BS), Bangladesh (BGD/BD), Barbados (BRB/BB), Belarus (BLR/BY), Belgium (BEL/BE), Belize (BLZ/BZ), Benin (BEN/BJ), Bhutan (BTN/BT), Bolivia (BOL/BO), Bosnia and Herzegovina (BIH/BA), Botswana (BWA/BW), Brazil (BRA/BR), Bulgaria (BGR/BG), Burkina Faso (BFA/BF), Burundi (BDI/BI), Cambodia (KHM/KH), Cameroon (CMR/CM), Central African Republic (CAF/CF), Chad (TCD/TD), Chile (CHL/CL), China (CHN/CN), Colombia (COL/CO), Comoros (COM/KM), Congo (COD/CD), Costa Rica (CRI/CR), Croatia (HRV/HR), Cuba (CUB/CU), Cyprus (CYP/CY), Czech Republic (CZE/CZ), Denmark (DNK/DK), Djibouti (DJI/DJ), Dominica (DMA/DM), Dominican Republic (DOM/DO), Ecuador (ECU/EC), Egypt (EGY/EG), El Salvador (SLV/SV), Equatorial Guinea (GNQ/GQ), Eritrea (ERI/ER), Estonia (EST/EE), Ethiopia (ETH/ET), Fiji (FJI/FJ), Finland (FIN/FI), France (FRA/FR), Gabon (GAB/GA), Gambia (GMB/GM), Georgia (GEO/GE), Germany (DEU/DE), Ghana (GHA/GH), Greece (GRC/GR), Grenada (GRD/GD), Guatemala (GTM/GT), Guinea (GIN/GN), Guinea-Bissau (GNB/GW), Guyana (GUY/GY), Haiti (HTI/HT), Vatican (VAT/VA), Honduras (HND/HN), Hungary (HUN/HU), Iceland (ISL/IS), India (IND/IN), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Ireland (IRL/IE), Israel (ISR/IL), Italy (ITA/IT), Jamaica (JAM/JM), Japan (JPN/JP), Jordan (JOR/JO), Kazakhstan (KAZ/KZ), Kenya (KEN/KE), Kiribati (KIR/KI), Korea (KOR/KR), Kuwait (KWT/KW), Kyrgyzstan (KGZ/KG), Latvia (LVA/LV), Lebanon (LBN/LB), Lesotho (LSO/LS), Liberia (LBR/LR), Libya (LBY/LY), Liechtenstein (LIE/LI), Lithuania (LTU/LT), Luxembourg (LUX/LU), Macedonia (MKD/MK), Madagascar (MDG/MG), Malawi (MWI/MW), Malaysia (MYS/MY), Maldives (MDV/MV), Mali (MLI/ML), Malta (MLT/MT), Marshall Islands (MHL/MH), Mauritania (MRT/MR), Mauritius (MUS/MU), Mexico (MEX/MX), Micronesia (FSM/FM), Moldova (MDA/MD), Monaco (MCO/MC), Mongolia (MNG/MN), Montenegro (MNE/ME), Morocco (MAR/MA), Mozambique (MOZ/MZ), Myanmar (MMR/MM), Namibia (NAM/NA), Nauru (NRU/NR), Nepal (NPL/NP), Netherlands (NLD/NL), Nicaragua (NIC/NI), Niger (NER/NE), Nigeria (NGA/NG), Norway (NOR/NO), Oman (OMN/OM), Pakistan (PAK/PK), Palau (PLW/PW), Panama (PAN/PA), Papua New Guinea (PNG/PG), Paraguay (PRY/PY), Peru (PER/PE), Philippines (PHL/PH), Poland (POL/PL), Portugal (PRT/PT), Qatar (QAT/QA), Romania (ROU/RO), Russia (RUS/RU), Rwanda (RWA/RW), Saint Kitts and Nevis (KNA/KN), Saint Lucia (LCA/LC), Samoa (WSM/WS), San Marino (SMR/SM), Sao Tome and Principe (STP/ST), Senegal (SEN/SN), Serbia (SRB/RS), Seychelles (SYC/SC), Sierra Leone (SLE/SL), Singapore (SGP/SG), Slovakia (SVK/SK), Slovenia (SVN/SI), Somalia (SOM/SO), South Africa (ZAF/ZA), Spain (ESP/ES), Sri Lanka (LKA/LK), Sudan (SDN/SD), Suriname (SUR/SR), Swaziland (SWZ/SZ), Sweden (SWE/SE), Switzerland (CHE/CH), Taiwan (TWN/TW), Tajikistan (TJK/TJ), Tanzania (TZA/TZ), Thailand (THA/TH), Timor-Leste (TLS/TL), Togo (TGO/TG), Tonga (TON/TO), Tunisia (TUN/TN), Turkey (TUR/TR), Turkmenistan (TKM/TM), Tuvalu (TUV/TV), Uganda (UGA/UG), Ukraine (UKR/UA), United States (USA/US), Uruguay (URY/UY), Uzbekistan (UZB/UZ), Vanuatu (VUT/VU), Venezuela (VEN/VE), Vietnam (VNM/VN), Western Sahara (ESH/EH), Yemen (YEM/YE), Zambia (ZMB/ZM), Zimbabwe (ZWE/ZW)
0.0

RAMPART-A Sites

Document

Release Date: 2014-06-18
These three undated NSA Special Source Operation slides supply details on selected RAMPART-A cable access sites: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 18 June 2014.
TOP SECRET//COMINT//NOFORN RAMPART A Sites Five sites, 4 with a Trusted 3rd Party Partner ■ US-3127!VH AZUREPHOENIX**4mb BW/1 Ogb/day ■ US-3145/KX MOONLIGHTPATH** - ~2mb BW/5gb/day ...
0.0

NSA’s Counterterrorism (CT) Relationship with the German Foreign Intelligence Service (BND) and the German Federal Office for the Protection of the Constitution (BfV)

Document

Release Date: 2013-07-22 Document Date: 2013-04-08
This background document, prepared by NSA officials in advance of a conversation with representatives of Germany’s domestic (BfV) and foreign (BND) intelligence services, outlines the continuing cooperation between the three agencies in the field of counterterrorism. Extracts from this document were published by Der Spiegel in July 2013: see the Der Spiegel article New NSA […]
TOP SEC RET//SI//NOFORN (U) Topic (S/REL TO USA, DEU) NS A’5 Counterterrorism (CT) Relationship with the German Federal Intelligence Seivice (BND) and the German Federal Office for the Prot...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh