Filtered By
Top Secret X
Classification [filter]
Results
259 Total
0.0

Target Development from Scratch: the Russian Tambov Crime Syndicate

Document

Release Date: 2016-05-16 Document Date: 2003-05-05
The State Department tasked NSA with getting information about an alleged Russian gangster.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(TS//SI) Target Development from Scratch: the Russian Tambov<br>Crime Syndicate<br>F...
0.0

SIGNIT Development Forum (SDF) Minutes

Document

Release Date: 2015-03-10 Document Date: 2009-06-09
These intenal NSA minutes from a meeting that took place on 8 June 2009 discuss GCSB activities and interoperability between NSA systems: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL SIGINT Development Forum (SDF) Minutes Location: NSA-W Date: 8-9 June 2009 8 June 2009 Developments in SD - NSA 5 key imperatives f...
0.0

TCB Jamboree

Document

Release Date: 2015-03-10 Document Date: 2012-01-01
This excerpt from a 2012 NSA wiki page introduces the CIA’s annual conference for discussing compromises to consumer software and hardware: see the Intercept article iSpy: The CIA Campaign to Steal Apple’s Secrets, 10 March 2015.
The accredited security level of this system is: TOP SECRET//HCS/SI-GAMMA/TALENT KEYHOLE//NOFORN/ORCON/PROPIN * TOP SECRET//SI//NOFORN (U) TCB Jamboree TOP SECRET//SI//NOFORN From Wikiln...
0.0

GCSB Sigint Development Quarterly Report

Document

Release Date: 2015-03-05 Document Date: 2009-07-01
This GCSB report from July 2009 describes the move towards “full collection” at the agency’s Waihopai, progress against several named targets and “2nd party sharing” arrangements via XKeyScore: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 March 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL GCSB SIGINT Development Quarterly Report Quarterly Report: 002/09 J uly 2009 To: Deputy Director Signals Intelligence Target tele...
0.0

Phone Number Extractor

Document

Release Date: 2015-07-01 Document Date: 2009-10-01
This NSA presentation from October 2009 explains how XKeyScore automatically extracts phone numbers from intercepts: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Phone Number Extractor TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//COMINT//RELTO USA, AUS, CAN...
0.0

OSINT Fusion Project

Document

Release Date: 2015-07-01
This undated presentation from NSA’s UK-based Menwith Hill station describes the various uses of open source intelligence (OSINT) in computer network operations, including the monitoring of hacker forums and spotting opportunities for so-called “Fourth Party Collection”: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, FVEY OSINT FUSION PROJECT Lockheed Martin IS&GS Intelligence LOCKHEED MARTIN TOP SECRET//COMINT//REL TO USA, FVEY TOP SECRET//COMINT//REL TO USA,...
0.0

Full Log vs. HTTP

Document

Release Date: 2015-07-01 Document Date: 2009-06-11
This NSA presentation from 11 June 2009 explains the scope of metadata collection within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Log vs. HTTP 11 June 2009 * WHv:i DERIV TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//...
0.0

Finding and Querying on Document Metadata

Document

Release Date: 2015-07-01 Document Date: 2009-04-01
This NSA presentation from April 2009 explains how analysts can make use of document metadata available through XKeyScore, together with worked examples and screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Finding and Querying on Document Metadata tooz|/ 1 Booz|Allen| Hamilton Sigint Development Support / SIGINT Technica...
0.0

FAIRVIEW Tour for Director, Research Directorate

Document

Release Date: 2015-08-15 Document Date: 2012-01-13
This 13 January 2012 post from the NSA internal newsletter SSO Weekly mentions the “extreme willingness to help” of AT&T (FAIRVIEW) towards the agency: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
(TS//SI//REL FVEY) FAIRVIEW Tour for Director, Research Directorate By on 2012-01-13 0814 (TS//SI//REL FVEY) On 6 January 2012, Director of NSA's Research Directorate, was provided a tou^^F...
0.0

Mobility Business Records Flow Significantly Increases Volume of Records Delivered Under BR FISA

Document

Release Date: 2015-08-15 Document Date: 2011-08-30
This 30 August 2011 post from the NSA internal newsletter SSO Weekly reveals that AT&T (FAIRVIEW) began sending over 1.1bn US mobile phone records to the agency every day: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
(TS//SI//NF) Mobility Business Records Flow Significantly Increases Volume of Records Delivered Under BR FISA By^^^^^Hon 2011-08-30 1440 (TS//SI//NF) On 29 August, FAIRVIEW started delivering...
0.0

SSO dictionary – FAIRVIEW

Document

Release Date: 2015-08-15
This extract is from an undated dictionary produced by NSA Special Source Operations, provides glosses for several terms associated with the corporate partner FAIRVIEW, including the AT&T-specific term ‘SNRC’: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
LITHIUM (TS//SI//NF) BLARNEY'S covername for one of their corporate partners. Need WPG ECI for company name NODDY-3 (TS//SI//NF) FAIRVIEW'S covername for Coverage of Current and Forecasted NR...
0.0

Cyber Threats and Special Source Operations

Document

Release Date: 2015-08-15 Document Date: 2013-03-22
This NSA Special Source Operations presentation from 22 March 2013 supplies a detail about the Breckenridge access point that supports the identification of the corporate partner codenamed STORMBREW as US telecommunications company Verizon: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN TOPSECRET//SI//REL USA, Cyber Threats and Special Source Operations A Current Perspective for NTOC March 22 2013 Classified...
0.0

Kaspersky User-Agent Strings

Document

Release Date: 2015-06-22 Document Date: 2008-09-22
This NSA research paper from September 2008 shows that the agency was aware that users of Kaspersky antivirus software could be uniquely identified using the information Kaspersky sent to its own servers: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE DRAFT (C//REL) Kaspersky User-Agent Strings By S3T/TECH/xxx/2008 September 20...
0.0

NAC 2Q 2011 Business Plan Review

Document

Release Date: 2015-04-02 Document Date: 2011-09-08
This short extract from a GCHQ Network Analysis Centre report covering the period July-September 2011 describes “offensive cyber operations” against Iran, Argentina and Libya: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET STRAP1 AUS/CAN/NZ/UK/US EYES ONLY \ 2Q NAC Business Plan Review July - September 2011 network >'N>n_,=*5i5 centre ,.A - . TOP SECRET STRAP1 AUS/CAN/NZ/UK/US EYES ONLY ...
0.0

What’s the worst that could happen?

Document

Release Date: 2016-02-02 Document Date: 2010-03-01
This GCHQ document from March 2010 presents a checklist of factors analysts should consider before going ahead with an operation to infiltrate a communications network, by physical or other means. Among the concerns raised is the risk that British actions may enable US authorities to conduct operations “which we would not consider permissible”: see the […]
TOP SECRET STRAP 1 What’s the worst that could happen? This document contains examples of specific risk which may affect operations and which may need to be considered when writing submissi...
0.0

In-Flight GSM

Document

Release Date: 2016-12-07 Document Date: 2009-01-01
This 2009 NSA presentation, based on an internal agency newsletter article from 20 March that year, describes the growth in airlines offering onboard mobile phone services, which the Agency had alreadyu been actively collecting for at least a year: see the Intercept article American and British Spy Agencies Targeted In-flight Mobile Phone Use, 7 December […]
TOP SECRET//COMINT//RELTO USA, FVEY \\ (U//FOUO) In-Flight GSM S32423/S3T1 The overall classification of this briefing is TOP SECRET//COMTNT//REI, TOP SECRET//COMINT//REL TO USA, FVE...
0.0

DGO Enables Endpoint Implants via QUANTUMTHEORY

Document

Release Date: 2016-08-19 Document Date: 2011-09-26
This 26 September 2011 article from the NSA’s internal newsletter Special Source Operations News discusses the delivery of QUANTUMINSERT malware to a target in Pakistan: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
(TS//SI//NF) DGO Enables Endpoint Implants via QUANTUMTHEORY By [[REDACTED]] on 2011-09-26 1548 (TS//SI//NF) In another example of the emerging collaboration between the Endpoint and Midpoint ...
0.0

FOXACID SOP for Operational Management of FOXACID Infrastructure

Document

Release Date: 2016-08-19
This draft NSA report on using the agency’s FOXACID system confirms that malware code released by the ShadowBrokers did, in fact, originate from the NS see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL D R A F T NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND FOXACID SOP FOR OPERATIONAL MANAGEMENT...
0.0

Innov8 VoiceAnalytics Experiment Profile

Document

Release Date: 2018-01-19 Document Date: 2010-03-29
This GCHQ experiment profile from March 2010 proposes a test of the effectiveness of GCHQ and NSA voice recognition systems: see the Intercept article Finding Your Voice, 19 January 2018.
TOP SECRET Experiment Profile Experiment Name Voice Analytics Experiment Reference Version 1.0 Date 29 March 2010 Experiment Owner Department T12 Experiment Start Date 5 July 2010 Exper...
0.0

Voice/Fax User Group Minutes of March 2009 meeting

Document

Release Date: 2018-01-19 Document Date: 2009-04-21
These GCHQ minutes from March 2009 discuss the deployment of BROADOAK voice recognition systems in the Middle East against Saudi, Pakistani, Georgian, and Iraqi leaders, among others: see the Intercept article Finding Your Voice, 19 January 2018.
TOP SECRET STRAP1 21 April 2009 VOICE/FAX USER GROUP Minutes of March 2009 meeting 1. B14/MCS update (courtesy of MCS work this month has been almost entirely updates to existing model...
0.0

Transnational DNI training – PINWALE

Document

Release Date: 2017-11-30
This undated NSA training presentation explains the use and function of PINWALE, the agency’s repository of FBI FISA data: see the Intercept article NSA Secretly Helped Convict Defendants in U.S. Courts, 30 November 2017.
TOP SECRETWCOMIHT^REL TO U3Ar AU5. CAN. GBR, NZi-'.^OKJ tl 23 (U) Describe PINWALE TOP SECRETtfCOMlNTi'RELTQ USA, AUS, CAN, GBR, NZL/H0291123 2 TOP SECRETtfCOMlNTi'RELTQ USA, AUS, CAN, ...
0.0

Computer Network Exploitation

Document

Release Date: 2018-02-17
This undated GCHQ presentation gives an overview of the agency’s use of hacking techniques, including an explanation of what it perceived the legal position to be at the time: see the Intercept
TOP SECRET STRAP1 Contents • What is CNE? • Why do CNE? • CNE Teams • Partners • Challenges • Contacts PTD "We penetrate targets' defences." This information is exempt un...
0.0

SSO dictionary – MONKEYROCKET

Document

Release Date: 2018-03-20
This extract is taken from an undated dictionary produced by NSA Special Source Operations: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
MONKEYROCKET (TS//SI//NF) A pending OAKSTAR access. Collection of full-take data sessions, and user data such as billing information and Internet Protocol addresses of selected CT targets utilizing...
0.0

OAKSTAR Weekly Update – 8 March 2013

Document

Release Date: 2018-03-20 Document Date: 2013-03-01
This internal NSA technical update from March 2013 describes a source of information codenamed MONEYROCKET, which provides data on users of the digital currency Bitcoin: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
TOP SECRET//COMINT//NOFORN OAKSTAR Weekly Update Program Highlights Week of: March 2-8, 2013 ETS: Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 TOP SECRET//COMI...
0.0

Draft NSA Inspector General’s report on STELLARWIND

Document

Release Date: 2014-03-12 Document Date: 2009-01-01
This draft report from 2009 sheds light on the legal reasoning behind the FISA Court’s 2007 Large Content order, which allowed warrantless wiretapping to continue: see the New York Times article How a Court Secretly Evolved, Extending U.S. Spies’ Reach, 12 March 2014.
TOP SECRET//STL W//COMINT/ORCON/NOFORN ST-09-0002 WORKING DRAFT OFFICE OF THE INSPECTOR GENERAL NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE 24 March 2009 (U) TABLE OF CONTENTS ...
0.0

STELLARWIND classification guide

Document

Release Date: 2014-03-12 Document Date: 2009-01-01
This classification guide from 2009 describes different elements of the Bush-era warrantless wiretapping programme. In particular, the guide casts light on the FISA Court’s permissive “Large Content” orders of January 2007. The revision of these expansive court orders in April that year led to the formulation of the August 2007 Protect America Act: see the […]
TOP SECRET//SI//ORCON/NOFORN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U//FOUO) STELLARWIND Classification Guide (2-400) Effective Date: 21 January 2 009 Kejch B. Alexande...
0.0

Capability Provided to Dutch Assists in Capture of Somali Pirates and Mapping of Piracy-Related Network

Document

Release Date: 2014-03-05 Document Date: 2013-01-25
This extract from an NSA briefing document dated 25 January 2013 – framed as an example of how to write up such reports from the agency’s Foreign Affairs Division (FAD) – describes how The Netherlands’ MIVD sought to cover a gap in the NSA’s signals intelligence capability: see the NRC Handelsblad article The secret role […]
TOP SECRET//SI//NOFORN FAD Success Stories Sample Each FAD success story should have the 4 sections: Title, Problem, Solution, and Impact. See below for sample. (U) Title: (TS 'SI//NF)...
0.0

Classification guide for ECI Pawleys (PAW)

Document

Release Date: 2014-10-10 Document Date: 2006-11-14
This 2006 NSA classification guide outlines the sensitivity of the agency’s clandestine human and electronic access to systems in order to “obtain cryptographic information and material”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE 0^ftUJDt54 SD7 AôEWf b<Kf' DTBb3LP HDEYI D0<XS«X 0*YR Jfi! (55^ BUH 5654 ...
0.0

Exceptionally Controlled Information (ECI) as of 12 September 2003

Document

Release Date: 2014-10-10 Document Date: 2003-09-12
This document outlines the NSA activities designated as “exceptionally controlled information”, which are only made known to a small number of US officials: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//ORCON//NOFORN//X1 NATIONAL SECURITY AGENCY/CENTRAL SERCURITY SERVICE EXCEPTIONALLY CONTROLLED INFORMATION (ECI) AS OF 12 SEPTEMBER 2003 CLASSIFIED BYNSA/CSS MANUAL 12...
0.0

1999 Agreement between the US and Israel

Document

Release Date: 2014-08-04 Document Date: 1999-07-15
This agreement, dated 15 July 1999, includes a preamble describing the development of signals intelligence cooperation between the US and Israel since the 1950s: see the Intercept article Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack, 4 August 2014.
TOP S E C R E T/HVCCO 1. (S) preamblei in 1968 President Johnson and Prime Minister Eshkol agreed that an intelligence exchange would take place between the United States and Israel. This und...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh