Results
1029 Total
0.0
MHS FISINT Successfully Collects Israeli F-16 Heads Up Display
Document
Release Date:
2016-01-29
Document Date:
2008-02-01
This March 2008 post from the internal NSA newsletter SIDToday, describes the Menwith Hill station’s success in intercepting the video feeds from Israeli F-16 fighter jets and drones: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016.
TOP SECRET//COMINT/TALENT KEYHOLE// REL TO USA, FVEY
published March 2008
MHS FISINT Successfully Collects Israeli F-16 Heads-Up Display
(S//SI//REL)
, Menwith Hill Station (F77)
(S...
0.0
BYZANTINE HADES: An Evolution of Collection
Document
Release Date:
2015-01-17
Document Date:
2010-06-01
This June 2010 NSA presentation for the SIGDEV conference describes efforts to trace a suspected Chinese cyber attack: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL
(S//REL)BYZANTINE HADES: An
Evolution of Collection
NTOC, V225
SIGINT Development Conference
June 2010
TOP SECRET//COMINT//REL TO...
0.0
SNOWGLOBE: From Discovery to Attribution
Document
Release Date:
2015-01-17
Document Date:
2011-01-01
This 2011 CSEC presentation describes how the agency analysed SNOWGLOBE, which it considered “to be a state-sponsored CNO effort, put forth by a French intelligence agency”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Overall Classification: TOP SECRET II COMINT II REL TO CAN, AUS, GBR, NZL, USA
■ ■ Communications Security
Establishment Canada
SNOWGLOBE:
From Discovery to Attribution
CSEC CNT/Cyb...
0.0
TRANSGRESSION Overview for Pod58
Document
Release Date:
2015-01-17
Document Date:
2010-02-07
This 7 February 2010 NSA presentation outlines techniques to “discover, understand, evaluate, and exploit foreign CNE/CNA exploits”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOPSECRET//COMINT//REL TO USA, FVEY
TRANSGRESSION Overview for Pod58
S31177
7 Feb 2010
DERIVED FROM: NSA/CSSM 1-52
DATED 08 JAN 2007
DECLASSIFY ON: 20320108
TOPSECRET//COMINT//REL T...
0.0
CyberCOP
Document
Release Date:
2015-01-12
Document Date:
2013-04-11
These three slides, taken from a 11 April 2013 NSA presentation show screenshots from a tool called CyberCOP, which appears to monitor botnets and the DDOS attacks they perform: see the NDR.de article Cyberkrieg: Wie gefährdet ist Deutschland?, 12 January 2015.
TOP SECRET//SI//REL TO USA, FVEY
CYBER
COP
CDOSG
Apr 11, 2013
CyberCOP Product Manager
Overall Classification: TOP SECRET//SI//REL TO USA,FVEY
TOP SECRET//SI//REL TO USA, FVEY
...
0.0
TLS Trends: A roundtable discussion on current usage and future directions
Document
Release Date:
2014-12-28
This CSEC presentation from 2012 outlines the agency’s capabilities against SSL encryption at that point: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO CAN, AUS, GBR, NZL, USA
rs
TLS Trends:
A roundtable discussion on current
usage and future directions
Communications Security Establishment Canada (CSEC)
...
0.0
NSA Extended Enterprise Report: July 2008
Document
Release Date:
2015-04-02
Document Date:
2008-07-08
This extract from a July 2008 NSA document describes Argentina as GCHQ’s “primary interest” in Latin America: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET//REL TO USA, AUS, CAN, GBR, NZL//20291123
Extended Enterprise Report: July 2008
This document summarises key activities of interest to GCHQ at the NSA
Regional Cryptologic Center...
0.0
SUSLOW monthly report for March 2013
Document
Release Date:
2015-03-10
Document Date:
2013-03-01
This NSA document from March 2013 gives an update on GCSB activities, including the use of WARRIOR PRIDE malware against an ASEAN country and the Kim Dotcom case: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY
(U//FOUO) SUSLOW Monthly Report for March 2013
(U) March highlights:
- (U) Intelligence update:
o (TS//SI//REL TO USA, FVEY) GCSB has a WARRIORPRIDE ca...
0.0
Roger Dingledine at NSA NOV 2007
Document
Release Date:
2013-10-04
Document Date:
2007-11-01
This NSA memo summarises a talk given by Roger Dingledine of the Tor Project on 1 November 2007: see the Secret NSA documents show campaign against Tor encrypted network, 4 October 2013.
TOP SECRET // COMINT // REL TO USA, AUS, CAN, GBR, NZL
Roger Dingledine at NSA NOV 2007
From PE
Contents
* 1 (U) Talk by Roger Dingledine at NSA, 11/01/2007 at R&E (Sponsored by NSA RT)
o 1...
0.0
SUSLOW monthly report for March 2013
Document
Release Date:
2015-04-19
Document Date:
2013-03-01
This monthly report from the NSA’s Special US Liaison Officer in Wellington outlines progress on FROSTBITE (BASILHAYDEN) – a project to infiltrate the Chinese diplomatic computer network: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
| TOP SECRET//SI//REL TO USA, FVEY
(U//FOUO) SUSLOW Monthly Report for March 2013
(U) March highlights:
(U) Intelligence update:
o (S//SI//REL TO USA, FVEY) GCSB project FROSTBITE / TA...
0.0
Tracking Targets on Online Social Networks
Document
Release Date:
2014-05-13
Document Date:
2009-09-01
This September 2009 NSA presentation outline some of the insights that analysts can gather from online social networks (OSNs) and show the XKeyScore interface for performing such searches: see the book No Place To Hide, 13 May 2014.
TOP SECRET//COMINT//REL TO USA, FVEY
(S//SI//REL) Tracking
Targets on Online
Social Networks
The overall classification of this briefing to TOP SECRET//COMINT//REL TO USA, FVEY
Online...
0.0
HTTP Activity in XKEYSCORE
Document
Release Date:
2015-07-01
Document Date:
2009-03-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123
HTTP Activity in
XKEYSCORE
March 2009
Derived From: NSA/QSSM 1-52
Dated: 200701 (T
Declassify On: 202911
...
0.0
Email Address vs User Activity
Document
Release Date:
2015-07-01
Document Date:
2009-06-24
This NSA presentation from 24 June 2009 explains how to use the email search functionality within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123
vs User Activity
24 June 2009
"»Ol 01
t » «4
Ha#f* IWt
De rived From: NSA/CSSM 1-52 ...
0.0
DNI Processing of RINGBILL Access
Document
Release Date:
2016-11-16
Document Date:
2013-04-23
This NSA technical memo from April 2013 describes deployments of agency personnel to the facility codenamed TITANPOINTE: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
TOP SECRET//COMINT//REL TO USA, FVEY
(Report generated on:4/23/2013 7:00:17AM )
Blarney-40-12 Work in Progress ECP Lead:
Title of Change: DNI Processing of RINGBILL Access
Site(s): TIT...
0.0
FAIRVIEW TDY Handbook
Document
Release Date:
2016-11-16
Document Date:
2013-02-06
This internal document for NSA employees dated 6 February 2013 provides a guide for visiting facilities related with the FAIRVIEW programme, including the TITANPOINTE building in New York City: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20301121
FAIRVIEW TDY Handbook
(U) A guide for traveling to Site
Last Updated: 6 February 2013
POC: I
Derived From: NSA/CSSM 1-52
Date...
0.0
SPIN 15 VPN Story
Document
Release Date:
2014-12-28
This undated NSA document gives information on ongoing development of attacks against VPNs: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108
DRAFT
SPIN 15 VPN Story
VPN has two thrusts, one has high mission impacts and the other has high performance
and functionalit...
0.0
VALIANTSURF
Document
Release Date:
2014-12-28
These three undated NSA slides provide an overview of the VALIANTSURF system: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, FVEY
VALIANTSURF (VS):
VALIANTSURF Capability Level Beneficiaries
CES & LONGHAUL OTP & SSG TOPIs Link Access CES
A Key Recovery, no on-site decrypti...
0.0
GALLANTWAVE
Document
Release Date:
2014-12-28
This undated presentation from NSA’s Digital Network Crypt Applications (DNCA) concerns the GALLANTWAVE tool, which decrypts VPN traffic within LONGHAUL: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL
GALLANTWAVE@scale
GALLANTWAVE @ volume
Requirements
@Scale
Deploy more widely
- Leverage peering with partner
@Volume
Increas...
0.0
MHS and GCHQ “Get in the Game with Target Development for World of Warcraft Online Gaming”
Document
Release Date:
2013-12-09
Document Date:
2008-01-01
An NSA document from 2008 shows that efforts to collect data from players of World of Warcraft started that year with the development of specialised exploits by GCHQ. The operation was based at Menwith Hill in the UK: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 […]
TOP SECRET//COMINT//REL TO USA, FVEY
(TS//SI//REL) MHS and GCHQ “Get in the Game” with Target Development for
World of Warcraft Online Gaming
(TS//SI//REL) Although online gaming may seem...
0.0
SIGINT Monitors Global Spread of Avian Flu
Document
Release Date:
2016-12-07
Document Date:
2005-10-28
NSA closely monitored the 2004 spread of avian influenza in preparation for a possible pandemic. "As our IC colleagues have said, containing the threat of infectious disease comes down to 'detection, detection, detection. SIGINT is probably going to get it first,'" the author writes.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) SIGINT Monitors Global Spread of Avian Flu<br>FROM:<br>Assistant SINIO for ...
0.0
The Art of Deception: Training for a New Generation of Online Covert Operations
Document
Release Date:
2014-02-25
This training presentation from GCHQ’s Human Science Operations Cell (HSOC) and Joint Threat Research Intelligence Group (JTRIG) describes the elements of “online covert action”: see the Intercept article How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations, 25 February 2014.
impress
SI//REL TO USA, FVEY
SECRET//SI//REL TO USA, FVEY
SECRET//SI//RELTO USA, FVEY
SECRET//SI//RELTO USA, FVEY
JTRIG
Online HUMINT Strategie Influence
Disru ption and CNA
...
0.0
Exceptionally Controlled Information (ECI) Compartments January 2013
Document
Release Date:
2014-10-10
Document Date:
2013-01-01
This NSA document from January 2013 lists the codenames of those agency activities sufficiently sensitive to qualify as “exceptionally controlled information”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.ah
CONFIDENTIAL//REL TO USA, AUS, CAN, GBR, NZL
(U) Exceptionally Controlled Information (ECI) Compartments
January 2013
ECI Name and Trigraph Organization Control Authority
AMBULANT AMB...
0.0
Making Network Sense of the encryption problem
Document
Release Date:
2014-12-13
Document Date:
2011-01-01
This 2011 presentation by the head of GCHQ’s Network Analysis Centre outlines the agency’s interest in exploiting telecommunications companies, namely to “get at the data before it is encrypted”: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
TOP SECRET STRAP 2 // REL TO USA, AUS, CAN, GBR, NZL
------m/\cz
NETWORK ^IM^ySIS CSfSJTRe
Making Network Sense of
the encryption problem
Roundtable
Head of GCHQ NAC
This info...
0.0
The Life of an Exec (repost)
Document
Release Date:
2017-04-24
Document Date:
2004-11-26
(Repost) The executive assistant to SIGINT Director Quirk describes a "daily roller coaster ride."
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) The Life of an Exec (repost)<br>FROM: <br>Former Interim Civilian Executive Ass...
0.0
Prudence is a Very Winning Virtue!
Document
Release Date:
2017-04-24
Document Date:
2004-11-18
"Prudence" ”” the newly named OPSEC dragon mascot ”” will begin dispensing operational security advice throughout SID. The dragon lists the five questions staffers should answer to threat model for their individual jobs.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Prudence is a Very Winning Virtue!<br>FROM: 'Prudence' the OPSEC Dragon<br>(and...
0.0
Conference Eyes Data Flow Among Second Parties
Document
Release Date:
2017-04-24
Document Date:
2004-11-16
The Five Eyes partners held a conference to discuss the standardization of data formats to ease the exchange of voice, text, fax, and digital network intelligence.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Conference Eyes Data Flow Among Second Parties<br>FROM: <br>Chief, Data Flow an...
0.0
NSA and GCHQ Senior Leaders Hold Annual Talks
Document
Release Date:
2017-04-24
Document Date:
2004-11-12
The NSA and GCHQ leadership held their annual Joint Management Review and recommitted themselves to working together on SIGINT missions.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) NSA and GCHQ Senior Leaders Hold Annual Talks<br>FROM: <br>FAD/Country Desk Off...
0.0
Prototype Collection Systems Deployed to Iraq
Document
Release Date:
2017-04-24
Document Date:
2004-11-08
Three prototypes of a new signal discovery system, SIGINT T-VO, have been installed at bases in Baghdad. The system records radio frequency signals so that analysts can find and exploit previously undiscovered VHF/UF signals and analyze events like IED detonations to detect signals that might be related to anti-Iraqi forces communications.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) Prototype Collection Systems Deployed to Iraq<br>FROM: MAJ Eric Toler, USA<...
0.0
Friedman Presentation: Career Opportunities at NSA's Field Headquarters
Document
Release Date:
2017-04-24
Document Date:
2004-11-05
As part of the agency's Mission Alignment initiative, a recruitment event for opportunities at NSA field headquarters in Georgia, Texas, Colorado, and Hawaii will be held.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) Friedman Presentation: Career Opportunities at NSA's<br>Field Headquarter...
0.0
The Geographic Resource Center Has Info You Need: Maps, Data and Research
Document
Release Date:
2017-04-24
Document Date:
2004-10-29
The Geographic Resource Center is NSA's map library, which provides hard-copy and digital maps and geographic data to analysts at NSA headquarters and around the world.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) The Geographic Resource Center Has Info You Need: Maps, Data<br>and Research<br...