Filtered By
United Kingdom X
Countries Shared With [filter]
Results
1019 Total
0.0

DNI Processing of RINGBILL Access

Document

Release Date: 2016-11-16 Document Date: 2013-04-23
This NSA technical memo from April 2013 describes deployments of agency personnel to the facility codenamed TITANPOINTE: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
TOP SECRET//COMINT//REL TO USA, FVEY (Report generated on:4/23/2013 7:00:17AM ) Blarney-40-12 Work in Progress ECP Lead: Title of Change: DNI Processing of RINGBILL Access Site(s): TIT...
0.0

FAIRVIEW TDY Handbook

Document

Release Date: 2016-11-16 Document Date: 2013-02-06
This internal document for NSA employees dated 6 February 2013 provides a guide for visiting facilities related with the FAIRVIEW programme, including the TITANPOINTE building in New York City: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20301121 FAIRVIEW TDY Handbook (U) A guide for traveling to Site Last Updated: 6 February 2013 POC: I Derived From: NSA/CSSM 1-52 Date...
0.0

MHS FISINT Successfully Collects Israeli F-16 Heads Up Display

Document

Release Date: 2016-01-29 Document Date: 2008-02-01
This March 2008 post from the internal NSA newsletter SIDToday, describes the Menwith Hill station’s success in intercepting the video feeds from Israeli F-16 fighter jets and drones: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016.
TOP SECRET//COMINT/TALENT KEYHOLE// REL TO USA, FVEY published March 2008 MHS FISINT Successfully Collects Israeli F-16 Heads-Up Display (S//SI//REL) , Menwith Hill Station (F77) (S...
0.0

Tracking Targets on Online Social Networks

Document

Release Date: 2014-05-13 Document Date: 2009-09-01
This September 2009 NSA presentation outline some of the insights that analysts can gather from online social networks (OSNs) and show the XKeyScore interface for performing such searches: see the book No Place To Hide, 13 May 2014.
TOP SECRET//COMINT//REL TO USA, FVEY (S//SI//REL) Tracking Targets on Online Social Networks The overall classification of this briefing to TOP SECRET//COMINT//REL TO USA, FVEY Online...
0.0

HTTP Activity in XKEYSCORE

Document

Release Date: 2015-07-01 Document Date: 2009-03-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HTTP Activity in XKEYSCORE March 2009 Derived From: NSA/QSSM 1-52 Dated: 200701 (T Declassify On: 202911 ...
0.0

Email Address vs User Activity

Document

Release Date: 2015-07-01 Document Date: 2009-06-24
This NSA presentation from 24 June 2009 explains how to use the email search functionality within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 vs User Activity 24 June 2009 "»Ol 01 t » «4 Ha#f* IWt De rived From: NSA/CSSM 1-52 ...
0.0

SUSLOW monthly report for March 2013

Document

Release Date: 2015-04-19 Document Date: 2013-03-01
This monthly report from the NSA’s Special US Liaison Officer in Wellington outlines progress on FROSTBITE (BASILHAYDEN) – a project to infiltrate the Chinese diplomatic computer network: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
| TOP SECRET//SI//REL TO USA, FVEY (U//FOUO) SUSLOW Monthly Report for March 2013 (U) March highlights: (U) Intelligence update: o (S//SI//REL TO USA, FVEY) GCSB project FROSTBITE / TA...
0.0

NSA Extended Enterprise Report: July 2008

Document

Release Date: 2015-04-02 Document Date: 2008-07-08
This extract from a July 2008 NSA document describes Argentina as GCHQ’s “primary interest” in Latin America: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET//REL TO USA, AUS, CAN, GBR, NZL//20291123 Extended Enterprise Report: July 2008 This document summarises key activities of interest to GCHQ at the NSA Regional Cryptologic Center...
0.0

SUSLOW monthly report for March 2013

Document

Release Date: 2015-03-10 Document Date: 2013-03-01
This NSA document from March 2013 gives an update on GCSB activities, including the use of WARRIOR PRIDE malware against an ASEAN country and the Kim Dotcom case: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY (U//FOUO) SUSLOW Monthly Report for March 2013 (U) March highlights: - (U) Intelligence update: o (TS//SI//REL TO USA, FVEY) GCSB has a WARRIORPRIDE ca...
0.0

Roger Dingledine at NSA NOV 2007

Document

Release Date: 2013-10-04 Document Date: 2007-11-01
This NSA memo summarises a talk given by Roger Dingledine of the Tor Project on 1 November 2007: see the Secret NSA documents show campaign against Tor encrypted network, 4 October 2013.
TOP SECRET // COMINT // REL TO USA, AUS, CAN, GBR, NZL Roger Dingledine at NSA NOV 2007 From PE Contents * 1 (U) Talk by Roger Dingledine at NSA, 11/01/2007 at R&E (Sponsored by NSA RT) o 1...
0.0

BYZANTINE HADES: An Evolution of Collection

Document

Release Date: 2015-01-17 Document Date: 2010-06-01
This June 2010 NSA presentation for the SIGDEV conference describes efforts to trace a suspected Chinese cyber attack: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (S//REL)BYZANTINE HADES: An Evolution of Collection NTOC, V225 SIGINT Development Conference June 2010 TOP SECRET//COMINT//REL TO...
0.0

SNOWGLOBE: From Discovery to Attribution

Document

Release Date: 2015-01-17 Document Date: 2011-01-01
This 2011 CSEC presentation describes how the agency analysed SNOWGLOBE, which it considered “to be a state-sponsored CNO effort, put forth by a French intelligence agency”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Overall Classification: TOP SECRET II COMINT II REL TO CAN, AUS, GBR, NZL, USA ■ ■ Communications Security Establishment Canada SNOWGLOBE: From Discovery to Attribution CSEC CNT/Cyb...
0.0

TRANSGRESSION Overview for Pod58

Document

Release Date: 2015-01-17 Document Date: 2010-02-07
This 7 February 2010 NSA presentation outlines techniques to “discover, understand, evaluate, and exploit foreign CNE/CNA exploits”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOPSECRET//COMINT//REL TO USA, FVEY TRANSGRESSION Overview for Pod58 S31177 7 Feb 2010 DERIVED FROM: NSA/CSSM 1-52 DATED 08 JAN 2007 DECLASSIFY ON: 20320108 TOPSECRET//COMINT//REL T...
0.0

CyberCOP

Document

Release Date: 2015-01-12 Document Date: 2013-04-11
These three slides, taken from a 11 April 2013 NSA presentation show screenshots from a tool called CyberCOP, which appears to monitor botnets and the DDOS attacks they perform: see the NDR.de article Cyberkrieg: Wie gefährdet ist Deutschland?, 12 January 2015.
TOP SECRET//SI//REL TO USA, FVEY CYBER COP CDOSG Apr 11, 2013 CyberCOP Product Manager Overall Classification: TOP SECRET//SI//REL TO USA,FVEY TOP SECRET//SI//REL TO USA, FVEY ...
0.0

TLS Trends: A roundtable discussion on current usage and future directions

Document

Release Date: 2014-12-28
This CSEC presentation from 2012 outlines the agency’s capabilities against SSL encryption at that point: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO CAN, AUS, GBR, NZL, USA rs TLS Trends: A roundtable discussion on current usage and future directions Communications Security Establishment Canada (CSEC) ...
0.0

SPIN 15 VPN Story

Document

Release Date: 2014-12-28
This undated NSA document gives information on ongoing development of attacks against VPNs: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 DRAFT SPIN 15 VPN Story VPN has two thrusts, one has high mission impacts and the other has high performance and functionalit...
0.0

VALIANTSURF

Document

Release Date: 2014-12-28
These three undated NSA slides provide an overview of the VALIANTSURF system: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, FVEY VALIANTSURF (VS): VALIANTSURF Capability Level Beneficiaries CES & LONGHAUL OTP & SSG TOPIs Link Access CES A Key Recovery, no on-site decrypti...
0.0

GALLANTWAVE

Document

Release Date: 2014-12-28
This undated presentation from NSA’s Digital Network Crypt Applications (DNCA) concerns the GALLANTWAVE tool, which decrypts VPN traffic within LONGHAUL: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL GALLANTWAVE@scale GALLANTWAVE @ volume Requirements @Scale Deploy more widely - Leverage peering with partner @Volume Increas...
0.0

Making Network Sense of the encryption problem

Document

Release Date: 2014-12-13 Document Date: 2011-01-01
This 2011 presentation by the head of GCHQ’s Network Analysis Centre outlines the agency’s interest in exploiting telecommunications companies, namely to “get at the data before it is encrypted”: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
TOP SECRET STRAP 2 // REL TO USA, AUS, CAN, GBR, NZL ------m/\cz NETWORK ^IM^ySIS CSfSJTRe Making Network Sense of the encryption problem Roundtable Head of GCHQ NAC This info...
0.0

Exceptionally Controlled Information (ECI) Compartments January 2013

Document

Release Date: 2014-10-10 Document Date: 2013-01-01
This NSA document from January 2013 lists the codenames of those agency activities sufficiently sensitive to qualify as “exceptionally controlled information”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.ah
CONFIDENTIAL//REL TO USA, AUS, CAN, GBR, NZL (U) Exceptionally Controlled Information (ECI) Compartments January 2013 ECI Name and Trigraph Organization Control Authority AMBULANT AMB...
0.0

The Art of Deception: Training for a New Generation of Online Covert Operations

Document

Release Date: 2014-02-25
This training presentation from GCHQ’s Human Science Operations Cell (HSOC) and Joint Threat Research Intelligence Group (JTRIG) describes the elements of “online covert action”: see the Intercept article How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations, 25 February 2014.
impress SI//REL TO USA, FVEY SECRET//SI//REL TO USA, FVEY SECRET//SI//RELTO USA, FVEY SECRET//SI//RELTO USA, FVEY JTRIG Online HUMINT Strategie Influence Disru ption and CNA ...
0.0

MHS and GCHQ “Get in the Game with Target Development for World of Warcraft Online Gaming”

Document

Release Date: 2013-12-09 Document Date: 2008-01-01
An NSA document from 2008 shows that efforts to collect data from players of World of Warcraft started that year with the development of specialised exploits by GCHQ. The operation was based at Menwith Hill in the UK: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 […]
TOP SECRET//COMINT//REL TO USA, FVEY (TS//SI//REL) MHS and GCHQ “Get in the Game” with Target Development for World of Warcraft Online Gaming (TS//SI//REL) Although online gaming may seem...
0.0

Peeling Back the Layers of Tor with EGOTISTICALGIRAFFE

Document

Release Date: 2013-10-04 Document Date: 2007-01-08
This Tailored Access Operations presentation shows how the NSA uses a technique codenamed EgotisticalGiraffe to attack Tor users through vulnerable computer software: see the Guardian article NSA and GCHQ target Tor network that protects anonymity of web users, 4 October 2013.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (TS//SI//REL) Peeling Back the Layers of TOR with EGOTISTICALGIRAFFE ■¿cCE&v.^ Overall Classification This briefing is classified ...
0.0

Makin' It Easy

Document

Release Date: 2016-05-16 Document Date: 2003-06-23
How to make SIDtoday your home page in Netscape and Explorer.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Makin' It Easy<br>FROM: LTC <br> USA and<br>Military Integration Office, Plans D...
0.0

When Meeting Customer Needs Means Defending the Nation

Document

Release Date: 2016-05-16 Document Date: 2003-04-16
Introduction to SID’s Customer Relationships Directorate series and summary of future articles.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) When Meeting Customer Needs Means Defending the Nation<br>FROM:<br>Acting Chief,...
0.0

ICAP Call for Applications

Document

Release Date: 2016-05-16 Document Date: 2003-04-07
Call for applications for the Intelligence Community Assignment Program rotational assignments for civilian employees.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) ICAP Call for Applications<br>FROM: NSA ICAP Program Manager<br>Unknown<br>Run D...
0.0

The Matrix is Here...Original NIPF Version, Not "Reloaded"

Document

Release Date: 2016-05-16 Document Date: 2003-05-15
National Intelligence Priorities Framework is released to the intelligence community.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(C) The Matrix is Here...Original NIPF Version, Not "Reloaded"<br>FROM:<br>NSA Repre...
0.0

Data Flow Manager: The Data Fairy?

Document

Release Date: 2016-05-16 Document Date: 2003-08-20
Data flow managers understand data and the processing that ensures that the collected signal is converted to data and intelligence and delivered to customers.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Data Flow Manager: The Data Fairy?<br>FROM:<br>and<br>Unknown<br>Run Date:...
0.0

Coming Soon: Getting to Know the SID Leadership Team

Document

Release Date: 2016-05-16 Document Date: 2003-06-13
Promo for a series on the new SID leadership team.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Coming Soon: Getting to Know the SID Leadership Team<br>FROM: SIGINT Communicati...
0.0

New SID Deputy Directorate Leadership Announced

Document

Release Date: 2016-05-16 Document Date: 2003-04-21
Announcement of various leadership changes.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) New SID Deputy Directorate Leadership Announced<br>FROM: SIGINT Communicat...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh