Filtered By
United StatesX
Countries Shared With [filter]
Results
261 Total
1.0

Coffee with JOCCP

Document

Document Date: 2003-06-09Release Date: 2016-05-16
Junior Officer Cryptologic Career Program offers a 36-month program to develop military SIGINT officers.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Coffee with JOCCP<br>FROM: Sigint Communications<br>Unknown<br>Run Date: 06/09/2...
1.0

Dynamic Methods of Interaction with New and Existing Customers

Document

Document Date: 2003-04-22Release Date: 2016-05-16
After 9/11, SID suddenly got an influx of requests from previously minor customers (like the departments of Interior and Agriculture), acquired many new customers, and had to interact differently with law enforcement. In response, CRD designed new products to be more flexible with secret documents (allowing them to be accessed outside of SCIFs, on mobile devices, etc.).
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Dynamic Methods of Interaction with New and Existing Customers<br>FROM:<br>Actin...
1.0

SIGINT Development: A Network of Discovery Networks

Document

Document Date: 2003-06-11Release Date: 2016-05-16
An article describes the mission and recent activities of SIGINT Development, an expanding mission of NSA.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) SIGINT Development: A Network of Discovery Networks<br>FROM: SIGINT Communicatio...
1.0

What is JOURNEYMAN?

Document

Document Date: 2003-05-07Release Date: 2016-05-16
Introduction of a new content management system, JOURNEYMAN, for authoring and distributing SIGINT information.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) What is JOURNEYMAN?<br>FROM:<br>Deputy Chief, Customer Response<br>Run Dat...
1.0

Welcome to SIDtoday

Document

Document Date: 2003-03-31Release Date: 2016-05-16
Introduction to the new SIDtoday website on March 31, 2003.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Welcome to SIDtoday<br>FROM: the Sigint Communications Team<br>Unknown<br>Run Da...
1.0

Last QUICKMASK Training Today

Document

Document Date: 2003-04-02Release Date: 2016-05-16
A reminder about training sessions for the QUICKMASK system for emergency planning and preparedness.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Last QUICKMASK Training Today<br>FROM: the Sigint Communications Team<br>U...
1.0

SID's Promotion Process

Document

Document Date: 2003-05-14Release Date: 2016-05-16
SID’s chief of staff writes about the employee promotion and awards system and the importance of productive feedback.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) SID's Promotion Process<br>FROM: Charles Berlin<br>SID Chief of Staff<br>Run Dat...
1.0

Another Top Iraqi Captured

Document

Document Date: 2003-06-27Release Date: 2016-05-16
SIGINT played a very prominent role in the capture of the “ace of diamonds” from CENTCOM’s card deck representing its list of most wanted Iraqis.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) Another Top Iraqi Captured<br>FROM:<br>Chief, Geospatial Exploitation<br>Run Dat...
1.0

Data Flow Manager: The Data Fairy?

Document

Document Date: 2003-08-20Release Date: 2016-05-16
Data flow managers understand data and the processing that ensures that the collected signal is converted to data and intelligence and delivered to customers.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Data Flow Manager: The Data Fairy?<br>FROM:<br>and<br>Unknown<br>Run Date:...
1.0

ConSIDer This: What Does It Mean to Downgrade COMINT?

Document

Document Date: 2003-08-05Release Date: 2016-05-16
Explanation of the process of downgrading information’s classification level and who at NSA performs the downgrading task.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) ConSIDer This: What Does It Mean to Downgrade<br>COMINT?<br>FROM: SIGINT C...
1.0

When Meeting Customer Needs Means Defending the Nation

Document

Document Date: 2003-04-16Release Date: 2016-05-16
Introduction to SID’s Customer Relationships Directorate series and summary of future articles.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) When Meeting Customer Needs Means Defending the Nation<br>FROM:<br>Acting Chief,...
1.0

Rebroadcast of View from the Iraqi Front

Document

Document Date: 2003-06-30Release Date: 2016-05-16
Brig. Gen. Zahner’s speech to NSA on Operation Iraqi Freedom will be rebroadcast multiple times each day for a week on an internal video channel.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Rebroadcast of View from the Iraqi Front<br>FROM: SIGINT Communications<br...
1.0

The KRYPTOS Society

Document

Document Date: 2003-05-09Release Date: 2016-05-16
The KRYPTOS Society was established in 1981 to “promote interest in cryptoanalysis” and “excellence in the cryptologic community.” It had 250 members in 2003, has local chapters in second-party spy agencies like GCHQ, and organizes competitions, monthly lectures, etc.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) The KRYPTOS Society<br>FROM:<br>KRYPTOS Society President<br>Run Date: 05/09/200...
1.0

ConSIDer This: Military Rank Abbreviations

Document

Document Date: 2003-12-17Release Date: 2016-05-16
A handy guide to military rank abbreviations.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) ConSIDer This: Military Rank Abbreviations<br>FROM: SIGINT Communications<br>Unk...
1.0

Building the ARC (Professional Skills Inventory)

Document

Document Date: 2003-06-16Release Date: 2016-05-16
Cryptologic workforce will be required to populate an intelligence community database (Analytic Resources Catalog) with information on expertise.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) Building the ARC (Professional Skills Inventory)<br>FROM: The DANCEHALL Te...
1.0

The Crypto-Linguistic Association (CLA)

Document

Document Date: 2003-05-16Release Date: 2016-05-16
The Crypto-Linguistic Association was established in 1965 to “support the continuing development and advancement of agency language analysts.” It had 200 members in 2003. Events included lectures, award ceremonies, and a luncheon with the “director of the Klingon Institute.”
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U) The Crypto-Linguistic Association (CLA)<br>FROM: the CLA<br>Unknown<br>Run Date:...
1.0

Discovery SIGINT Targeting Scenarios and Compliance

Document

Document Date: 2011-07-01Release Date: 2014-02-18
This page from the NSA intranet dated July 2011 supplies advice from the NSA Offices of General Counsel (OGC) and Oversight and Compliance (NOC) on the admissibility of targeting strategies against the users of popular websites (including WikLeaks and the Pirate Bay): see the Intercept article Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed […]
TOP SECRET//SI//REL TO USA, FVEY Navigation Main Page Community portal Recent changes Random page Help Toolbox What links here Related changes Upload file Special pages Printab...
1.0

Notes for Dutch SIGINT/Cyber Analytic Exchange

Document

Document Date: 2013-02-14Release Date: 2013-11-30
This partially redacted report dated 14 February 2013 summarises a meeting between the NSA and the Dutch intelligence agencies MIVD and AIVD: see the NRC Handelsblad article Dutch intelligence agency AIVD hacks internet fora, 30 November 2013.
TOP SECRET//SI* REL TO USA. NLD Notes for Dutch SIGEN’T/Cvber Analvric Exchange w m- CT Mt\'D AIVD AIVD a rvi> ■ AIVD 14 Februarv 2013 Organization of C'vber in the Neth...
1.0

Formatting internal memos

Document

Document Date: 2005-07-05Release Date: 2014-07-09
This excerpt from a 2005 NSA document demonstrating to personnel how to format internal memos shows how anti-Muslim prejudice has found its way into official documents: see the Intercept article Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On, 9 July 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZLV/20291123 05 July 2005 E-mail: address: badASGguy@holmail.com Identity: Mohammed Raghcad (ASG Sales Associate) ASG background (below is...
1.0

Classification guide for ECI Pawleys (PAW)

Document

Document Date: 2006-11-14Release Date: 2014-10-10
This 2006 NSA classification guide outlines the sensitivity of the agency’s clandestine human and electronic access to systems in order to “obtain cryptographic information and material”: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE 0^ftUJDt54 SD7 AôEWf b<Kf' DTBb3LP HDEYI D0<XS«X 0*YR Jfi! (55^ BUH 5654 ...
1.0

VS MALIBU IKE And ESP Metadata Flows

Document

Release Date: 2014-12-28
These four undated NSA slides show a workflow for defeating VPN encryption: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL VS MALIBU IKE And ESP Metadata Flows /20291123 TUBE TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//COMIN...
1.0

AURORAGOLD

Document

Document Date: 2011-01-01Release Date: 2014-12-04
This 4-page NSA document, presented at a Five Eyes SIGDEV conference 2011, gives an overview of the AURORAGOLD (AG) project, in which technical intelligence is gathered to ensure future agency access to mobile phone networks worldwide: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (u//fouo) AURORAGOLD (S//SI//REL) Project Overview: The mission of the AURORAGOLD (AG) project is to maintain data about international GSM/UMT...
1.0

NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks

Document

Document Date: 2010-01-01Release Date: 2013-09-16
These three slides from an NSA presentation made for the 2010 SIGDEV conference show that the agency is actively targeting payments networks: see the Der Spiegel article ‘Follow the Money’: NSA Monitors Financial World, 13 September 2013.
(S//REL TO USA, FVEY) NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks (U//FOUO) NSA, Network Analysis Center 2010 SIGDEV Conference 09/13/13 SE...
1.0

Roger Dingledine at NSA NOV 2007

Document

Document Date: 2007-11-01Release Date: 2013-10-04
This NSA memo summarises a talk given by Roger Dingledine of the Tor Project on 1 November 2007: see the Secret NSA documents show campaign against Tor encrypted network, 4 October 2013.
TOP SECRET // COMINT // REL TO USA, AUS, CAN, GBR, NZL Roger Dingledine at NSA NOV 2007 From PE Contents * 1 (U) Talk by Roger Dingledine at NSA, 11/01/2007 at R&E (Sponsored by NSA RT) o 1...
1.0

SUSLOW monthly report for March 2013

Document

Document Date: 2013-03-01Release Date: 2015-03-10
This NSA document from March 2013 gives an update on GCSB activities, including the use of WARRIOR PRIDE malware against an ASEAN country and the Kim Dotcom case: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY (U//FOUO) SUSLOW Monthly Report for March 2013 (U) March highlights: - (U) Intelligence update: o (TS//SI//REL TO USA, FVEY) GCSB has a WARRIORPRIDE ca...
1.0

HIDDENSALAMANDER: Alerting and Characterization of Botnet Activity in TURMOIL

Document

Release Date: 2015-01-17
This undated NSA presentation describes techniques for detecting botnets: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
P SECRET//COMINT//REL TO USA, FVEY HIDDENSALAMANDER Alerting and Characterization of _____iyiissiQr\] CAPABILIT, ES Botnet Activity in TURMOIL Briefers: SECRET//REL TO USA, FV...
1.0

Finding and Querying on Document Metadata

Document

Document Date: 2009-04-01Release Date: 2015-07-01
This NSA presentation from April 2009 explains how analysts can make use of document metadata available through XKeyScore, together with worked examples and screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Finding and Querying on Document Metadata tooz|/ 1 Booz|Allen| Hamilton Sigint Development Support / SIGINT Technica...
1.0

HTTP Activity vs. User Activity

Document

Document Date: 2009-06-19Release Date: 2015-07-01
This NSA presentation from 19 June 2009 explains the metadata capabilities of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL m V HTTP Activity vs User Activity 19 June 2009 Derived From: NSA/CSSM 1-52 Bated :l2007i MM TOP SEC...
1.0

Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints

Document

Document Date: 2010-05-01Release Date: 2015-07-01
This 61-page NSA presentation from May 2010 provides analysts with a guide to tracking individuals within XKeyScore using the system’s fingerprint capability: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL Introduction to Context Sensitive Scanning with X-KEYSCORE Fingerprints May 2010 TOP SECRET //COMINT //REL TO USA, AUS, CAN, GBR, NZL ...
1.0

MHS FISINT Successfully Collects Israeli F-16 Heads Up Display

Document

Document Date: 2008-02-01Release Date: 2016-01-29
This March 2008 post from the internal NSA newsletter SIDToday, describes the Menwith Hill station’s success in intercepting the video feeds from Israeli F-16 fighter jets and drones: see the Intercept article Spies in the Sky: Israeli Drone Feeds Hacked by British and American Intellience, 29 January 2016.
TOP SECRET//COMINT/TALENT KEYHOLE// REL TO USA, FVEY published March 2008 MHS FISINT Successfully Collects Israeli F-16 Heads-Up Display (S//SI//REL) , Menwith Hill Station (F77) (S...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh