No Filters
Add Filters
From sidebar or searchbox
Results
748 Total

Visit Precis: Bernard Barbier

Document

Document Date: 2013-04-12Release Date: 2013-10-25
This background document for a visit to NSA by offcials from France’s Directorate for External Security and National Systems Security shows that US involvement in a May 2012 cyber-attack on the French Presidency was one of the issues up for discussion: see Le Monde article The NSA’s intern inquiry about the Elysée hacking revealed, 25 […]
TOP SECRET//SI//IMOFORN MSIT PRÉCIS BERNARD B ARBIER (PHONETIC: bear-NARbar-BYAY) Technical Director Directorate for External Security (DGSE), France PATRICK PAILLOUX (PHONETI...

Close Access Sigads

Document

Document Date: 2010-09-10Release Date: 2013-10-21
This NSA document from 10 September 2010 details operations against foreign embassies, concluding with a glossary of tools and tactics. Earlier versions of this docoument that only contained some of the operations conducted were published in l’Espresso on 5 December 2013 and in Le Monde on 21 October 2013: see the book No Place to […]
Page 145 10 Sep 2010 CLOSE ACCESS SIGADS CLOSE ACCESS SIGADS All Close Access domestic collection uses the US-3136 SIGAD with a unique two-letter suffix for each target location and m...

France – Last 30 days

Document

Document Date: 2013-01-01Release Date: 2013-10-21
This Boundless Informant slide shows the number of French phone records collected day-by-day between 10 December 2012 and 8 January 2013: see the Le Monde article France in the NSA’s crosshair: phone networks under surveillance, 21 October 2013.
FRANCE - Last 30 Days □ DNI Q DNR 7.000. 000 6.000. 000 5.000. 000 4.000. 000 3.000. 000 2.000. 000 1,000,000 0 Signal Profile Most Volume Top 5 Techs h pcs ...

Computer-Network Exploitation Successes South of the Border

Document

Document Date: 2010-11-15Release Date: 2013-10-20
This extract from a 15 November 2010 NSA memo reveals that the agency has been able to access Mexican President Felipe Calderon’s email account: see the Der Spiegel article NSA Accessed Mexican President’s Email, 20 October 2013.
(TS//SI//REL) Computer-Network Exploitation Successes South of the Border I FROM: .* BA. Chief, NSA-Texas TAO/Requiremcnts & Targeting (FTS327) Run Date: 11/15/2010 rS//SI//REL) TAO-en...

SSO Collection Optimization overview

Document

Document Date: 2012-01-01Release Date: 2013-10-14
This NSA Special Source Operations presentation describes the agency’s collection of webmail address books and contact lists: see the Washington Post article NSA collects millions of e-mail address books globally, 14 October 2013.
TOP SECRET//SI//NOFORN SSO Collection Optimization Core SSO Team: TOP SECRET//SI//NOFORN TOP SECRET//SI//NOFORN Address Books • Email address books for most major webmail are col...

Content acquisition optimisation

Document

Release Date: 2013-10-14
This Special Source Operations presentation describes the NSA’s problems with overcollection of data from email address books and buddy lists: see the Washington Post article NSA collects millions of e-mail address books globally, 14 October 2013.
TOP SECRET//SI//NOFORN Content Acquisition Optimization TOP SECRET//SI//NOFORN TOP SECRET//SI//NOFORN Yahoo Webmessenger • Update data sent to individuals logged into Yahoo's Instan...

CSEC – Advanced Network Tradecraft

Document

Document Date: 2012-06-01Release Date: 2013-10-06
This CSEC presentation from June 2012, slides from which were first published by Fantástico in October 2013, describes the Canadian agency’s use of the Olympia suite of analytic tools in the context of spying on Brazil’s Ministry of Mines and Energy: see the Globe and Mail article How CSEC became an electronic spying giant, 30 […]
1-b5263447e8.jpg: AND THEY SAID TO THE TITANS: « WATCH OUT OLYMPIANS IN THE HOUSE! » CSEC - Advanced Network Tradecraft SD Conference June 2012 Overall Classification: TOP SECRET//SI2-6...

Roger Dingledine at NSA NOV 2007

Document

Document Date: 2007-11-01Release Date: 2013-10-04
This NSA memo summarises a talk given by Roger Dingledine of the Tor Project on 1 November 2007: see the Secret NSA documents show campaign against Tor encrypted network, 4 October 2013.
TOP SECRET // COMINT // REL TO USA, AUS, CAN, GBR, NZL Roger Dingledine at NSA NOV 2007 From PE Contents * 1 (U) Talk by Roger Dingledine at NSA, 11/01/2007 at R&E (Sponsored by NSA RT) o 1...

Tor Stinks

Document

Document Date: 2012-06-01Release Date: 2013-10-04
A presentation entitled ‘Tor Stinks’ outlines the capabilities and difficulties of attacking the Tor anonymity network: see the Guardian article NSA and GCHQ target Tor network that protects anonymity of web users, 4 October 2013.
TOP SECRET//COMINT// REL FVEY Stinks JUN 2012 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20370101 TOP SECRET//COMINT// REL FVEY TOP SECRET//COMINT// REL FVEY To...

2006 report on Tor encrypted network

Document

Document Date: 2006-01-01Release Date: 2013-10-04
A 49-page research paper from the Cryptanalysis and Exploitation Services summer programme: see the Washington Post article Secret NSA documents show campaign against Tor encrypted network, 4 October 2013.
TOP SECRET//COMINT//20291123 (U//FOUO) Tor 2006 CES Summer Program Abstract (U) Tor is an open-source anonymization program created by Roger Dingledine, Nick Mathewson, and Paul Syver...

Op MULLENIZE and beyond – Staining machines

Document

Document Date: 2012-10-10Release Date: 2013-10-04
A 2012 report from GCHQ describes a method of “staining” electronic traffic to distinguish between anonymous Tor users: see the Washington Post article Secret NSA documents show campaign against Tor encrypted network, 4 October 2013.
Op MULLENIZE and beyond - Staining machines 10/10/12 01:13:02 pm, by , 576 words Categories: MCE, MCD, MISD Op MULLENIZE and beyond - Staining machines UK Top Secret Strapl COMINT ...

Peeling Back the Layers of Tor with EGOTISTICALGIRAFFE

Document

Document Date: 2007-01-08Release Date: 2013-10-04
This Tailored Access Operations presentation shows how the NSA uses a technique codenamed EgotisticalGiraffe to attack Tor users through vulnerable computer software: see the Guardian article NSA and GCHQ target Tor network that protects anonymity of web users, 4 October 2013.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (TS//SI//REL) Peeling Back the Layers of TOR with EGOTISTICALGIRAFFE ■¿cCE&v.^ Overall Classification This briefing is classified ...

New Contact-Chaining Procedures to Allow Better, Faster Analysis

Document

Document Date: 2011-01-03Release Date: 2013-09-28
This NSA memo, dated 3 January 2011, draws analysts’ attention to a rule change, allowing “contact chaining, and other analysis, from and through any selector, irrespective of nationality and location, in order to follow or discover valid foreign intelligence targets”: see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, […]
(S//SI//REL) New Contact-Chaining Procedures to Allow Better, Faster Analysis FROM: Run Date: 01/03/2011 (U//FOUO) Editor’s note: A briefing will be held on 7 January from 1000-1130 in ...

SYNAPSE Data Model

Document

Release Date: 2013-09-28
This slide from an undated NSA presentation demonstrates how the agency uses email and phone data to analyse the social networks of targets (the “Agent” in the diagram): see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, 28 September 2013.
SECRET//SI//REL TO USA FVEY (S//SI//REL USA, FVEY) SYANPSE Data Model CUSSTXATWt SKKTAKOMiNVMl TO US*. M». OK, •». kftj IMM: 1« Paki 5 9 'P>rvr/*»^ <* Page 13 SECRET//SI//R...

NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks

Document

Document Date: 2010-01-01Release Date: 2013-09-16
These three slides from an NSA presentation made for the 2010 SIGDEV conference show that the agency is actively targeting payments networks: see the Der Spiegel article ‘Follow the Money’: NSA Monitors Financial World, 13 September 2013.
(S//REL TO USA, FVEY) NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks (U//FOUO) NSA, Network Analysis Center 2010 SIGDEV Conference 09/13/13 SE...

US-Israeli Memorandum of Understanding

Document

Document Date: 2009-01-01Release Date: 2013-09-11
A Memorandum of Understanding (MOU) between the NSA and the Israeli SIGINT National Unit that allows the NSA to share “raw SIGINT data” with Israel. The agreement was reached in March 2009, although the MOU itself is undated: see the Guardian article NSA shares raw intelligence including Americans’ data with Israel, 11 September 2013.
iur i3jdi,i\jd 1//LUIV111N iu um, ioin (TS//SI//REL) MEMORANDUM OF UNDERSTANDING (MOU) BETWEEN THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) AND THE ISRAELI SIGINT N...

Your target is using a BlackBerry? Now what?

Document

Release Date: 2013-09-09
This slide, from an undated NSA presentation, shows that the agency is able to defeat BlackBerry encryption technology – using an email from a Mexican government official as an example: see the Der Spiegel article iSpy: How the NSA Accesses Smartphone Data, 9 September 2013.
TOPSECRET//COMNÏ//RH TO USA, FVEY (U) Post Processed BES collection t Type Data Type Mensaje original De: Enviado el: Para: Asunto: RE: URGENTE: Gracias. TOP SE...

iPhone Location Services

Document

Release Date: 2013-09-09
These four sides from an undated NSA presentation boast the agency’s ability to access location information from iPhones – and makes fun of the “zombies” whose information is exfiltrated: see the Der Spiegel article iSpy: How the NSA Accesses Smartphone Data, 9 September 2013.
phone1.jpg: TS//SI//REL to USA, FVEY (S//RED iPhone Location Services (U) Who knew in 1984... TS//SI//RELto USA, FVEYphone2.jpg: TS//SI//REL to USA, FVEY (S//REL) iPhone Locatio...

BULLRUN CoI – Briefing Sheet

Document

Release Date: 2013-09-05
This undated GCHQ document provides a classification guide for BULLRUN – NSA and GCHQ’s attempts to weaken or defeat cryptographic protocols – and specifies some of its achievements: see the ProPublica article Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security, 5 September 2013.
TOP SECRET STRAP1 COMINT BULLRUN Col - Briefing Sheet Introduction 1. The ability to exploit targets’ encrypted communications is extremely fragile and is often enabled through sensiti...

Computer Network Operations SIGINT Enabling project

Document

Document Date: 2012-02-01Release Date: 2013-09-05
An outline for the SIGINT Enabling project, which aims to “influence and/or overtly leverage” the design of commercial IT products. A small section of this document was later un-redacted by The Intercept: see the ProPublica article Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security, 5 September 2013.
TOP SECRET//SI/TK//NOFORN (U) COMPUTER NETWORK OPERATIONS (U) SIGINT ENABLING This Exhibit is SECRET//NOFORN FY20111 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 2013...

Classification guide for cryptanalysis

Document

Document Date: 2005-09-13Release Date: 2013-09-05
Guide describing classification of various NSA cryptanalysis capabilities: see the Guardian article Revealed: how US and UK spy agencies defeat internet privacy and security, 5 September 2013.
TOP SECRET//COMINT//20291123 NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U//FOUO) CLASSIFICATION GUIDE FOR CRYPTANALYSIS, 2-12 Effective Date: 13 September 2005 CLASSIFIED BY:...

Project BULLRUN classification guide

Document

Document Date: 2010-06-16Release Date: 2013-09-05
A classification guide on the NSA’s Project BULLRUN goals and capabilities in decryption: see the Guardian article Revealed: how US and UK spy agencies defeat internet privacy and security, 5 September 2013.
TOP SECRET//SI//REL TO USA, FVEY CLASSIFICATION GUIDE TITLE/NUMBER: (U//FOUO) PROJECT BULLRUN/2-16 PUBLICATION DATE: 16 June 2010 OFFICE OF ORIGIN: (U) Cryptanalysis and Exploitation Ser...

2013 Intelligence Community budget justification

Document

Document Date: 2012-02-01Release Date: 2013-08-29
Congressional Budget Justification summary for fiscal year 2013 from the Office of the Director of National Intelligence (ODNI): see the Washington Post article U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary, 29 August 2013.
TOP SECRET//SI/TK//NOFORN FY 2013 Congressional Budget Justification Volume I NATIONAL INTELLIGENCE PROGRAM SUMMARY February 2012 TOP SECRET//SI/TK//NOFORN TOP SECRET//SI/TK//...

Black Budget – Israel

Document

Document Date: 2012-02-01Release Date: 2013-08-29
These three short extracts from the 2013 Intelligence Community Budget Justification (“the Black Budget”) shows that Israel was seen as a counter-intelligence target: see the Intercept article Netanyahu’s Spying Denials Contradicted by Secret NSA Documents, 25 March 2015.
1Isr-540x258.png: (U> Penetrate Hostile Foreign Intelligence Services (S//NF) The ability to detect and engage foreign intelligence services and non state actors that target U.S. interests is...

ODNI budget tables

Document

Document Date: 2012-02-01Release Date: 2013-08-29
Tables from the Office of the Director of National Intelligence (ODNI)’s budget for 2013: see the Washington Post article: U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary, 29 August 2013.
TOP SECRET//SI/TK//NOFORN Resource Exhibit No. 1A (Dollars in Thousands) National Intelligence Program Funds by Program FY 2011 - FY 2017 This Exhibit is SECRET//NOFORN Program F...

Targeting Rationale (TAR)

Document

Document Date: 2007-01-08Release Date: 2013-08-15
A Targeting Rationale document details how NSA analysts should justify their targeting decisions: see the Washington Post article NSA broke privacy rules thousands of times per year, audit finds, 15 August 2013.
TOP SECRET//COMINT//NOFORN//MR Targeting Rationale (TAR) (C//SI//REL TO USA, FVEY) The basic premise of this process is to memorialize why you the analyst have requested targeting. This rat...

NSAW SID Intelligence Oversight (IO) Quarterly Report

Document

Document Date: 2012-05-03Release Date: 2013-08-15
A memorandum providing the executive summary of the NSA’s Signals Intelligence Directorate (SID) auditing repoort for the first quarter of 2012: see the Washington Post article NSA broke privacy rules thousands of times per year, audit finds, 16 August 2013.
TOP SECRET//COMINT//NOFORN UNITED STATES GOVERNMENT Memorandum OC-034-12 DATE: 3 May 2012 REPLY TO ATTN OF: SID Oversight & Compliance TO: SUBJECT: (U//FOUO) NSAW SI...

FAA Certification Renewals With Caveats

Document

Document Date: 2011-10-12Release Date: 2013-08-15
A Special Source Operations (SSO) document discusses the implications of a 3 October 2011 FISA Court opinion: see the Washington Post article NSA broke privacy rules thousands of times per year, audit finds, 15 August 2013.
(TS//SI//NF) FAA Certification Renewals With Caveats B> 2011 -10-12 0850 (TS//SI//NF) The FISA Court signed the 2011 FAA Certifications on 3 Oct 2011 - these are valid until 2 Oct 2012, permi...

So you got US Person Information?

Document

Release Date: 2013-08-15
An NSA training slide detailing procedures when collection of information on US persons occurs: see the Washington Post article NSA broke privacy rules thousands of times per year, audit finds, 15 August 2013.
\ UNCLASSIFIED//FOR OFFICIAL USE ONLY (U) Lesson 4: So you got U.S. Person Information? How? What did you do? What do you do now? Comment Intentional You deliberately targeted U.S. Person c...

Silent Success: SIGINT Synergy Helps Shape US Foreign Policy

Document

Document Date: 2010-08-30Release Date: 2013-08-02
This August 2010 post from the internal NSA newsletter SIDtoday shows how the agency aided US diplomacy on the issue of Iran sanctions – by surveilling the communications of other members of the UN Security Council: see the Época article Spies of the digital age, 2 August 2013.
investiga_1.jpg: I Öl» Si cret comint SOI ORN .•«tv 1Ic\ps Sh*P* ^ ^ • SK.IV» Svncie l,c* (llWW.0> Silent sue««: SK j| ■ Koreift*» l*ol»c> A, the outset of these .engihy uegottati...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh