No Filters
Add Filters
From sidebar or searchbox
Results
748 Total

XKeyScore

Document

Document Date: 2008-02-25Release Date: 2013-07-31
This 32-page NSA presentation dated 25 February 2008 details XKeyscore, a tool used to search unfiltered internet traffic in real time. Two slightly different versions of this presentation have been published; both follow below: see the Guardian article XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’, 31 July 2013.
 XKEYSCORE 25 Feb 2008 xkeyscore@nsa rs'M 1-52 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL DERIVED FROM: NSA/CS DATED: 20070108 ...

NSA’s Counterterrorism (CT) Relationship with the German Foreign Intelligence Service (BND) and the German Federal Office for the Protection of the Constitution (BfV)

Document

Document Date: 2013-04-08Release Date: 2013-07-22
This background document, prepared by NSA officials in advance of a conversation with representatives of Germany’s domestic (BfV) and foreign (BND) intelligence services, outlines the continuing cooperation between the three agencies in the field of counterterrorism. Extracts from this document were published by Der Spiegel in July 2013: see the Der Spiegel article New NSA […]
TOP SEC RET//SI//NOFORN (U) Topic (S/REL TO USA, DEU) NS A’5 Counterterrorism (CT) Relationship with the German Federal Intelligence Seivice (BND) and the German Federal Office for the Prot...

Germany – Last 30 days

Document

Document Date: 2013-01-01Release Date: 2013-07-01
This Boundless Informant slide shows the number of German phone (DNR) and internet (DNI) records collected day-by-day between 10 December 2012 and 8 January 2013, from sources codenamed US-987LA and US-987LB: see the Der Spiegel article How the NSA Targets Germany and Europe, 1 July 2013.
GERMANY. Last 30 Days B 3* B C*<* * ■ 50.000.000 u ftf 40.000.000 - 30.000.000 1 ^ Signal Profile Most Volume Top 5 Techs n US 987LA 47 12i6 8*4 Records ■ ...

Italy, Spain – Last 30 Days

Document

Document Date: 2013-01-01Release Date: 2013-07-01
This Boundless Informant slide shows the number of Italian and Spanish phone records collected day-by-day between 10 December 2012 and 8 January 2013: see the Spiegel article How the NSA Targets Germany and Europe, 1 July 2013.
SPAIN - Last 30 Days Q«. c** * ■ ITALY - Last 30 Days Q m D os- % ■ 5.000000 Oec 10 0«:17 C*c24 Otcll Jan

The Netherlands, France – Last 30 days

Document

Document Date: 2013-01-01Release Date: 2013-07-01
This Boundless Informant slide shows the number of Dutch and French phone records collected day-by-day between 10 December 2012 and 8 January 2013: see the Spiegel article How the NSA Targets Germany and Europe, 1 July 2013.
NETHERLANDS - Last 30 Days □ CN {3 c** ■ 350.000 300 000 ■ 250.000 • 200.000 - 150.000 • 100.000 • 50000 - 0 sa w i Ml 0«<10 C«<17 Oec...

DROPMIRE

Document

Document Date: 2007-01-01Release Date: 2013-06-30
This redacted slide from a 2007 NSA presentation describes NSA operations against the EU embassy in Washington DC: see the Guardian article New NSA leaks show how US is bugging its European allies, 30 June 2013.
DROPMIRE -DROPMIRE implanted on the Cryptofax at the EU Embassy D.C. The EU pass diplomatic cables via this system back to the MI A.

NSA Inspector General review of the President’s Surveillance Program

Document

Document Date: 2009-03-24Release Date: 2013-06-27
A review of NSA activities beginning shortly after 9/11 until January 2007 describes the warrantless mass surveillance activities authorised by President Bush, including a program codenamed STELLARWIND: see the Guardian article NSA collected US email records in bulk for more than two years under Obama, 27 June 2013.
TOP SECRET//STLW//COMINT/ORCON/NOFORN ST-09-0002 WORKING DRAFT OFFICE OF THE INSPECTOR GENERAL NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE 24 March 2009 (U) TABLE OF CONTENTS ...

Memorandum for the Attorney General

Document

Document Date: 2007-11-20Release Date: 2013-06-27
This 2007 US Department of Justice memo argues that analysis of US metadata is “consistent with” the Fourth Amendment, FISA and the electronic surveillance provisions of the United States Code [the Code of Laws of the United States of America] because the data is already in the NSA’s databases: see the Guardian article NSA collected […]
/ ILS. Department of Justice National Security Division ^ i J SECRET//CQMINT//ORCON.NQFQRN Washington, D.C. 20530 November 20, 2007 MEMORANDUM FOR THE ATTORNEY GENERAL ...

Access to the future

Document

Release Date: 2013-06-21
This concluding slide from an undated GCHQ presentation on Tempora reminds analysts that they are in a “enviable” and “privileged” position – “you have access to a lot of sensitive data… have fun and make the most of it”: see the Guardian article Mastering the internet: how GCHQ set out to spy on the world […]
Conclusion TOP SECRET STRAP1 ® You are in a privileged position — repay that trust, o You have ready access to a lot of sensitive data, o Understand your legal obligations — don’t become a...

FAA Minimization Procedures

Document

Document Date: 2009-07-29Release Date: 2013-06-20
Procedures under the FISA Amendments Act used by the NSA to minimise data collection from US persons: see the Guardian article The top secret rules that allow NSA to use US data without a warrant, 20 June 2013.
SECRET//COMINT//NOFORN//20320108 EXHIBIT B ■1 ! MINIMIZATION PROCEDURES USED BY THE NATIONAL SECURITY'A ■ CONNECTION WITH ACQUISITIONS OF FOREIGN INTELLIGENCE/ ,,„ , INFORMATION PURSU...

FAA Targeting Procedures

Document

Document Date: 2009-07-29Release Date: 2013-06-20
Procedures used by the NSA to target non-US persons under the FISA Amendments Act: see the Guardian article The top secret rules that allow NSA to use US data without a warrant, 20 June 2013.
TOP SECRET//COMINT//NOFORN//20320108 EXHIBIT A PROCEDURES USED BY THE NATIONAL SECURITY AGENCY FORTARfeETING NON-UNITED STATES PERSONS REASONABLY BELIEVED TO BE HOISTED OUTSIDE THE UNITED ...

JSA Restrictions

Document

Release Date: 2013-06-18
This undated article from GCHQ’s internal GCWIki gives technical details about the US-German Joint Sigint Activity group: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
TOP SECRET STRAP 1 COMINT JSA Restrictions Access Central: Targeting Tar g e tin g and selector □ AC Logo Red. png management are services that Access Central offers. This in...

Boundless Informant heat maps

Document

Document Date: 2013-03-26Release Date: 2013-06-11
These undated heat maps show the number of pieces of communications data the NSA gathers per country in a particular 30 day period, divided into telephony (DNR) and internet (DNI) metadata. Details in the second map refer to a period in January 2013 and third to a period ending in February the same year: see […]
boundlessinformant.pdf: Page 93 BOUNDLESSINFORMANT Top 5 Countries (i»t 30 o«>» t-om «¡xu/i ■Ohm.pdf: BOUNDLESSINFORMANT im!MwamHMiM:rta.]a;ii]aaMaiM,(.yiii:am«.'.«M«iMiaiiiiiPH;i!i...

Boundless Informant – Frequently Asked Questions

Document

Document Date: 2012-09-06Release Date: 2013-06-08
This three-page memo is an internal guide to the NSA’s Boundless Informant tool, which allows the agency’s Global Access Operations to assess its collection capabilities by means of metadata record counts: see the Guardian article Boundless Informant: the NSA’s secret tool to track global surveillance data, 8 June 2013.
UNCLASSIFIED//FOR OFFICIAL USE ONLY BOUNDLESSINFORMANT - Frequently Asked Questions_09-06-2012 (U/FOUO) Questions 1 ) What is BOUNDLESSINFORMANT? What is its purpose? 2) Who are the in...

Boundless Informant – Describing Mission Capabilities from Metadata Records

Document

Document Date: 2012-07-30Release Date: 2013-06-08
These slides, taken from a presentation dated 13 July 2012, outline some of the features of Boundless Informant, a tool used to describe the capabilities of the NSA unit called Global Access Operations (GAO): see the Guardian article Boundless Informant: the NSA’s secret tool to track global surveillance data, 8 June 2013.
pB» II® Global Access Operations TOP SECRET//SI//NOFORN Global Access Operations w The Old Way (U//FOUO) Typical SIG1NT Data Calls/Questions How many sites do we have in the r...

Presidential Policy Directive PPD-20 on US Cyber Operations Policy

Document

Document Date: 2012-10-01Release Date: 2013-06-07
Presidential Policy Directive 20 ordered national security officials to create a target list for increased cyberspace offensives: see the Guardian article Obama orders US to draw up overseas target list for cyber-attacks, 7 June 2013.
TOP SECRET/NOFORN PRESIDENTIAL POLICY DIRECTIVE/PPD-20 MEMORANDUM FOR THE VICE PRESIDENT THE SECRETARY OF STATE THE SECRETARY OF THE TREASURY THE SECRETARY OF DEFENSE THE ATTORNEY GENE...

PRISM/US-984XN Overview

Document

Document Date: 2013-04-01Release Date: 2013-06-06
Nineteen slides from a 41-slide April 2013 NSA presentation describing the PRISM collection of data via internet service providers, “the SIGAD most used in NSA reporting.” Slides have been published gradually by several media organisations: see the Washington Post article NSA slides explain the PRISM data-collection program, 6 June 2013.
01.jpg: PRISM/U S-984XN Overview OR The SIGAD Used Most in NS A Reporting Overview April 2013 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20360901 OP SECRET/...

Verizon FISA Court order

Document

Document Date: 2013-04-25Release Date: 2013-06-06
A FISA Court order issued to Verizon demanded daily call records for all communications within the US and between the US and abroad: see the Guardian article NSA collecting phone records of millions of Verizon customers daily, 6 June 2013.
TOP SECRET//SI//NOFORN UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C. IN RE APPLICATION OF THE FEDERAL BUREAU OF INVESTIGATION FOR AN ORDER REQUIRING THE Dock...

Web Forum Exploitation using XKEYSCORE

Document

Release Date: 2009-07-01
This NSA presentation from July 2009 describes the kinds of information drawn from online forums that can be accessed in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
web-forum-exploitation-using-xks-p1-normal.gif: OPSECRET//COMINT//REL TO USA, AUS. CAN, GBR, NZL Web Forum Exploitation using XKEYSCORE S2I7 July 2009 TOP SECRET//COMINT//REL TO USA,...

European Technical Center Area Checked for Unexploded WWII Ordnance

Document

This internal NSA post from 14 March 2006 describes an incident on 20 December 2005 when what was suspected to be unexplodeded WWII-era ordnance was discovered at an agency facility in Mainz Kastel, Germany: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) European Technical Center Area Checked for Unexploded WWII Ordnance FROM: multiple authors Unknown Run Date: 03/15/2006 (C) The ETC facility was closed for a day while inves...

Update software on all Cisco ONS nodes

Document

This NSA report dated 11 April 2014 describes the difficulties with the network switches the agency had compromised on Cisco devices in order to collect data from Cisco customers: see the book No Place To Hide, 13 May 2014.
Page 150 TOP SECRET//COMINT//REL TO USA, FVEY (Report generated on:4/11/2013 3:31:05PM ) NewCrossProgram | Active ECP Count: | i~~| CrossProgram-1-13 New ECP Lead: I name redacted"! ...

A Little Bad Aibling Nostalgia

Document

This post from the NSA intranet dated 6 April 2001 gives the reactions of staff to the announced closure of the Bad Aibling station in Bavaria (in the event, the NSA retained a presence at the base): see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.
(U//FOUO) A Little Bad Aibling Nostalgia FROM: Some DA Veterans Unknown Run Date: 06/04/2004 (U//FOUO) Once the closure of Bad Aibling Station (located in southern Bavaria in Germany) b...

The FASHIONCLEFT Protocol

Document

This NSA presentation dated 16 October 2008 describes the FASHIONCLEFT protocol used to exfiltrate data from trojans and implants to the agency: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
The Fashioncleft .. Protocol Hi STDP, S32354 “go Itiny-url?q=p5atn” October 16, 2008 TOP SECRET//COMINT//RELTO USA,FVEY 1 | TOP SECRET//COMINT//RELTO USA,FVEY Definition...

Ob DOODY – Mullah Niaz Muhammed – IS3673

Document

This ISAF document from February 2011 provides a record of the helicopter strike on Mullah Niaz Muhammed, which resulted in two innocent civilians being killed: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
a pi ^ Headquarters Task Force HeimanfJ Dynamic Target Storyboard RC(SW) - TFH J3 Tgts - Op STEN TAKAY Obj DOODY - Mullah Niaz Muhammed - IS3673 Unit: TFH J3 Tgts Objective: DOODY B...

The Challenge

Document

This extract from an undated NSA presentation to the SIGDEV conference describes on of the agency’s critical internal challenges – the sheer scale of the data it collects: see the book No Place To Hide, 13 May 2014.
Page 151 TOP SECRET//COMINT//REL TO USA, FVEY The Challenge Collection is outpacing our ability to ingest, process and store to the “norms” to which we have become accustomed.

Identity Intelligence: Image is Everything

Document

This short excerpt from an undated NSA presentation outlines the potential value of biometric data to the agency: see the New York Times article N.S.A. Collecting Millions of Faces From Web Images, by James Risen and Laura Poitras, 31 May 2014
Identity Intelligence: Image is Everything IDENTITY INTELLIGENCE TOP SECRET//REL TO USA, AUS, CAN, GBR, NZL ...is exploiting pieces of information that are unique to an individual t...

Content Extraction Analytics

Document

This 21 May 2009 presentation from the NSA’s Center for Content Extraction includes a slide that shows that the communications of 122 heads of government were stored in the agency’s central “Target Knowledge Base”, 11 of whom are named. The collection for most of these targets was automated: see the Der Spiegel article ‘A’ for […]
Human Language technology Center for Content Extraction Content Extraction Analytics SIGDEV End-to-End Demo 21 May 2009 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassily On:...

Afghanistan – Last 30 days

Document

This Boundless Informant slide shows the number of Afghan phone records collected day-by-day between 10 December 2012 and 8 January 2013, from a facility codenamed US-962A5: see the Dagbladet article NSA-files repeatedly show collection of data «against countries» – not «from», 22 November 2013.
AFGHANISTAN - Last 30 Days Q Qu» *5000:0-, zwocoo 1.5000:0 1. wo 0:0 - 500HO - til* Doe >0 f*i: 11 04C.?4 OlC3* Ain Signal Profile Most Volume Top 5 Techs...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh