Results
2176 Total
NSA QUANTUM Tasking Techniques for the R&T Analyst
Document
Release Date:
2013-12-29
This Booz Allen Hamilton presentation on the NSA’s Quantum tools describes the different kinds of malware attacks available to workgroups within the agency, the procedure an analyst must follow in order to make use of them and the way the systems themselves work, using a “man-on-the-side” attack from TAO’s FOXACID server. It also describes the […]
image-583967-galleryV9-quqn.jpg:
TOP SECRET//SI//REL USA, AUS, CAN, GBR, NZL
(TS) NSA QUANTUM Tasking Techniques
for the R&T Analyst
POC:
TAO RTD | Team
- Booz Allen Hamilton SDS2
...
XKEYSCORE, Cipher Detection, and You!
Document
Release Date:
2013-12-11
Document Date:
2008-08-21
This presentation from NSA’s Mathematics Research Group, dated 21 August 2008 provides an introduction to the XKeyScore system’s data sources and fingerprinting capabilities: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
xks-cipher-detection-and-you-p1-normal.gif:
TOP SECRET//COMINT//REL TO USA, FVEY
, Cipher Detection, and You!
Mathematics Research Group
21 August 2008
TOP SECRET//COMINT//REL TO USA, F...
XKeyScore slide with Swedish example
Document
Release Date:
2013-12-11
This slide from an NSA presentation shows a screenshot from XKeyScore, demonstrating the broad nature of the queries that can be made with this tool: see the SVT article FRA has access to controversial surveillance system, 11 December 2013.
1. If you know the particular website the target visits. For this example. I’m looking
for everyone in Sweden that visits a particular extremist web forum.
Search: HTTP Activity
Query Name:...
Select Accomplishments: Production
Document
Release Date:
2013-12-11
Document Date:
2013-04-01
This short excerpt from an April 2013 NSA presentation given to Five Eyes partners provides evidence of Sweden’s involvement in the “trilat” behind Quantam malware operations: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
TOP SECRET//COMINT//REL USA. AUS, CAN, GBR, NZL
Select Accomplishments: Production
Sweden: Realization of DZRNSA-proposed trilat to work Quantum.
Final Agenda SWEDUSA
Document
Release Date:
2013-12-11
Document Date:
2013-04-23
The agenda for the SWEDUSA 2013 Strategic Planning Conference on 24-26 April 2013, showing extensive discussion between the NSA and FRA at the most senior level: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
TOP SECRET//SI//NOFORN
As of: 23 April//1000
Protocol Rep:
Visit manager:
Date/Time of Visit: (U) 24-26 April 2013
24 April 2013//0745-1600;
25 April 2013//0845-1545;
26 April...
XKeyScore data sources
Document
Release Date:
2013-12-11
A single slide lists the sources of data that can be searched with XKeyScore – satellites (FORNSAT), mobile phones and base stations (Overhead), US-based fibre optic cables (Special Source Operations), offensive hacking (Tailored Access Operations), embassies and consulates (Special Collection Operations, F6), FISA Court authorised monitoring of US citizens and third party partners: see the […]
TOP SECRET//COMINT//REL TO USA, FVEY
Data Sources
• FORNSAT (downlink)
• Overhead (uplink)
• Special Source
$ Tailored Access
• F 6
• FISA (limited)
• 3rd party
TOP SECRET...
Visit Precis: SWEDUSA
Document
Release Date:
2013-12-11
This briefing document, produced ahead of the SWEDUSA Strategic Planning Conference of 24-26 April, outlines General Keith Alexander’s talking points for the event: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
TOP SECRET//COMINT//NOFORN
VISIT PRÉCIS
SWEDUSA 2013 STRATEGIC PLANNING CONFERENCE (SPC)
MR. INGVAR ÀKESSON
DIRECTOR GENERAL
FORSVARETS RADIOANSTALT (FRA)
SWEDEN
24-26 APRIL 2013
...
UK and Swedish involvement in Quantum
Document
Release Date:
2013-12-11
Document Date:
2013-04-01
This internal NSA document from April 2013 provides a progress report on projects where the NSA’s Signals Intelligence Directorate (SID) strategy involves a foreign partner. A paragraph on Sweden indicates that GCHQ’s participation in Quantum malware operations “may be in jeopardy” but that making the project a joint US-Swedish one has been “NSA’s goal all […]
TOP SECRET//SI//NOFORN
What You Wanted to Know
Review SID's goals for this quarterly.
Note that just about all of the accomplishments we are presenting respond to some aspect of SID's
st...
SSO GHOSTMACHINE Analytics
Document
Release Date:
2013-12-10
Excerpts from slides describing GHOSTMACHINE, the NSA Special Source Operations cloud-based analytics platform: see the Washington Post article New documents show how the NSA infers relationships based on mobile location data, 10 December 2013.
SSO GHOSTMACHINE Analytics
TOP SECRET//COMINT//NOFORN
Fascia Limit?
5,000M
4,000M -
3,000M -
2,000M -
1,000M -
OM
Hitting The Wall
Tuskattire Volume Totals
H CERF
...
GSM classification guide
Document
Release Date:
2013-12-10
Document Date:
2006-09-20
This internal NSA document from 20 September 2006 outlines the agency’s ability to intercept, process and discern location data from mobile phone calls: see the Washington Post article New documents show how the NSA infers relationships based on mobile location data, 10 December 2013.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//MR
Description of Information Classification/ Markings Reason Declass Remarks
b. (U) In association with NSA, SIGINT or Intelligence. SECRE...
Summary of DNR and DNI Co-Travel Analytics
Document
Release Date:
2013-12-10
Document Date:
2012-10-01
This 24 page white paper dated 1 October 2012 describes and evaluates some of the Co-Traveller tools the NSA and partner agencies uses to analyse phone location data: see the Washington Post article New documents show how the NSA infers relationships based on mobile location data, 10 December 2013.
TOP SECRET//COMINT//REL TO USA, FVEY
Summary of DNR and DNI Co-Travel Analytics
S2I5
1 October 2012
Contact information
TOP SECRET//COMINT//REL TO USA, FVEY
TOP SECRET//COMINT//R...
Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities
Document
Release Date:
2013-12-09
Document Date:
2007-01-01
A 2007 proposal to the NSA from contractor SAIC, promoting the company’s ability to support “intelligence collection in the games space”: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 December 2013.
Games: A Look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities
Table of Contents
FORWARD......................................................................4
...
Bahrain (BHR/BH), China (CHN/CN), Egypt (EGY/EG), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Israel (ISR/IL), Japan (JPN/JP), Jordan (JOR/JO), Kazakhstan (KAZ/KZ), Korea (KOR/KR), Kuwait (KWT/KW), Lebanon (LBN/LB), Malaysia (MYS/MY), Mexico (MEX/MX), Oman (OMN/OM), Pakistan (PAK/PK), Palestine (PSE/PS), Qatar (QAT/QA), Saudi Arabia (SAU/SA), Singapore (SGP/SG), Sudan (SDN/SD), Turkmenistan (TKM/TM), United Arab Emirates (ARE/AE), United Kingdom (GBR/GB), United States (USA/US), Uzbekistan (UZB/UZ)
MHS and GCHQ “Get in the Game with Target Development for World of Warcraft Online Gaming”
Document
Release Date:
2013-12-09
Document Date:
2008-01-01
An NSA document from 2008 shows that efforts to collect data from players of World of Warcraft started that year with the development of specialised exploits by GCHQ. The operation was based at Menwith Hill in the UK: see the New York Times article Spies’ Dragnet Reaches a Playing Field of Elves and Trolls, 9 […]
TOP SECRET//COMINT//REL TO USA, FVEY
(TS//SI//REL) MHS and GCHQ “Get in the Game” with Target Development for
World of Warcraft Online Gaming
(TS//SI//REL) Although online gaming may seem...
Third Party Partners
Document
Release Date:
2013-12-08
This short excerpt from an NSA document shows that nine European States – Belgium, Denmark, France, Germany, Italy, The Netherlands, Norway, Spain and Sweden – have a second-tier ‘third party’ relationship with the agency: see the SVT article NSA “asking for” specific exchanges from FRA – Secret treaty since 1954, 8 December 2013.
* (S//SI. REU) SSEU’R. members are the Five Eyes nations (Australia, Canada. New Zealand, United Kingdom and United States] and the following
Tliird Party partners: Belgium, Denmark, France, Germ...
Intelligently filtering your data: Brazil and Mexico case studies
Document
Release Date:
2013-12-02
A selection of slides from a Secure and Trustworthy Cyberspace (SaTC) presentation gives case studies on the use of graph analysis in relation to the political leadership of Mexico and Brazil: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
glenn1-30.jpg:
?86 H6MTW£8MllflfHi® T8 Bifc SIS: SHI; ESH; H5t
I(TS//SI//REL) Intelligently filtering your data
Brazil and Mexico case studies
SATC
i86 ieff«E8fHHWB£l: ?8 HIS; 886; SH...
The International Security Issues Build-Out
Document
Release Date:
2013-12-02
Document Date:
2012-11-09
This update from the NSANet intranet shows that the International Security Issues section of the agency shows a growing emphasis on gathering economic and financial information on the 13 countries under its remit: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
Welcome! Friday. 09 Nov 2012
• Web search
• Agency-all Emails
• SID-all Emai...
Geopolitical trends for 2014-2019
Document
Release Date:
2013-12-02
Three redacted slides from an NSA presentation name several states as subjects of ongoing interest: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
slide1.jpg:
slide2.jpg:
TOP SECRET//SI//REL TO USA, FVEY
U//JEQUOslide3.jpg:
rTO USA, FYEY
Geopolitical Trends: Global Drivers
(S//REL) Geopolitical Trend driver»:
• St re**orc to...
WINDSTOP – Last 30 days
Document
Release Date:
2013-11-04
This Boundless Informant slide shows the number of WINDSTOP records collected day-by-day between 10 December 2012 and 8 January 2013. WINDSTOP covers at least four NSA collection systems that depend on Five Eyes partners; the MUSCULAR project to intercept traffic from Google and Yahoo data centres is representated by the code DS-200B. In the given […]
WINDSTOP- Last 30 Days
DNI
DNR
600,000,000 -j
500,000,000 -
400,000,000 -
300,000,000 -
200,000,000 -
100,000,000 -
1221
12.-12
12.'15 12-16
1221
12-13
12...
Computer-Network Exploitation Successes South of the Border
Document
Release Date:
2013-10-20
Document Date:
2010-11-15
This extract from a 15 November 2010 NSA memo reveals that the agency has been able to access Mexican President Felipe Calderon’s email account: see the Der Spiegel article NSA Accessed Mexican President’s Email, 20 October 2013.
(TS//SI//REL) Computer-Network Exploitation Successes South of the Border
I FROM: .* BA.
Chief, NSA-Texas TAO/Requiremcnts & Targeting (FTS327)
Run Date: 11/15/2010
rS//SI//REL) TAO-en...
Roger Dingledine at NSA NOV 2007
Document
Release Date:
2013-10-04
Document Date:
2007-11-01
This NSA memo summarises a talk given by Roger Dingledine of the Tor Project on 1 November 2007: see the Secret NSA documents show campaign against Tor encrypted network, 4 October 2013.
TOP SECRET // COMINT // REL TO USA, AUS, CAN, GBR, NZL
Roger Dingledine at NSA NOV 2007
From PE
Contents
* 1 (U) Talk by Roger Dingledine at NSA, 11/01/2007 at R&E (Sponsored by NSA RT)
o 1...
New Contact-Chaining Procedures to Allow Better, Faster Analysis
Document
Release Date:
2013-09-28
Document Date:
2011-01-03
This NSA memo, dated 3 January 2011, draws analysts’ attention to a rule change, allowing “contact chaining, and other analysis, from and through any selector, irrespective of nationality and location, in order to follow or discover valid foreign intelligence targets”: see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, […]
(S//SI//REL) New Contact-Chaining Procedures to Allow Better,
Faster Analysis
FROM:
Run Date: 01/03/2011
(U//FOUO) Editor’s note: A briefing will be held on 7 January from 1000-1130
in ...
SYNAPSE Data Model
Document
Release Date:
2013-09-28
This slide from an undated NSA presentation demonstrates how the agency uses email and phone data to analyse the social networks of targets (the “Agent” in the diagram): see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, 28 September 2013.
SECRET//SI//REL TO USA FVEY
(S//SI//REL USA, FVEY) SYANPSE Data Model
CUSSTXATWt SKKTAKOMiNVMl TO US*. M». OK, •». kftj IMM: 1«
Paki
5
9
'P>rvr/*»^ <*
Page 13
SECRET//SI//R...
NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks
Document
Release Date:
2013-09-16
Document Date:
2010-01-01
These three slides from an NSA presentation made for the 2010 SIGDEV conference show that the agency is actively targeting payments networks: see the Der Spiegel article ‘Follow the Money’: NSA Monitors Financial World, 13 September 2013.
(S//REL TO USA, FVEY) NSA: How
Network Mapping is Helping to
Target the Credit Card
Authorization Networks
(U//FOUO)
NSA, Network Analysis Center
2010 SIGDEV Conference
09/13/13
SE...
iPhone Location Services
Document
Release Date:
2013-09-09
These four sides from an undated NSA presentation boast the agency’s ability to access location information from iPhones – and makes fun of the “zombies” whose information is exfiltrated: see the Der Spiegel article iSpy: How the NSA Accesses Smartphone Data, 9 September 2013.
phone1.jpg:
TS//SI//REL to USA, FVEY
(S//RED iPhone Location Services
(U) Who knew in
1984...
TS//SI//RELto USA, FVEYphone2.jpg:
TS//SI//REL to USA, FVEY
(S//REL)
iPhone Locatio...
Your target is using a BlackBerry? Now what?
Document
Release Date:
2013-09-09
This slide, from an undated NSA presentation, shows that the agency is able to defeat BlackBerry encryption technology – using an email from a Mexican government official as an example: see the Der Spiegel article iSpy: How the NSA Accesses Smartphone Data, 9 September 2013.
TOPSECRET//COMNÏ//RH TO USA, FVEY
(U) Post Processed BES collection
t Type
Data Type
Mensaje original
De:
Enviado el:
Para:
Asunto: RE: URGENTE:
Gracias.
TOP SE...
BULLRUN CoI – Briefing Sheet
Document
Release Date:
2013-09-05
This undated GCHQ document provides a classification guide for BULLRUN – NSA and GCHQ’s attempts to weaken or defeat cryptographic protocols – and specifies some of its achievements: see the ProPublica article Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security, 5 September 2013.
TOP SECRET STRAP1 COMINT
BULLRUN Col - Briefing Sheet
Introduction
1. The ability to exploit targets’ encrypted communications is extremely fragile and is
often enabled through sensiti...
Black Budget – Israel
Document
Release Date:
2013-08-29
Document Date:
2012-02-01
These three short extracts from the 2013 Intelligence Community Budget Justification (“the Black Budget”) shows that Israel was seen as a counter-intelligence target: see the Intercept article Netanyahu’s Spying Denials Contradicted by Secret NSA Documents, 25 March 2015.
1Isr-540x258.png:
(U> Penetrate Hostile Foreign Intelligence Services
(S//NF) The ability to detect and engage foreign intelligence services and non state actors that target U.S.
interests is...
Silent Success: SIGINT Synergy Helps Shape US Foreign Policy
Document
Release Date:
2013-08-02
Document Date:
2010-08-30
This August 2010 post from the internal NSA newsletter SIDtoday shows how the agency aided US diplomacy on the issue of Iran sanctions – by surveilling the communications of other members of the UN Security Council: see the Época article Spies of the digital age, 2 August 2013.
investiga_1.jpg:
I Öl» Si
cret comint SOI ORN
.•«tv 1Ic\ps Sh*P* ^ ^
• SK.IV» Svncie l,c*
(llWW.0> Silent sue««: SK
j| ■ Koreift*» l*ol»c>
A, the outset of these .engihy uegottati...
NSA’s Counterterrorism (CT) Relationship with the German Foreign Intelligence Service (BND) and the German Federal Office for the Protection of the Constitution (BfV)
Document
Release Date:
2013-07-22
Document Date:
2013-04-08
This background document, prepared by NSA officials in advance of a conversation with representatives of Germany’s domestic (BfV) and foreign (BND) intelligence services, outlines the continuing cooperation between the three agencies in the field of counterterrorism. Extracts from this document were published by Der Spiegel in July 2013: see the Der Spiegel article New NSA […]
TOP SEC RET//SI//NOFORN
(U) Topic
(S/REL TO USA, DEU) NS A’5 Counterterrorism (CT) Relationship with the German
Federal Intelligence Seivice (BND) and the German Federal Office for the Prot...
Italy, Spain – Last 30 Days
Document
Release Date:
2013-07-01
Document Date:
2013-01-01
This Boundless Informant slide shows the number of Italian and Spanish phone records collected day-by-day between 10 December 2012 and 8 January 2013: see the Spiegel article How the NSA Targets Germany and Europe, 1 July 2013.
SPAIN - Last 30 Days
Q«. c**
* ■
ITALY - Last 30 Days Q m D os- % ■
5.000000
Oec 10 0«:17 C*c24 Otcll Jan