No Filters
Add Filters
From sidebar or searchbox
Results
2176 Total

Germany – Last 30 days

Document

Release Date: 2013-07-01 Document Date: 2013-01-01
This Boundless Informant slide shows the number of German phone (DNR) and internet (DNI) records collected day-by-day between 10 December 2012 and 8 January 2013, from sources codenamed US-987LA and US-987LB: see the Der Spiegel article How the NSA Targets Germany and Europe, 1 July 2013.
GERMANY. Last 30 Days B 3* B C*<* * ■ 50.000.000 u ftf 40.000.000 - 30.000.000 1 ^ Signal Profile Most Volume Top 5 Techs n US 987LA 47 12i6 8*4 Records ■ ...

The Netherlands, France – Last 30 days

Document

Release Date: 2013-07-01 Document Date: 2013-01-01
This Boundless Informant slide shows the number of Dutch and French phone records collected day-by-day between 10 December 2012 and 8 January 2013: see the Spiegel article How the NSA Targets Germany and Europe, 1 July 2013.
NETHERLANDS - Last 30 Days □ CN {3 c** ■ 350.000 300 000 ■ 250.000 • 200.000 - 150.000 • 100.000 • 50000 - 0 sa w i Ml 0«<10 C«<17 Oec...

DROPMIRE

Document

Release Date: 2013-06-30 Document Date: 2007-01-01
This redacted slide from a 2007 NSA presentation describes NSA operations against the EU embassy in Washington DC: see the Guardian article New NSA leaks show how US is bugging its European allies, 30 June 2013.
DROPMIRE -DROPMIRE implanted on the Cryptofax at the EU Embassy D.C. The EU pass diplomatic cables via this system back to the MI A.

Access to the future

Document

Release Date: 2013-06-21
This concluding slide from an undated GCHQ presentation on Tempora reminds analysts that they are in a “enviable” and “privileged” position – “you have access to a lot of sensitive data… have fun and make the most of it”: see the Guardian article Mastering the internet: how GCHQ set out to spy on the world […]
Conclusion TOP SECRET STRAP1 ® You are in a privileged position — repay that trust, o You have ready access to a lot of sensitive data, o Understand your legal obligations — don’t become a...

JSA Restrictions

Document

Release Date: 2013-06-18
This undated article from GCHQ’s internal GCWIki gives technical details about the US-German Joint Sigint Activity group: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
TOP SECRET STRAP 1 COMINT JSA Restrictions Access Central: Targeting Tar g e tin g and selector □ AC Logo Red. png management are services that Access Central offers. This in...

Boundless Informant heat maps

Document

Release Date: 2013-06-11 Document Date: 2013-03-26
These undated heat maps show the number of pieces of communications data the NSA gathers per country in a particular 30 day period, divided into telephony (DNR) and internet (DNI) metadata. Details in the second map refer to a period in January 2013 and third to a period ending in February the same year: see […]
boundlessinformant.pdf: Page 93 BOUNDLESSINFORMANT Top 5 Countries (i»t 30 o«>» t-om «¡xu/i ■Ohm.pdf: BOUNDLESSINFORMANT im!MwamHMiM:rta.]a;ii]aaMaiM,(.yiii:am«.'.«M«iMiaiiiiiPH;i!i...

Web Forum Exploitation using XKEYSCORE

Document

Release Date: 2009-07-01
This NSA presentation from July 2009 describes the kinds of information drawn from online forums that can be accessed in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
web-forum-exploitation-using-xks-p1-normal.gif: OPSECRET//COMINT//REL TO USA, AUS. CAN, GBR, NZL Web Forum Exploitation using XKEYSCORE S2I7 July 2009 TOP SECRET//COMINT//REL TO USA,...

Graph theory in the operational environment

Document

This undated presentation from GCHQ’s Information and Communications Technology Research department discusses the agency’s efforts in finding “closed loops” of cheap burner phones, a major focus for the agency in the wake of the 7/7 London bombings: see the Intercept article How London’s 7/7 Bombings Led to “Unprecedented” Surveillance Tactics, 1 March 2018.
TOP SECRET STRAP1 Graph theory in the operational environment TOP SECRET STRAP1 What I will cover Finding operational closed loops: - The reality of target behaviour - ...

Content Extraction Analytics

Document

This 21 May 2009 presentation from the NSA’s Center for Content Extraction includes a slide that shows that the communications of 122 heads of government were stored in the agency’s central “Target Knowledge Base”, 11 of whom are named. The collection for most of these targets was automated: see the Der Spiegel article ‘A’ for […]
Human Language technology Center for Content Extraction Content Extraction Analytics SIGDEV End-to-End Demo 21 May 2009 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassily On:...

A Little Bad Aibling Nostalgia

Document

This post from the NSA intranet dated 6 April 2001 gives the reactions of staff to the announced closure of the Bad Aibling station in Bavaria (in the event, the NSA retained a presence at the base): see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.
(U//FOUO) A Little Bad Aibling Nostalgia FROM: Some DA Veterans Unknown Run Date: 06/04/2004 (U//FOUO) Once the closure of Bad Aibling Station (located in southern Bavaria in Germany) b...

The FASHIONCLEFT Protocol

Document

This NSA presentation dated 16 October 2008 describes the FASHIONCLEFT protocol used to exfiltrate data from trojans and implants to the agency: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
The Fashioncleft .. Protocol Hi STDP, S32354 “go Itiny-url?q=p5atn” October 16, 2008 TOP SECRET//COMINT//RELTO USA,FVEY 1 | TOP SECRET//COMINT//RELTO USA,FVEY Definition...

European Technical Center Area Checked for Unexploded WWII Ordnance

Document

This internal NSA post from 14 March 2006 describes an incident on 20 December 2005 when what was suspected to be unexplodeded WWII-era ordnance was discovered at an agency facility in Mainz Kastel, Germany: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) European Technical Center Area Checked for Unexploded WWII Ordnance FROM: multiple authors Unknown Run Date: 03/15/2006 (C) The ETC facility was closed for a day while inves...

The Challenge

Document

This extract from an undated NSA presentation to the SIGDEV conference describes on of the agency’s critical internal challenges – the sheer scale of the data it collects: see the book No Place To Hide, 13 May 2014.
Page 151 TOP SECRET//COMINT//REL TO USA, FVEY The Challenge Collection is outpacing our ability to ingest, process and store to the “norms” to which we have become accustomed.

Update software on all Cisco ONS nodes

Document

This NSA report dated 11 April 2014 describes the difficulties with the network switches the agency had compromised on Cisco devices in order to collect data from Cisco customers: see the book No Place To Hide, 13 May 2014.
Page 150 TOP SECRET//COMINT//REL TO USA, FVEY (Report generated on:4/11/2013 3:31:05PM ) NewCrossProgram | Active ECP Count: | i~~| CrossProgram-1-13 New ECP Lead: I name redacted"! ...

Ob DOODY – Mullah Niaz Muhammed – IS3673

Document

This ISAF document from February 2011 provides a record of the helicopter strike on Mullah Niaz Muhammed, which resulted in two innocent civilians being killed: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
a pi ^ Headquarters Task Force HeimanfJ Dynamic Target Storyboard RC(SW) - TFH J3 Tgts - Op STEN TAKAY Obj DOODY - Mullah Niaz Muhammed - IS3673 Unit: TFH J3 Tgts Objective: DOODY B...

Identity Intelligence: Image is Everything

Document

This short excerpt from an undated NSA presentation outlines the potential value of biometric data to the agency: see the New York Times article N.S.A. Collecting Millions of Faces From Web Images, by James Risen and Laura Poitras, 31 May 2014
Identity Intelligence: Image is Everything IDENTITY INTELLIGENCE TOP SECRET//REL TO USA, AUS, CAN, GBR, NZL ...is exploiting pieces of information that are unique to an individual t...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh