Results
2176 Total
Germany – Last 30 days
Document
Release Date:
2013-07-01
Document Date:
2013-01-01
This Boundless Informant slide shows the number of German phone (DNR) and internet (DNI) records collected day-by-day between 10 December 2012 and 8 January 2013, from sources codenamed US-987LA and US-987LB: see the Der Spiegel article How the NSA Targets Germany and Europe, 1 July 2013.
GERMANY. Last 30 Days
B 3* B C*<*
* ■
50.000.000
u
ftf
40.000.000 -
30.000.000 1
^ Signal Profile
Most Volume
Top 5 Techs
n
US 987LA 47 12i6 8*4 Records
■
...
The Netherlands, France – Last 30 days
Document
Release Date:
2013-07-01
Document Date:
2013-01-01
This Boundless Informant slide shows the number of Dutch and French phone records collected day-by-day between 10 December 2012 and 8 January 2013: see the Spiegel article How the NSA Targets Germany and Europe, 1 July 2013.
NETHERLANDS - Last 30 Days
□ CN {3 c**
■
350.000
300 000 ■
250.000 •
200.000 -
150.000 •
100.000 •
50000 -
0
sa w
i
Ml
0«<10
C«<17
Oec...
DROPMIRE
Document
Release Date:
2013-06-30
Document Date:
2007-01-01
This redacted slide from a 2007 NSA presentation describes NSA operations against the EU embassy in Washington DC: see the Guardian article New NSA leaks show how US is bugging its European allies, 30 June 2013.
DROPMIRE
-DROPMIRE implanted on the Cryptofax at the EU Embassy D.C.
The EU pass diplomatic cables via this system back to the MI A.
Access to the future
Document
Release Date:
2013-06-21
This concluding slide from an undated GCHQ presentation on Tempora reminds analysts that they are in a “enviable” and “privileged” position – “you have access to a lot of sensitive data… have fun and make the most of it”: see the Guardian article Mastering the internet: how GCHQ set out to spy on the world […]
Conclusion
TOP SECRET STRAP1
® You are in a privileged position — repay that trust,
o You have ready access to a lot of sensitive data,
o Understand your legal obligations — don’t become a...
JSA Restrictions
Document
Release Date:
2013-06-18
This undated article from GCHQ’s internal GCWIki gives technical details about the US-German Joint Sigint Activity group: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
TOP SECRET STRAP 1 COMINT
JSA Restrictions
Access
Central:
Targeting
Tar g e tin g and selector
□ AC Logo Red. png management are services
that Access Central
offers. This in...
Boundless Informant heat maps
Document
Release Date:
2013-06-11
Document Date:
2013-03-26
These undated heat maps show the number of pieces of communications data the NSA gathers per country in a particular 30 day period, divided into telephony (DNR) and internet (DNI) metadata. Details in the second map refer to a period in January 2013 and third to a period ending in February the same year: see […]
boundlessinformant.pdf:
Page 93
BOUNDLESSINFORMANT
Top 5 Countries (i»t 30 o«>» t-om «¡xu/i
■Ohm.pdf:
BOUNDLESSINFORMANT
im!MwamHMiM:rta.]a;ii]aaMaiM,(.yiii:am«.'.«M«iMiaiiiiiPH;i!i...
Web Forum Exploitation using XKEYSCORE
Document
Release Date:
2009-07-01
This NSA presentation from July 2009 describes the kinds of information drawn from online forums that can be accessed in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
web-forum-exploitation-using-xks-p1-normal.gif:
OPSECRET//COMINT//REL TO USA, AUS. CAN, GBR, NZL
Web Forum Exploitation
using XKEYSCORE
S2I7
July 2009
TOP SECRET//COMINT//REL TO USA,...
Graph theory in the operational environment
Document
This undated presentation from GCHQ’s Information and Communications Technology Research department discusses the agency’s efforts in finding “closed loops” of cheap burner phones, a major focus for the agency in the wake of the 7/7 London bombings: see the Intercept article How London’s 7/7 Bombings Led to “Unprecedented” Surveillance Tactics, 1 March 2018.
TOP SECRET STRAP1
Graph theory in the operational
environment
TOP SECRET STRAP1
What I will cover
Finding operational closed loops:
- The reality of target behaviour
- ...
Content Extraction Analytics
Document
This 21 May 2009 presentation from the NSA’s Center for Content Extraction includes a slide that shows that the communications of 122 heads of government were stored in the agency’s central “Target Knowledge Base”, 11 of whom are named. The collection for most of these targets was automated: see the Der Spiegel article ‘A’ for […]
Human Language
technology
Center for Content Extraction
Content Extraction Analytics
SIGDEV End-to-End Demo
21 May 2009
Derived From: NSA/CSSM 1-52
Dated: 20070108
Declassily On:...
A Little Bad Aibling Nostalgia
Document
This post from the NSA intranet dated 6 April 2001 gives the reactions of staff to the announced closure of the Bad Aibling station in Bavaria (in the event, the NSA retained a presence at the base): see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.
(U//FOUO) A Little Bad Aibling Nostalgia
FROM: Some DA Veterans
Unknown
Run Date: 06/04/2004
(U//FOUO) Once the closure of Bad Aibling Station (located in southern Bavaria in
Germany) b...
The FASHIONCLEFT Protocol
Document
This NSA presentation dated 16 October 2008 describes the FASHIONCLEFT protocol used to exfiltrate data from trojans and implants to the agency: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
The
Fashioncleft
.. Protocol
Hi STDP, S32354
“go Itiny-url?q=p5atn”
October 16, 2008
TOP SECRET//COMINT//RELTO USA,FVEY
1
| TOP SECRET//COMINT//RELTO USA,FVEY
Definition...
European Technical Center Area Checked for Unexploded WWII Ordnance
Document
This internal NSA post from 14 March 2006 describes an incident on 20 December 2005 when what was suspected to be unexplodeded WWII-era ordnance was discovered at an agency facility in Mainz Kastel, Germany: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) European Technical Center Area Checked for Unexploded WWII
Ordnance
FROM: multiple authors
Unknown
Run Date: 03/15/2006
(C) The ETC facility was closed for a day while inves...
The Challenge
Document
This extract from an undated NSA presentation to the SIGDEV conference describes on of the agency’s critical internal challenges – the sheer scale of the data it collects: see the book No Place To Hide, 13 May 2014.
Page 151
TOP SECRET//COMINT//REL TO USA, FVEY
The Challenge
Collection is outpacing our ability to ingest, process and
store to the “norms” to which we have become
accustomed.
Update software on all Cisco ONS nodes
Document
This NSA report dated 11 April 2014 describes the difficulties with the network switches the agency had compromised on Cisco devices in order to collect data from Cisco customers: see the book No Place To Hide, 13 May 2014.
Page 150
TOP SECRET//COMINT//REL TO USA, FVEY
(Report generated on:4/11/2013 3:31:05PM )
NewCrossProgram | Active ECP Count: | i~~|
CrossProgram-1-13 New ECP Lead: I name redacted"!
...
Ob DOODY – Mullah Niaz Muhammed – IS3673
Document
This ISAF document from February 2011 provides a record of the helicopter strike on Mullah Niaz Muhammed, which resulted in two innocent civilians being killed: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
a
pi ^
Headquarters
Task Force HeimanfJ
Dynamic Target Storyboard
RC(SW) - TFH J3 Tgts - Op STEN TAKAY
Obj DOODY - Mullah Niaz Muhammed - IS3673
Unit: TFH J3 Tgts Objective: DOODY B...
Identity Intelligence: Image is Everything
Document
This short excerpt from an undated NSA presentation outlines the potential value of biometric data to the agency: see the New York Times article N.S.A. Collecting Millions of Faces From Web Images, by James Risen and Laura Poitras, 31 May 2014
Identity Intelligence:
Image is Everything
IDENTITY
INTELLIGENCE
TOP SECRET//REL TO USA, AUS, CAN, GBR, NZL
...is exploiting pieces of
information that are unique
to an individual t...