DocumentDocument Date: 2013-02-28Release Date: 2013-10-30
An internal Special Source Operations document describes the volume of user account information obtained from Yahoo data centres amid internal NSA complaints about its limited intelligence value: see the Washington Post article NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say, 30 October 2013.
SECRET//SI//REL USA, GBR OUO) WINDSTOP/2P System Highlights MUSCULAR • Minor circuit move, not collection suite move (so-2013-00762) • XKS FP updates across TU systems / NArchiv...
DocumentDocument Date: 2012-04-13Release Date: 2014-06-18
This internal NSA post dated 13 April 2012 from the European Cryptologic Center in Darmstadt, Germany recounts an “XKS training blitz”: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) Dragons, Shrimp, and XKEYSCORE; Tales from the Land of Brothers Grimm European Cryptologic Center, SIGDEV (F22) Run Date: 04/13/2012 (S//REL) The European Cryptologic Center ...
DocumentRelease Date: 2014-12-28
This undated page from GCHQ’s internal GCWiki gives an indication of the agency’s thinking on the feasibility of Tor deanonymisation attacks: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOR deanonymisation research (MIP) - GCWiki TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. TOR ...
DocumentDocument Date: 2009-01-01Release Date: 2015-09-25
This GCHQ presentation from 2010 describes the extent of the agency’s cable-tapping and plans for the future: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
200g-iris-access-p1-normal.gif: Supporting Internet Operations Supporting Internet Operations Special Source Access200g-iris-access-p2-normal.gif: StEPM—O MamiOpi«HM> 15 mins to cover:...
DocumentDocument Date: 2010-10-01Release Date: 2014-06-18
This NSA presentation from 1 October 2010 describes RAMPART-A, the agency’s “unconventional special access program”: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 19 June 2014.
RAMPART-A Project Overview 1 October 2010 TOP SECRET//COMINT//NOFORN This briefing is classified TOP SECRET//COMINT//NOF TOP SECRET//COMINT//NOFORN RAMP ART-A Overview Covern...
DocumentDocument Date: 2012-06-01Release Date: 2013-10-04
A presentation entitled ‘Tor Stinks’ outlines the capabilities and difficulties of attacking the Tor anonymity network: see the Guardian article NSA and GCHQ target Tor network that protects anonymity of web users, 4 October 2013.
TOP SECRET//COMINT// REL FVEY Stinks JUN 2012 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20370101 TOP SECRET//COMINT// REL FVEY TOP SECRET//COMINT// REL FVEY To...
This internal NSA post from 14 March 2006 describes an incident on 20 December 2005 when what was suspected to be unexplodeded WWII-era ordnance was discovered at an agency facility in Mainz Kastel, Germany: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) European Technical Center Area Checked for Unexploded WWII Ordnance FROM: multiple authors Unknown Run Date: 03/15/2006 (C) The ETC facility was closed for a day while inves...
DocumentRelease Date: 2014-12-28
This undated GCHQ presentation proposes a deanonymisation attack against Tor users based on the collection of data from exit nodes owned by the agency: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
UK TOP SECRET STRAP1 COMINT A potential technique to deanonymise users of the TOR network OPC-MCR, GCHQ This information is exempt from disclosure under the Freedom of Information Act 20...