Filtered By
MAINWAY (MW)X
Codewords [filter]
Results
10 Total
1.0

Content acquisition optimisation

Document

Release Date: 2013-10-14
This Special Source Operations presentation describes the NSA’s problems with overcollection of data from email address books and buddy lists: see the Washington Post article NSA collects millions of e-mail address books globally, 14 October 2013.
TOP SECRET//SI//NOFORN Content Acquisition Optimization TOP SECRET//SI//NOFORN TOP SECRET//SI//NOFORN Yahoo Webmessenger • Update data sent to individuals logged into Yahoo's Instan...
1.0

SSO Corporate Portfolio Overview

Document

Release Date: 2015-08-15
This undated NSA presentation, presented together with speaking notes, provides an introduction to the main cable access programmes facilitated by the agency’s corporate partners and specifies the relevant SIGADs: see the book No Place to Hide, 13 May 2014.
 SSO Corporate Portfolio Overview Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20361201 Agenda 2 What is SSO Corporate access collection? (TS//SI//NF) Access an...
1.0

SYNAPSE Data Model

Document

Release Date: 2013-09-28
This slide from an undated NSA presentation demonstrates how the agency uses email and phone data to analyse the social networks of targets (the “Agent” in the diagram): see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, 28 September 2013.
SECRET//SI//REL TO USA FVEY (S//SI//REL USA, FVEY) SYANPSE Data Model CUSSTXATWt SKKTAKOMiNVMl TO US*. M». OK, •». kftj IMM: 1« Paki 5 9 'P>rvr/*»^ <* Page 13 SECRET//SI//R...
1.0

Legalities

Document

Document Date: 2007-10-01Release Date: 2015-09-25
This GCHQ spreadsheet from October 2007 provides a guide to the permissibility of using named GCHQ and NSA databases and shows the absence of safeguards against exploiting the metadata of persons located in the UK: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
As of Oct 2007 Legalities - GCHQ Databases eg Pilbeam. Salamanca, UDAQ etc in the event that both the nabo w/.<V and the location of the tar get is confirmed metadata content UK pers...
1.0

Mobility Business Records Flow Significantly Increases Volume of Records Delivered Under BR FISA

Document

Document Date: 2011-08-30Release Date: 2015-08-15
This 30 August 2011 post from the NSA internal newsletter SSO Weekly reveals that AT&T (FAIRVIEW) began sending over 1.1bn US mobile phone records to the agency every day: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
(TS//SI//NF) Mobility Business Records Flow Significantly Increases Volume of Records Delivered Under BR FISA By^^^^^Hon 2011-08-30 1440 (TS//SI//NF) On 29 August, FAIRVIEW started delivering...
1.0

FAIRVIEW Dataflow Diagrams

Document

Document Date: 2012-04-01Release Date: 2015-08-15
This April 2012 NSA presentation uses an AT&T specific term – Common Backbone or CBB – to refer to the Internet backbone of the corporate partner it codenames FAIRVIEW: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
flip Dataflow Diagrams April 2012 Note: Please refer to previous diagrams for decommissioned systems. Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20361101 Corporate...
1.0

Event (SIGINT)

Document

Release Date: 2015-09-25
This undated page from GCHQ’s internal GCWiki provides a definition of “event”, the term the agency uses to refer to a metadata record, showing the variety of data collected: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
events-p1-normal.gif: SECRET STRAP 1 COMiNT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webtea...
1.0

Events Product Centre

Document

Document Date: 2010-11-01Release Date: 2015-09-25
This GCHQ presentation from November 2010 shows that the agency was logging 30 billion metadata records per day by that year: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
operational-engineering-nov-2010-p1-normal.gif: •¿events Events Product Centre W: CHQ SECRET STRAP1operational-engineering-nov-2010-p2-normal.gif: »¿events Agenda «Welcome «Im...
1.0

PRISM/US-984XN Overview

Document

Document Date: 2013-04-01Release Date: 2013-06-06
Nineteen slides from a 41-slide April 2013 NSA presentation describing the PRISM collection of data via internet service providers, “the SIGAD most used in NSA reporting.” Slides have been published gradually by several media organisations: see the Washington Post article NSA slides explain the PRISM data-collection program, 6 June 2013.
01.jpg: PRISM/U S-984XN Overview OR The SIGAD Used Most in NS A Reporting Overview April 2013 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20360901 OP SECRET/...
1.0

SSO Collection Optimization overview

Document

Document Date: 2012-01-01Release Date: 2013-10-14
This NSA Special Source Operations presentation describes the agency’s collection of webmail address books and contact lists: see the Washington Post article NSA collects millions of e-mail address books globally, 14 October 2013.
TOP SECRET//SI//NOFORN SSO Collection Optimization Core SSO Team: TOP SECRET//SI//NOFORN TOP SECRET//SI//NOFORN Address Books • Email address books for most major webmail are col...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh