Filtered By
Phone Metadata X
Document Topic [filter]
Results
47 Total
0.0

To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; US SIGINT Provides Key Support

Document

Release Date: 2014-12-28 Document Date: 2009-06-12
This 12 June 2009 post from NSA’s internal SIDToday newsletter recounts a German/Afghan targeted operation and its support from the agency: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
SIDToday - To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; U.S. SIGINT Prov... DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS C...
0.0

Events analysis

Document

Release Date: 2015-09-25 Document Date: 2008-11-27
This GCHQ slide taken from a presentation dates 27 November 2008 confirms that agency metadata repositories can be datamined for information relating to individuals within the UK: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
Events analysis SALAMANCA, HAUSTORIUM, THUGGEE, IMMINGLE less intrusive than communications content authorisation not needed for individuals in the UK necessity and proportionality st...
0.0

PullThrough Steering Group Meeting #16

Document

Release Date: 2015-09-25 Document Date: 2008-02-29
This set of GCHQ minutes from 29 February 2008 describes a set of tools that were under development at that point, including the metadata analysis tool KARMA POLICE: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
pull-through-steering-group-minutes-p1-normal.gif: TOP SECRET STRAP1 THQ/1202THQ/1900/0058 29 February 2008 PullThrough Steering Group Meeting #16 29 February 2008. Distribute to: In...
0.0

Graph theory in the operational environment

Document

This undated presentation from GCHQ’s Information and Communications Technology Research department discusses the agency’s efforts in finding “closed loops” of cheap burner phones, a major focus for the agency in the wake of the 7/7 London bombings: see the Intercept article How London’s 7/7 Bombings Led to “Unprecedented” Surveillance Tactics, 1 March 2018.
TOP SECRET STRAP1 Graph theory in the operational environment TOP SECRET STRAP1 What I will cover Finding operational closed loops: - The reality of target behaviour - ...
0.0

GSM Temporary Selectors – Breakthroughs in Automated Identification

Document

Release Date: 2018-03-01 Document Date: 2005-07-27
This 2005 post from the NSA’s internal newsletter SIDToday explains how the agency overcame the obfuscation of IMSI codes by mobile phone companies: see the Intercept article NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (TS//SI) GSM Temporary Selectors - Breakthroughs in Automated Identification Target An...
0.0

RT10 Initiative Overview

Document

Release Date: 2018-01-19 Document Date: 2006-11-09
This 2006 NSA technical presentation discusses the agency’s Voice RT system for real-time voice recognition and the role voice recordings from US conflict theatres played in developing the system: see the Intercept article Finding Your Voice, 19 January 2018.
TOP SECRET//COMINT//REL RT10 Initiative Overview Dr. James Heath Program Management & Advisors: COL Bob Harms / COL Barb Trent / Michelle Gerhard Architects: / Mark Ross Prese...
0.0

Italy, Spain – Last 30 Days

Document

Release Date: 2013-07-01 Document Date: 2013-01-01
This Boundless Informant slide shows the number of Italian and Spanish phone records collected day-by-day between 10 December 2012 and 8 January 2013: see the Spiegel article How the NSA Targets Germany and Europe, 1 July 2013.
SPAIN - Last 30 Days Q«. c** * ■ ITALY - Last 30 Days Q m D os- % ■ 5.000000 Oec 10 0«:17 C*c24 Otcll Jan
0.0

SHELLTRUMPET Processes it’s One Trillionth Metadata Record

Document

Release Date: 2014-05-13 Document Date: 2012-12-31
This 31 December 2012 post from the NSA’s intranet describes the scale of the metadata records handled by the SHELLTRUMPET analysis tool: see the book No Place To Hide, 13 May 2014.
Page 100 (S//SI//REL TO USA, FVEY) SHELLTRUMPET Processes it|'s One Trillionth Metadata Record (S//SI//REL TO USA, FVEY) On December 21, 2012 SHELLTRUMPET processed its One Trillionth meta...
0.0

For Media Mining the Future Is Now!

Document

Release Date: 2018-01-19 Document Date: 2006-08-01
This 2006 article from the internal NSA newsletter SIDToday describes Voice in Real Time, or Voice RT, a system that allows the agency to automatically identify not just the speaker in a voice intercept, but also their language, gender, and dialect: see the Intercept article Finding Your Voice, 19 January 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) For Media Mining, the Future Is Now! FROM: Joseph Picone and Human Language Techno...
0.0

Human Language Technology in Your Future

Document

Release Date: 2018-01-19 Document Date: 2006-07-20
This 2006 post from the internal NSA newsletter SIDToday describes the agency’s use of voice recognition (Human Language technology) and that it could already be used to label certain conversations as involving a “subject of interest”: see the Intercept article Finding Your Voice, 19 January 2018.
(U) Human-Language Technology in Your Future FROM: Anita H. Kulman Mission Area Director, HLT PMO (S23) Run Date: 07/20/2006 SERIES: (U) HLT (U//FOUO) New tools for analysts to us...
0.0

iPhone Location Services

Document

Release Date: 2013-09-09
These four sides from an undated NSA presentation boast the agency’s ability to access location information from iPhones – and makes fun of the “zombies” whose information is exfiltrated: see the Der Spiegel article iSpy: How the NSA Accesses Smartphone Data, 9 September 2013.
phone1.jpg: TS//SI//REL to USA, FVEY (S//RED iPhone Location Services (U) Who knew in 1984... TS//SI//RELto USA, FVEYphone2.jpg: TS//SI//REL to USA, FVEY (S//REL) iPhone Locatio...
0.0

AURORAGOLD

Document

Release Date: 2014-12-04 Document Date: 2011-01-01
This 4-page NSA document, presented at a Five Eyes SIGDEV conference 2011, gives an overview of the AURORAGOLD (AG) project, in which technical intelligence is gathered to ensure future agency access to mobile phone networks worldwide: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (u//fouo) AURORAGOLD (S//SI//REL) Project Overview: The mission of the AURORAGOLD (AG) project is to maintain data about international GSM/UMT...
0.0

Sharing Communications Metadata Across the US Intelligence Community

Document

Release Date: 2014-08-25 Document Date: 2007-05-15
This ODNI briefing from 15 May 2007 describes the rationale for ICREACH and the scale of metadata sharing that was envisioned: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
This Briefing is Classified TOP SECRET//COMINT//NOFORN//20320108 spates °v — — *i©#0*ie#a*i©#©'i©#©*iC#G*i©#©‘i©#0’i©#0*i©,©,iC#&‘ie#©*iC#3'i©#0*iC#©*ie#©*iC#3 1©#C*’€•©•’€...
0.0

CIA Colleagues Enthusiastically Welcome NSA Training

Document

Release Date: 2014-08-25 Document Date: 2010-09-21
This 21 September 2010 memo from the NSA’s CIA Liaison Support Group reveals that ICREACH is available to “over 1000 analysts across 23 US Intelligence Community agencies”: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
(S//REL) CIA Colleagues Enthusiastically Welcome NSA Training FROM: (U//FOUO)^^^^^^^| Chief, Liaison Support Group at CIA (FBI) Run Date: 09/21/2010 (S//REL) From our perspective - that of...
0.0

SSO GHOSTMACHINE Analytics

Document

Release Date: 2013-12-10
Excerpts from slides describing GHOSTMACHINE, the NSA Special Source Operations cloud-based analytics platform: see the Washington Post article New documents show how the NSA infers relationships based on mobile location data, 10 December 2013.
SSO GHOSTMACHINE Analytics TOP SECRET//COMINT//NOFORN Fascia Limit? 5,000M 4,000M - 3,000M - 2,000M - 1,000M - OM Hitting The Wall Tuskattire Volume Totals H CERF ...
0.0

Summary of DNR and DNI Co-Travel Analytics

Document

Release Date: 2013-12-10 Document Date: 2012-10-01
This 24 page white paper dated 1 October 2012 describes and evaluates some of the Co-Traveller tools the NSA and partner agencies uses to analyse phone location data: see the Washington Post article New documents show how the NSA infers relationships based on mobile location data, 10 December 2013.
TOP SECRET//COMINT//REL TO USA, FVEY Summary of DNR and DNI Co-Travel Analytics S2I5 1 October 2012 Contact information TOP SECRET//COMINT//REL TO USA, FVEY TOP SECRET//COMINT//R...
0.0

Foreign Partners – Last 30 Days

Document

Release Date: 2014-06-18
This Boundless Informant slide shows the number of phone (DNR) and internet (DNI) records collected day-by-day between 10 December 2012 and 8 January 2013, from NSA’s foreign partners: see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.
FOREIGN PARTNER - Last 30 Days DNR DNI 400.000. 000 -| 350.000. 000 - 300.000. 000 - 12-11 121Ö 12'U Dec 10 Dec 17 Dec 24 Dec 31 Jan Signal Profile Mo...
0.0

Third Parties – Last 30 Days

Document

Release Date: 2014-06-18
This Boundless Informant slide shows the number of German phone (DNR) and internet (DNI) records collected day-by-day between 10 December 2012 and 8 January 2013, from Third Party sources. The US-987LA sigad that accounts for the largest number of records is based in Germany: see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with […]
3RD PARTY - Last 30 Days DHR Signal Profile Most Volume Top 5 Techs g fcs IN MAR g MOIP HFCF VSAT FSTH DNI
0.0

SSO – Last 30 days

Document

Release Date: 2014-05-13
This Boundless Informant slide shows the immense number of phone (DNR) and internet (DNI) metadata records collected day-by-day between 10 December 2012 and 8 January 2013 for NSA Special Source Operations from a number of sources including XKeyScore: see the book No Place To Hide, 13 May 2014.
Page 159 SSO - Last 30 Days 2 DNI DNR Signal Profile Most Volume Top 5 Techs fl PCS IN MAR MOIP US-3171: 57.783.148,908 Records XKEYSCORE: 41,996,304.149 Records a Hpc...
0.0

FAIRVIEW – Last 30 days

Document

Release Date: 2014-05-13
This Boundless Informant slide shows the number of phone records collected between 10 December 2012 and 8 January 2013 by NSA’s unidentified corporate partner FAIRVIEW (US-990) – some 6 billion in total: see the book No Place To Hide, 13 May 2014.
Page 105 Dec 10 Dec 17 Dec24 Dec31 Jan ^ Signal Profile H PCS INMAR a WOP a HPCP VSAT PSTN DNI Most Volume US-990 6,142,932,557 Records Top 5 Techs US-990: ...
0.0

Boundless Informant heat maps

Document

Release Date: 2013-06-11 Document Date: 2013-03-26
These undated heat maps show the number of pieces of communications data the NSA gathers per country in a particular 30 day period, divided into telephony (DNR) and internet (DNI) metadata. Details in the second map refer to a period in January 2013 and third to a period ending in February the same year: see […]
boundlessinformant.pdf: Page 93 BOUNDLESSINFORMANT Top 5 Countries (i»t 30 o«>» t-om «¡xu/i ■Ohm.pdf: BOUNDLESSINFORMANT im!MwamHMiM:rta.]a;ii]aaMaiM,(.yiii:am«.'.«M«iMiaiiiiiPH;i!i...
0.0

Converged Analysis of Smartphone Devices

Document

Release Date: 2014-01-27 Document Date: 2010-05-01
This NSA presentation from May 2010 describes the kinds of information the agency can extract from smartphone traffic, describing the use of mobile apps as a “golden nugget”. Note that this is the first version of this document released online: see the Pro Publica article Spy Agencies Probe Angry Birds and Other Apps for Personal […]
(U) Converged Analysis of Smartphone Devices Identification/Processing/Tasking - All in a day’s work TOP SECRET//COMINT/REL TO USA, FVEY si Converged mobile devices offering adv...
0.0

SIGINT Analysts: In-flight GSM Is No Joke

Document

Release Date: 2016-12-07 Document Date: 2010-05-18
This 18 May 2010 article from the NSA internal newsletter SIDToday outlines how the agency is reacting to the growth of mobile phone services on board commercial aircraft: see the Intercept article American and British Spy Agencies Targeted In-flight Mobile Phone Use, 7 December 2016.
TOP SECRET//COMINT//RELTO USA, FVEY \\ (U//FOUO) In-Flight GSM S32423/S3T1 The overall classification of this briefing is TOP SECRET//COMTNT//REI, TOP SECRET//COMINT//REL TO USA, FVE...
0.0

SYNAPSE Data Model

Document

Release Date: 2013-09-28
This slide from an undated NSA presentation demonstrates how the agency uses email and phone data to analyse the social networks of targets (the “Agent” in the diagram): see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, 28 September 2013.
SECRET//SI//REL TO USA FVEY (S//SI//REL USA, FVEY) SYANPSE Data Model CUSSTXATWt SKKTAKOMiNVMl TO US*. M». OK, •». kftj IMM: 1« Paki 5 9 'P>rvr/*»^ <* Page 13 SECRET//SI//R...
0.0

Technology That Identifies People by the Sound of Their Voices

Document

Release Date: 2018-01-19 Document Date: 2006-01-04
This January 2006 post from the NSA internal newsletter SIDToday describes advances in voice-recognition technology, which is helping the agency identify the speakers on intercepted Al-Qaeda recordings. The agency is also developing the technology, which can identify a voice speaking multiple languages, to support its emerging Insider Threat Program: see the Intercept article Finding Your […]
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) Technology that Identifies People by the Sound of Their Voices FROM: Adolf Cusmariu...
0.0

Site Makes First-Ever Collect of High-Interest 4G Cellular Signal

Document

Release Date: 2014-12-04 Document Date: 2010-02-23
This 23 Febrauary 2010 post from the internal NSA newsletter SIDToday describes advances in the agency’s capabilities against 4G signals, described as “a very high priority for NSA and the Intelligence Community”: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014. site-makes-first-ever-collect-of-high-interest
(TS//SI//REL) Site Makes First-Ever Collect of High-Interest 4G Cellular Signal FROM: ■HU and ■HUH RAINFALL (F78) Run Date: 02/23/2010 (TS//SI//REL) A collaborative effort between on-sit...
0.0

AURORAGOLD – Target Technology Trends Center/T3C support to WPMO

Document

Release Date: 2014-12-04 Document Date: 2011-01-01
This NSA briefing, given at the Five Eyes SIGDEV conference in 2011, gives an overview of AURORAGOLD data flows: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
S//SI//REL TO USA, FVEY AURORAGDLD (U//FOUO) AURORAGOLD Target Technology Trends Center/T3C support to WPMO Overall briefing classification: S//SI//REL TO USA, FVEY S//SI//REL T...
0.0

IR.21 – A Technology Warning Mechanism

Document

Release Date: 2014-12-04 Document Date: 2010-01-08
This 19-page NSA paper, delivered at the 2010 Five Eyes SIGDEV conference, gives a technical explanation of the importance of sourcing mobile carriers’ roaming agreements (IR.21): see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014. ir21-a-technology-warning-mechanism
(S//REL TO USA, FVEY ) IR.21 - A Technology Warning Mechanism SDC2010 SSG4/T3C Technical Director Derived From: NSA/CSSM 1 -52 Dated: 20070108 Declassify On: 20341201 TOP SE...
0.0

New Tactical Collection System Joins the War on Terrorism

Document

Release Date: 2014-02-10 Document Date: 2005-03-03
This extract from a 3 March 2005 NSA briefing acknowledges that the use of geolocation technology to facilitate drone strikes “represents the dawn of a new era”: see the Intercept article The NSA’s Secret Role in the U.S. Assassination Program, 10 February 2014.
(S) New Tactical Collection System Joins the War on Terrorism (repost) FROM: name redacted Technical Advisor, Target Reconnaissance and Survey (S316) Run Date: 03/03/2005 DISTANTFOCUS po...
0.0

Large Scale Expansion of NSA Metadata Sharing

Document

Release Date: 2014-05-13
These two slides, taken from an undated NSA presentation, illustrate the growth in the agency’s metadata collection between 1999 and 2007: see the book No Place To Hide, 13 May 2014.
Page 152 SECRET//CQMINT//REL TO USA, FVEY//203201Q8 Large Scale Expansion of NSA Metadata Sharing (S//SI//REL) Increases NSA communications metadata sharing from 50 billion records to 85...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh