DocumentRelease Date: 2014-06-30 Document Date: 2010-07-15
This 2010 certification from the Director of National Intelligence and the Attorney General asserts that procedures are in place to ensure foreign intelligence gathering stays within the boundaries of the law by targeting people “who are reasonably believed to be outside the United States.” The breadth of the authority is, however, very wide, allowing surveillance […]
SECRET//ORCON,NOFORN CERTIFICATION OF THE DIRECTOR OF NATIONAL INTELLIGENCE AND THE ATTORNEY GENERAL PURSUANT TO SUBSECTION 702(g) OF TfififFORpGN INTELLIGENCE SURVEILLANCE ACT OF 1978, AS ...
DocumentRelease Date: 2015-01-17 Document Date: 2012-02-18
This extract from the US Intelligence Community’s Congressional Budget Justification for the Fiscal Year 2013 (the “Black Budget”) provides the budget for GENIE the project “which underpins NSA/CSS’ Computer Network Operations (CNO) Endpoint capabilities conducted by the Tailored Access Operations (TAO) Group: see the Der Spiegel article The Digital Arms Race: NSA Preps America for […]
TOP SECRET//SI/TK//NOFORN (U) COMPUTER NETWORK OPERATIONS (U) GENIE This Exhibit is SECRET//NOFORN FY 20111 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 2013 Base...
DocumentRelease Date: 2015-03-10 Document Date: 2013-01-01
This extract from the US intelligence community’s 2013 Congressional Budget Justification shows expenditure on the Analysis of Target Systems project, which aims to defeat the encryption in commercial software and hardware: see the Intercept article iSpy: The CIA Campaign to Steal Apple’s Secrets, 10 March 2015.
TOP SECRET//SI/TK//NOFORN (U) CRYPTANALYSIS & EXPLOITATION SERVICES (U) ANALYSIS OF TARGET SYSTEMS This Exhibit Is SECRET//NOFORN FY 20111 Actual FY 2012 Enacted FY 2013 Request...
DocumentRelease Date: 2014-09-05 Document Date: 2009-04-01
This April 2009 report from the Office of the Director of National Intelligence considers the challenges the US intelligence community may face by 2025 and suggests that the competitive advantage of US firms may need to be supported by espionage: see the Intercept article The U.S. Government’s Secret Plans to Spy for American Corporations, 5 […]
SECRET//REL T FINAL REPORT '¿[\ns »' National Intelligenc Derived From: ODNI POL-08 Declassify On: 20340306 □ SECRET//REL TO USA, FVEY FINAL REPORT April 2009 □ SECR...
DocumentRelease Date: 2014-08-25 Document Date: 2007-05-15
This ODNI briefing from 15 May 2007 describes the rationale for ICREACH and the scale of metadata sharing that was envisioned: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
This Briefing is Classified TOP SECRET//COMINT//NOFORN//20320108 spates °v — — *i©#0*ie#a*i©#©'i©#©*iC#G*i©#©‘i©#0’i©#0*i©,©,iC#&‘ie#©*iC#3'i©#0*iC#©*ie#©*iC#3 1©#C*’€•©•’€...
DocumentRelease Date: 2014-06-18
This 4-page excerpt from the 2013 Black Budget describes the two elements of NSA’s Foreign Partner Access operations – RAMPART-A and WINSTSTOP – together with their funding: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 18 June 2014.
TOP SECRET//SI/TK//NOFORN (U) SPECIAL SOURCE ACCESS (U) FOREIGN PARTNER ACCESS This Exhibit is SECRET//NOFORN FY 20111 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 201...
DocumentRelease Date: 2015-05-05 Document Date: 2013-01-01
This extract from the 2013 Intelligence Community Budget Justification (“the Black Budget”) outlines the budget for speech recognition technologies: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
TOP SECRET//SI/TK//NOFORN THIS PAGE INTENTIONALLY LEFT BLANK 360 TOP SECRET//SI/TK//NOFORN TOP SECRET//SI/TK//NOFORN (U) RESEARCH & TECHNOLOGY (U) HUMAN LANGUAGE TECHNOLOGY RESEARC...
DocumentRelease Date: 2014-06-30 Document Date: 2010-07-16
This document lists the 193 governments, intragovernmental organisations and other entities which the NSA was granted the legal authority to intercept communications “about” for foreign intelligence purposes in August 2010: see the Washington Post article Court gave NSA broad leeway in surveillance, 30 June 2014.
TOP SECRET//NOFORN EXHIBIT F IN THE MATTER OF FOREIGN GOVERNMENTS, FOREIGN FACTIONS Ns?F^yyiG#i 11- ENTITIES, AND FOREIGN-BASED POLITICAL ORGANIZATIONS >■,, f;f |:VV DNI/AG 70...
Afghanistan (AFG/AF), Albania (ALB/AL), Algeria (DZA/DZ), Andorra (AND/AD), Angola (AGO/AO), Antigua and Barbuda (ATG/AG), Argentina (ARG/AR), Armenia (ARM/AM), Austria (AUT/AT), Azerbaijan (AZE/AZ), Bahamas (BHS/BS), Bangladesh (BGD/BD), Barbados (BRB/BB), Belarus (BLR/BY), Belgium (BEL/BE), Belize (BLZ/BZ), Benin (BEN/BJ), Bhutan (BTN/BT), Bolivia (BOL/BO), Bosnia and Herzegovina (BIH/BA), Botswana (BWA/BW), Brazil (BRA/BR), Bulgaria (BGR/BG), Burkina Faso (BFA/BF), Burundi (BDI/BI), Cambodia (KHM/KH), Cameroon (CMR/CM), Central African Republic (CAF/CF), Chad (TCD/TD), Chile (CHL/CL), China (CHN/CN), Colombia (COL/CO), Comoros (COM/KM), Congo (COD/CD), Costa Rica (CRI/CR), Croatia (HRV/HR), Cuba (CUB/CU), Cyprus (CYP/CY), Czech Republic (CZE/CZ), Denmark (DNK/DK), Djibouti (DJI/DJ), Dominica (DMA/DM), Dominican Republic (DOM/DO), Ecuador (ECU/EC), Egypt (EGY/EG), El Salvador (SLV/SV), Equatorial Guinea (GNQ/GQ), Eritrea (ERI/ER), Estonia (EST/EE), Ethiopia (ETH/ET), Fiji (FJI/FJ), Finland (FIN/FI), France (FRA/FR), Gabon (GAB/GA), Gambia (GMB/GM), Georgia (GEO/GE), Germany (DEU/DE), Ghana (GHA/GH), Greece (GRC/GR), Grenada (GRD/GD), Guatemala (GTM/GT), Guinea (GIN/GN), Guinea-Bissau (GNB/GW), Guyana (GUY/GY), Haiti (HTI/HT), Vatican (VAT/VA), Honduras (HND/HN), Hungary (HUN/HU), Iceland (ISL/IS), India (IND/IN), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Ireland (IRL/IE), Israel (ISR/IL), Italy (ITA/IT), Jamaica (JAM/JM), Japan (JPN/JP), Jordan (JOR/JO), Kazakhstan (KAZ/KZ), Kenya (KEN/KE), Kiribati (KIR/KI), Korea (KOR/KR), Kuwait (KWT/KW), Kyrgyzstan (KGZ/KG), Latvia (LVA/LV), Lebanon (LBN/LB), Lesotho (LSO/LS), Liberia (LBR/LR), Libya (LBY/LY), Liechtenstein (LIE/LI), Lithuania (LTU/LT), Luxembourg (LUX/LU), Macedonia (MKD/MK), Madagascar (MDG/MG), Malawi (MWI/MW), Malaysia (MYS/MY), Maldives (MDV/MV), Mali (MLI/ML), Malta (MLT/MT), Marshall Islands (MHL/MH), Mauritania (MRT/MR), Mauritius (MUS/MU), Mexico (MEX/MX), Micronesia (FSM/FM), Moldova (MDA/MD), Monaco (MCO/MC), Mongolia (MNG/MN), Montenegro (MNE/ME), Morocco (MAR/MA), Mozambique (MOZ/MZ), Myanmar (MMR/MM), Namibia (NAM/NA), Nauru (NRU/NR), Nepal (NPL/NP), Netherlands (NLD/NL), Nicaragua (NIC/NI), Niger (NER/NE), Nigeria (NGA/NG), Norway (NOR/NO), Oman (OMN/OM), Pakistan (PAK/PK), Palau (PLW/PW), Panama (PAN/PA), Papua New Guinea (PNG/PG), Paraguay (PRY/PY), Peru (PER/PE), Philippines (PHL/PH), Poland (POL/PL), Portugal (PRT/PT), Qatar (QAT/QA), Romania (ROU/RO), Russia (RUS/RU), Rwanda (RWA/RW), Saint Kitts and Nevis (KNA/KN), Saint Lucia (LCA/LC), Samoa (WSM/WS), San Marino (SMR/SM), Sao Tome and Principe (STP/ST), Senegal (SEN/SN), Serbia (SRB/RS), Seychelles (SYC/SC), Sierra Leone (SLE/SL), Singapore (SGP/SG), Slovakia (SVK/SK), Slovenia (SVN/SI), Somalia (SOM/SO), South Africa (ZAF/ZA), Spain (ESP/ES), Sri Lanka (LKA/LK), Sudan (SDN/SD), Suriname (SUR/SR), Swaziland (SWZ/SZ), Sweden (SWE/SE), Switzerland (CHE/CH), Taiwan (TWN/TW), Tajikistan (TJK/TJ), Tanzania (TZA/TZ), Thailand (THA/TH), Timor-Leste (TLS/TL), Togo (TGO/TG), Tonga (TON/TO), Tunisia (TUN/TN), Turkey (TUR/TR), Turkmenistan (TKM/TM), Tuvalu (TUV/TV), Uganda (UGA/UG), Ukraine (UKR/UA), United States (USA/US), Uruguay (URY/UY), Uzbekistan (UZB/UZ), Vanuatu (VUT/VU), Venezuela (VEN/VE), Vietnam (VNM/VN), Western Sahara (ESH/EH), Yemen (YEM/YE), Zambia (ZMB/ZM), Zimbabwe (ZWE/ZW)
DocumentRelease Date: 2014-03-18 Document Date: 2013-01-01
This extract from the 2013 Congressional Budget Justification for the National Intelligence Program (the Black Budget) describes the spread of MYSTIC’s “complete access” to other target counries: see the Washington Post article NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls, 18 March 2014.
(U) Project Description (S//SI//REL TO USA, FVEY) The Special Source Operations (SSO) Project provides management oversight and logistical support to the Special Source Access programs. These ...
DocumentRelease Date: 2014-01-02
This excerpt from the Black Budget explains how quantum computing development efforts fit in with NSA projects that aim to break strong encryption (Penetrating Hard Targets) and facilitate offensive operations to compromise target networks (Owning The Net or OTN): see the Washington Post article NSA seeks to build quantum computer that could crack most types […]
Excerpts from the "black budget," Volume 2, "Combined Cryptologic Program": (U) RESEARCH & TECHNOLOGY (U) PENETRATING HARD TARGETS (U) Project Description (S//SI//REL TO USA, FVEY) The...
DocumentRelease Date: 2014-08-25
These extracts from the Congressional Budget Justification for the financial year 2013 show that increased funding was sought for ICREACH: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
[S//REL TO USA. FVEY) Provide 1C analysts with access to a wider set of shareable data through the ICREACH Application. ICREACH allows IC analysts the ability to perform more comprehensive analys...