DocumentRelease Date: 2014-09-14
This undated NSA presentation sets out the network-mapping tool Treasure Map, and supplies information on some of the agency’s collection access points: see the Intercept article New Zealand Launched Mass Surveillance Project While Publicly Denying It, 15 September 2014.
Bad guys are everywhere, good guys are somewhere! NSA/CSS Threat Operations Center (NTOC) NTOC Technology Development TS//SI//REL TO USA, FVEY (U) NTOC • (U//FOUO) Operates under bot...
ASSOCIATION, BLACKPEARL, BYZANTINE, CERNET, DISCOROUTE, HYDROCASTLE, JOLLYROGER, LEAKYFAUCET, MASTERSHAKE, PACKAGEDGOODS (PG), RADIUS, ROUTEVIEWS, RUSTICBAGGAGE, SEASIDEFERRY, SOCIALSTAMP, S-TRICKLER, TOYGRIPPE, TREASUREMAP (TM), TUTELAGE, VITALAIR2, XKEYSCORE (XKS)
Argentina (ARG/AR), Austria (AUT/AT), Brazil (BRA/BR), China (CHN/CN), Denmark (DNK/DK), Germany (DEU/DE), India (IND/IN), Indonesia (IDN/ID), Latvia (LVA/LV), Malaysia (MYS/MY), New Zealand (NZL/NZ), Pakistan (PAK/PK), Poland (POL/PL), Russia (RUS/RU), Singapore (SGP/SG), South Africa (ZAF/ZA), Taiwan (TWN/TW), Thailand (THA/TH), Ukraine (UKR/UA), United States (USA/US)
DocumentRelease Date: 2016-06-28
This undated 81-page NSA presentation and accompanying handdrawn diagram, both produced by the author of ‘I hunt sys admins’ explains how a country’s entire network traffic could be fed into agency systems: see the Intercept article The Hunter, 28 June 2016.
Network-Shaping-101.pdf: TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 Network Shaping 101 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 TOP SECRET...
DocumentRelease Date: 2015-07-01
This undated NSA document provides a decision tree for the analysis of email addresses, IP addresses, cookies and phone numbers in XKeyScore and other agency tools: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//20291123 DNI101 How Do I Begin Analyzing a Target's Email Address? TOP SECRET//COMINT//20291i23 [ =Tool/Database^ What Things Are Found Doing DNI Analysis and What...
DocumentRelease Date: 2015-07-01
This undated NSA document explains how to set up an aspect of the XKeyScore architecture: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
SECRET (U//FOUO) Atomic SIGINT Data Format (ASDF) Configuration Read Me (U) Overview (U//FOUO) The ASDF Configuration Read Me is designed to provide procedures for other organizations ...
DocumentRelease Date: 2014-02-18 Document Date: 2011-07-01
This page from the NSA intranet dated July 2011 supplies advice from the NSA Offices of General Counsel (OGC) and Oversight and Compliance (NOC) on the admissibility of targeting strategies against the users of popular websites (including WikLeaks and the Pirate Bay): see the Intercept article Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed […]
TOP SECRET//SI//REL TO USA, FVEY Navigation Main Page Community portal Recent changes Random page Help Toolbox What links here Related changes Upload file Special pages Printab...
DocumentRelease Date: 2014-05-13
This undated and redacted slide, taken from a presentation given by the NSA and GCHQ, names surveillance targets, some of which appear to be primarily economic in nature: see the book No Place To Hide, 13 May 2014.
Page 135 TOP SECRET//SI//REL TO USA, FVEY Private Networks are Important ) a Many targets use private networks. Google infrastructure SWIFT Network REDACTED REDACTED REDACTED Gazp...
DocumentRelease Date: 2015-08-15
This undated NSA presentation, presented together with speaking notes, provides an introduction to the main cable access programmes facilitated by the agency’s corporate partners and specifies the relevant SIGADs: see the book No Place to Hide, 13 May 2014.
SSO Corporate Portfolio Overview Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 203612011 What is SSO’s Corporate Portfolio? What data can we collect? Where do I go for...
US-990, US-3206, US-3217, US-984, US-3230, US-984X*, US-3247, US-3251, US-3273, US-983, US-3277, US-3140, US-3354, US-3105S1, US-3105S1, US-3150, US-984XR, US-984X2, US-984T, US-984X, US-984X1, US-984P, US-984, US-984, US-984X*, US-3206
BLACKPEARL, BLARNEY, BLUEZEPHYR, CADENCE, COBALTFALCON, COWBOY, DARKTHUNDER, DISHFIRE, FAIRVIEW, OCELOT, MAINWAY (MW), MARINA, MISTRALWIND, MONKEYROCKET, NUCLEON, OAKSTAR, OCTAVE, ORANGEBLOSSOM, ORANGECRUSH, PERFECTSTORM, PINWALE, SERRATEDEDGE, SHIFTINGSHADOW, SILVERZEPHYR (SZ), STEELFLAUTA, STORMBREW, TOYGRIPPE, TWISTEDPATH, WHITESQUALL, XKEYSCORE (XKS), YACHTSHOP, YANKEE
DocumentRelease Date: 2014-12-28
This undated presentation from NSA’s Network Analysis Center describes agency techniques for overcoming Virtual Private Networks (VPNs): see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
(s//si//rel) What Your Mother Never Told You About SIGDEV Analysis^^^^^^^ SSG21 Net Pursuit Network Analysis Center Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 2037040...
USJ-7S9A, DS-2Q0B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-2Q0B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-200B, DS-2003, DS-200E
Armenia (ARM/AM), Hong Kong (HKG/HK), Iran (IRN/IR), Kenya (KEN/KE), Korea (KOR/KR), Malaysia (MYS/MY), Pakistan (PAK/PK), Romania (ROU/RO), Somalia (SOM/SO), Turkey (TUR/TR), United States (USA/US)