DocumentRelease Date: 2015-08-15 Document Date: 2012-04-18
This 18 April 2012 post from the NSA internal newsletter SSO Weekly reveals that AT&T (FAIRVIEW) cooperated with the NSA, under the terms of a FISA court order, to enable the agency to surveil the internet traffic going to and from the United Nations headquarters in New York: see the New York Times article AT&T […]
(TS//SI//NF) United Nations DNI Collection Enabled By on 2012-04-18 0853 (TS//SI//NF) FAIRVIEW and BLARNEY engineers collaborated to enable the delivery of 700Mbps of paired packet switched t...
DocumentRelease Date: 2016-11-16
This screenshot from the NSA’s internal SSO Web provides an introduction to BLARNEY: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
f' SSO Web > (U) BLARNEY Home - Windows Internet Explorer -siOJjsJ H ft *t A Live Search P ’ File Edit View Favorites lools Help Links 0_ (U) Shortened URL Service 0 , PRISM 0 S...
DocumentRelease Date: 2016-11-16 Document Date: 2013-04-23
This NSA technical memo from April 2013 describes deployments of agency personnel to the facility codenamed TITANPOINTE: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
TOP SECRET//COMINT//REL TO USA, FVEY (Report generated on:4/23/2013 7:00:17AM ) Blarney-40-12 Work in Progress ECP Lead: Title of Change: DNI Processing of RINGBILL Access Site(s): TIT...
DocumentRelease Date: 2016-11-16 Document Date: 2013-02-06
This internal document for NSA employees dated 6 February 2013 provides a guide for visiting facilities related with the FAIRVIEW programme, including the TITANPOINTE building in New York City: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20301121 FAIRVIEW TDY Handbook (U) A guide for traveling to Site Last Updated: 6 February 2013 POC: I Derived From: NSA/CSSM 1-52 Date...
DocumentRelease Date: 2014-05-13 Document Date: 2011-03-14
This NSA intranet post dated 14 March 2011 describes how Facebook collection capabilities have been augmented with the help of corporate partner BLARNEY (AT&T) and the FBI: see the book No Place To Hide, 13 May 2014.
Page 160 (TS//SI//NF) blarney Exploits the Social Network via Expanded Facebook Collection By [ NAMCRfDACTeo | on 2011-03-14 0737 (TS//SI//NF) SSO HIGHLIGHT - BLARNEY Exploits the Social...
DocumentRelease Date: 2016-11-16 Document Date: 2011-04-15
This internal document for NSA employees dated 15 April 2011 provides a guide for visiting facilities related with the BLARNEY programme, including the TITANPOINTE building in New York City: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 (U//FOUO) BLARNEY PROGRAM TDY HANDBOOK A Guide For Traveling To Sites (U//FOUO) As of 15 April 2011 (U) The purpose of this TDY...
DocumentRelease Date: 2014-05-13 Document Date: 2013-04-01
This slide, taken from an April 2013 presentation from NSA Special Source Operations, reveals the role played by the agency’s partnership with AT&T (BLARNEY) in surveilling the United Nations: see the book No Place To Hide, 13 May 2014.
Page 142 TOP SECRET//SI//NOFORN (U) OPERATIONAL HIGHLIGHT (TS//SI//NF) BLARNEY Team assists S2C52 analysts in implementing Xkeyscore fingerprints that yield access to U.N. Secretary G...
This NSA report dated 11 April 2014 describes the difficulties with the network switches the agency had compromised on Cisco devices in order to collect data from Cisco customers: see the book No Place To Hide, 13 May 2014.
Page 150 TOP SECRET//COMINT//REL TO USA, FVEY (Report generated on:4/11/2013 3:31:05PM ) NewCrossProgram | Active ECP Count: | i~~| CrossProgram-1-13 New ECP Lead: I name redacted"! ...
DocumentRelease Date: 2014-06-18 Document Date: 2013-03-14
This excerpt from the 14 March 2013 edition of internal NSA newsletter SSO Weekly describes an incident on 12 March where “unwitting” contractors discovered a cable tap known as WHARPDRIVE, which had to be discreetly reinstalled and provides details about the Breckenridge access point that corroborate the identification of the NSA’s corporate partner STORMBREW as […]
UNCLASSIFIED//FOR OFFICIAL USE ONLY 14 MARCH 2013 Special Source Operations Watkly UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY (U) CORPORATE TEAM ...
DocumentRelease Date: 2015-06-04 Document Date: 2012-03-23
This NSA memo from 23 March 2012 presentation describes the agency’s proposal for a fourth FAA 702 certification that would allow it to target hackers “tied to malicious cyber activity”: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
(TS//SI//NF) New FAA702 Certification in the Works - Cyber Threat By on 2012-03-23 1423 (TS//SI//NF) NSA has drafted a new FAA702 Certification to target Cyber Threats. It is close to being r...
DocumentRelease Date: 2015-08-15
This undated NSA Special Source Operations presentation describes the agency’s relationship with corporate partner AT&T, codenamed FAIRVIEW: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
TOP SECRET//SI/OC//NOFORN CAIDVICUU SSO FAIRVIEW Overview TOP SECRET//SI/OC//NOFORN • (U) FAIRVIEW DEFINED • (U) OPERATIONAL AUTHORITIES/CAPABILITIES • (U) STATS: WHO IS USING D...
DocumentRelease Date: 2014-10-10 Document Date: 2004-05-21
This NSA classification guide from 2004 outlines the sensitivity of various aspects of the agency’s WHIPGENIE relationships with US corporate partners: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U//FOUO) CLASSIFICATION GUIDE FOR ECI WfflPGENIE 02-05 Effective Date: 2...
DocumentRelease Date: 2014-05-13 Document Date: 2010-05-20
This internal NSA briefing dated 20 May 2010 shows US diplomatic personnel ‘reaching out’ for signals intelligence to give them an edge in international negotiations and the extent of the agency’s assistance: see the book No Place To Hide, 13 May 2014.
Page 143 (S//SI) BLARNEY Team Provides Outstanding Support to Enable UN Security Council Collection (TS//SI//NF) With the UN vote on sanctions against Iran approaching and several countrie...
DocumentRelease Date: 2015-08-15
This extract is from an undated dictionary produced by NSA Special Source Operations, provides glosses for several terms associated with the corporate partner FAIRVIEW, including the AT&T-specific term ‘SNRC’: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
LITHIUM (TS//SI//NF) BLARNEY'S covername for one of their corporate partners. Need WPG ECI for company name NODDY-3 (TS//SI//NF) FAIRVIEW'S covername for Coverage of Current and Forecasted NR...
DocumentRelease Date: 2015-08-15 Document Date: 2013-03-22
This NSA Special Source Operations presentation from 22 March 2013 supplies a detail about the Breckenridge access point that supports the identification of the corporate partner codenamed STORMBREW as US telecommunications company Verizon: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN TOPSECRET//SI//REL USA, Cyber Threats and Special Source Operations A Current Perspective for NTOC March 22 2013 Classified...
DocumentRelease Date: 2015-08-15
This undated NSA presentation, presented together with speaking notes, provides an introduction to the main cable access programmes facilitated by the agency’s corporate partners and specifies the relevant SIGADs: see the book No Place to Hide, 13 May 2014.
SSO Corporate Portfolio Overview Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 203612011 What is SSO’s Corporate Portfolio? What data can we collect? Where do I go for...
US-990, US-3206, US-3217, US-984, US-3230, US-984X*, US-3247, US-3251, US-3273, US-983, US-3277, US-3140, US-3354, US-3105S1, US-3105S1, US-3150, US-984XR, US-984X2, US-984T, US-984X, US-984X1, US-984P, US-984, US-984, US-984X*, US-3206
BLACKPEARL, BLARNEY, BLUEZEPHYR, CADENCE, COBALTFALCON, COWBOY, DARKTHUNDER, DISHFIRE, FAIRVIEW, OCELOT, MAINWAY (MW), MARINA, MISTRALWIND, MONKEYROCKET, NUCLEON, OAKSTAR, OCTAVE, ORANGEBLOSSOM, ORANGECRUSH, PERFECTSTORM, PINWALE, SERRATEDEDGE, SHIFTINGSHADOW, SILVERZEPHYR (SZ), STEELFLAUTA, STORMBREW, TOYGRIPPE, TWISTEDPATH, WHITESQUALL, XKEYSCORE (XKS), YACHTSHOP, YANKEE
DocumentRelease Date: 2014-10-10 Document Date: 2003-09-12
This document outlines the NSA activities designated as “exceptionally controlled information”, which are only made known to a small number of US officials: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.
TOP SECRET//COMINT//ORCON//NOFORN//X1 NATIONAL SECURITY AGENCY/CENTRAL SERCURITY SERVICE EXCEPTIONALLY CONTROLLED INFORMATION (ECI) AS OF 12 SEPTEMBER 2003 CLASSIFIED BYNSA/CSS MANUAL 12...