DocumentRelease Date: 2014-06-18 Document Date: 2012-04-13
This internal NSA post dated 13 April 2012 from the European Cryptologic Center in Darmstadt, Germany recounts an “XKS training blitz”: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) Dragons, Shrimp, and XKEYSCORE; Tales from the Land of Brothers Grimm European Cryptologic Center, SIGDEV (F22) Run Date: 04/13/2012 (S//REL) The European Cryptologic Center ...
DocumentRelease Date: 2013-10-04 Document Date: 2012-06-01
A presentation entitled ‘Tor Stinks’ outlines the capabilities and difficulties of attacking the Tor anonymity network: see the Guardian article NSA and GCHQ target Tor network that protects anonymity of web users, 4 October 2013.
TOP SECRET//COMINT// REL FVEY Stinks JUN 2012 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20370101 TOP SECRET//COMINT// REL FVEY TOP SECRET//COMINT// REL FVEY To...
DocumentRelease Date: 2014-12-28
This undated GCHQ presentation proposes a deanonymisation attack against Tor users based on the collection of data from exit nodes owned by the agency: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
UK TOP SECRET STRAP1 COMINT A potential technique to deanonymise users of the TOR network OPC-MCR, GCHQ This information is exempt from disclosure under the Freedom of Information Act 20...
This internal NSA post from 14 March 2006 describes an incident on 20 December 2005 when what was suspected to be unexplodeded WWII-era ordnance was discovered at an agency facility in Mainz Kastel, Germany: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) European Technical Center Area Checked for Unexploded WWII Ordnance FROM: multiple authors Unknown Run Date: 03/15/2006 (C) The ETC facility was closed for a day while inves...
DocumentRelease Date: 2014-12-28
This undated page from GCHQ’s internal GCWiki gives an indication of the agency’s thinking on the feasibility of Tor deanonymisation attacks: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOR deanonymisation research (MIP) - GCWiki TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. TOR ...
DocumentRelease Date: 2014-06-18 Document Date: 2010-10-01
This NSA presentation from 1 October 2010 describes RAMPART-A, the agency’s “unconventional special access program”: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 19 June 2014.
RAMPART-A Project Overview 1 October 2010 TOP SECRET//COMINT//NOFORN This briefing is classified TOP SECRET//COMINT//NOF TOP SECRET//COMINT//NOFORN RAMP ART-A Overview Covern...
DocumentRelease Date: 2013-10-30 Document Date: 2013-02-28
An internal Special Source Operations document describes the volume of user account information obtained from Yahoo data centres amid internal NSA complaints about its limited intelligence value: see the Washington Post article NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say, 30 October 2013.
SECRET//SI//REL USA, GBR OUO) WINDSTOP/2P System Highlights MUSCULAR • Minor circuit move, not collection suite move (so-2013-00762) • XKS FP updates across TU systems / NArchiv...
DocumentRelease Date: 2015-09-25 Document Date: 2009-01-01
This GCHQ presentation from 2010 describes the extent of the agency’s cable-tapping and plans for the future: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
200g-iris-access-p1-normal.gif: Supporting Internet Operations Supporting Internet Operations Special Source Access200g-iris-access-p2-normal.gif: StEPM—O MamiOpi«HM> 15 mins to cover:...