DocumentRelease Date: 2015-09-25 Document Date: 2009-03-23
This GCHQ presentation from 23 March 2009 discusses the agency’s plan for “processing Events [metadata] at scale”: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
nge-anyst-exch-redacted-p1-normal.gif: TOP SECRET STRAP 1 Analysis Next Generation Events TOP SECRET STRAP 1 23 March 2009nge-anyst-exch-redacted-p2-normal.gif: TOP SECRET STRAP 1 ...
SSO HIGHLIGHT – Microsoft Skydrive Collection Now Part of PRISM Standard Stored Communications Collection
DocumentRelease Date: 2014-05-13 Document Date: 2013-03-08
This post from NSA’s intranet dated 8 March 2013 announces the addition of Microsoft cloud computing Skydrive data to PRISM, which has been implemented with the company’s active cooperation: see the book No Place To Hide, 13 May 2014.
Page 113 (TS//SI//NF) SSO HIGHLIGHT - Microsoft Skydrive Collection Now Part of PRISM Standard Stored Communications Collection »------------------ NAME REDACTED on 2013-03-08 1500 ...
DocumentRelease Date: 2014-11-25
This undated screenshot from GCHQ’s internal GCWiki provides details of INCENSER, “a GERONTIC delivery from the NIGELLA access” – in other words, a supply of data arranged by Cable & Wireless from a rival company’s infrastructure: see the Süddeutsche Zeitung article Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts, 25 November 2014. Download […]
TOP SECRET STRAP 1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: page PTC Glossary F...
DocumentRelease Date: 2014-12-13 Document Date: 2011-01-01
This 2011 presentation by the head of GCHQ’s Network Analysis Centre outlines the agency’s interest in exploiting telecommunications companies, namely to “get at the data before it is encrypted”: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
TOP SECRET STRAP 2 // REL TO USA, AUS, CAN, GBR, NZL ------m/\cz NETWORK ^IM^ySIS CSfSJTRe Making Network Sense of the encryption problem Roundtable Head of GCHQ NAC This info...
Belgium (BEL/BE), Botswana (BWA/BW), El Salvador (SLV/SV), United Kingdom (GBR/GB), United States (USA/US)
DocumentRelease Date: 2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL PROFILING SSL AND ATTRIBUTING PRIVATE NETWORKS An introduction to FLYING PIG and HUSH PUPPY ICTR - Network Exploitation GCHQ T R J...
CLOUD, JADE, LEGION JADE, LEGION RUBY, MAKERS MARK, XKEYSCORE (XKS), FLYING PIG, HUSH PUPPY, QUICK ANT
Afghanistan (AFG/AF), Korea (KOR/KR), Pakistan (PAK/PK), Russia (RUS/RU), United Kingdom (GBR/GB), United States (USA/US)
DocumentRelease Date: 2014-06-18 Document Date: 2011-03-21
This presentation, prepared for the Pacific SIGDEV Conference in March 2011 describes the organisation, operations and modernisation of the NSA’s Special Collection Service division, which works out of US embassies and consultates across the world, in tandem with the CI see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 […]
TOP SECRET // COMINT // REL TO USA, AUS, CAN, GBR, NZL Special Collection Service Pacific SIGDEV Conference March 2011 The Overall Classification of this Briefing: TOP SECRET//COMIN...
DocumentRelease Date: 2014-12-28 Document Date: 2008-09-01
This September 2008 newsletter from the National Information Assurance Research Laboratory (NIARL), an unit within the NSA’s Research Directorate gives an indication of the agency’s progress with cryptanalysis – which, with “only a handful of in-house techniques” – appears to be modest: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet […]
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 September 2008 Edition ■ (U) Message from the NIARL Director: (U//FOUO) Welcome to the September 2008 edition of the National ...
DocumentRelease Date: 2013-11-04
This Boundless Informant slide shows the number of WINDSTOP records collected day-by-day between 10 December 2012 and 8 January 2013. WINDSTOP covers at least four NSA collection systems that depend on Five Eyes partners; the MUSCULAR project to intercept traffic from Google and Yahoo data centres is representated by the code DS-200B. In the given […]
WINDSTOP- Last 30 Days DNI DNR 600,000,000 -j 500,000,000 - 400,000,000 - 300,000,000 - 200,000,000 - 100,000,000 - 1221 12.-12 12.'15 12-16 1221 12-13 12...
DocumentRelease Date: 2015-09-25 Document Date: 2011-07-01
This GCHQ presentation from July 2011 discusses various technical aspects of “population-scale” datamining: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
cloud-developers-exchange-july-2011-p1-normal.gif: “ICTR Cloud Efforts” developing “canonical” SIGINT analytics, finding hard targets and exploratory data analysis at scale Data Mining Re...
DocumentRelease Date: 2014-06-18
This undated presentation from the NSA’s European Cryptologic Center explains some of the activities of the agency’s main European base: see the Der Spiegel article Terrorverdächtige: NSA nutzte Erkenntnisse aus Deutschland-Filiale für Tötungen, 15 June 2014.
(Uj Running btrategic Analytics Affecting Europe and Africa The overall classification of this briefing is: TOP SECRET//COM INT//REL USA, FVEYS//2D291 Region: Europe, Middle East (Isra...
DocumentRelease Date: 2014-03-20 Document Date: 2012-01-01
A series of casual posts written by a single author stationed in the NSA’s Signals Intelligence Directorate and posted on the agency’s intranet in 2012. Several posts written in December of that year describe the rationale and methodology of targeting systems administrators: see the Intercept article Inside the NSA’s Secret Efforts to Hunt and Hack […]
UHCLASSIFIED//FOUO Copyright! (U) utility of "security conferences" HsFiH(hide) 2012.02.08- 09:53 am Do not reuse this image! (U//F0U0) Caveat: it's been a couple years since I have a...