Results
11 Total
0.0
Next Generation Events
Document
Release Date:
2015-09-25
Document Date:
2009-03-23
This GCHQ presentation from 23 March 2009 discusses the agency’s plan for “processing Events [metadata] at scale”: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
nge-anyst-exch-redacted-p1-normal.gif:
TOP SECRET STRAP 1
Analysis
Next Generation Events
TOP SECRET STRAP 1
23 March 2009nge-anyst-exch-redacted-p2-normal.gif:
TOP SECRET STRAP 1
...
0.0
SSO HIGHLIGHT – Microsoft Skydrive Collection Now Part of PRISM Standard Stored Communications Collection
Document
Release Date:
2014-05-13
Document Date:
2013-03-08
This post from NSA’s intranet dated 8 March 2013 announces the addition of Microsoft cloud computing Skydrive data to PRISM, which has been implemented with the company’s active cooperation: see the book No Place To Hide, 13 May 2014.
Page 113
(TS//SI//NF) SSO HIGHLIGHT - Microsoft Skydrive Collection Now Part of
PRISM Standard Stored Communications Collection
»------------------
NAME REDACTED
on 2013-03-08 1500
...
0.0
PTC Glossary
Document
Release Date:
2014-11-25
This undated screenshot from GCHQ’s internal GCWiki provides details of INCENSER, “a GERONTIC delivery from the NIGELLA access” – in other words, a supply of data arranged by Cable & Wireless from a rival company’s infrastructure: see the Süddeutsche Zeitung article Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts, 25 November 2014. Download […]
TOP SECRET STRAP 1 COMINT
The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate
content.
For GCWiki help contact: page
PTC Glossary
F...
0.0
Making Network Sense of the encryption problem
Document
Release Date:
2014-12-13
Document Date:
2011-01-01
This 2011 presentation by the head of GCHQ’s Network Analysis Centre outlines the agency’s interest in exploiting telecommunications companies, namely to “get at the data before it is encrypted”: see the Intercept article Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco, 13 December 2014.
TOP SECRET STRAP 2 // REL TO USA, AUS, CAN, GBR, NZL
------m/\cz
NETWORK ^IM^ySIS CSfSJTRe
Making Network Sense of
the encryption problem
Roundtable
Head of GCHQ NAC
This info...
0.0
Profiling SSL and Attributing Private Networks
Document
Release Date:
2014-12-28
This undated GCHQ presentation introduces the FLYING PIG and HUSH PUPPY tools: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL
PROFILING SSL AND ATTRIBUTING
PRIVATE NETWORKS
An introduction to FLYING PIG and HUSH PUPPY
ICTR - Network Exploitation
GCHQ
T R
J...
0.0
Special Collection Service
Document
Release Date:
2014-06-18
Document Date:
2011-03-21
This presentation, prepared for the Pacific SIGDEV Conference in March 2011 describes the organisation, operations and modernisation of the NSA’s Special Collection Service division, which works out of US embassies and consultates across the world, in tandem with the CI see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 […]
TOP SECRET // COMINT // REL TO USA, AUS, CAN, GBR, NZL
Special Collection Service
Pacific SIGDEV Conference
March 2011
The Overall Classification of this Briefing:
TOP SECRET//COMIN...
0.0
National Information Assurance Research Laboratory (NIARL) Newsletter – September 2008
Document
Release Date:
2014-12-28
Document Date:
2008-09-01
This September 2008 newsletter from the National Information Assurance Research Laboratory (NIARL), an unit within the NSA’s Research Directorate gives an indication of the agency’s progress with cryptanalysis – which, with “only a handful of in-house techniques” – appears to be modest: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet […]
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108
September 2008 Edition
■ (U) Message from the NIARL Director:
(U//FOUO) Welcome to the September 2008 edition of the National
...
0.0
WINDSTOP – Last 30 days
Document
Release Date:
2013-11-04
This Boundless Informant slide shows the number of WINDSTOP records collected day-by-day between 10 December 2012 and 8 January 2013. WINDSTOP covers at least four NSA collection systems that depend on Five Eyes partners; the MUSCULAR project to intercept traffic from Google and Yahoo data centres is representated by the code DS-200B. In the given […]
WINDSTOP- Last 30 Days
DNI
DNR
600,000,000 -j
500,000,000 -
400,000,000 -
300,000,000 -
200,000,000 -
100,000,000 -
1221
12.-12
12.'15 12-16
1221
12-13
12...
0.0
ICTR Cloud Effects
Document
Release Date:
2015-09-25
Document Date:
2011-07-01
This GCHQ presentation from July 2011 discusses various technical aspects of “population-scale” datamining: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
cloud-developers-exchange-july-2011-p1-normal.gif:
“ICTR Cloud Efforts”
developing “canonical” SIGINT
analytics, finding hard targets and
exploratory data analysis at scale
Data Mining Re...
0.0
Running Strategic Analytics Affecting Europe and Africa
Document
Release Date:
2014-06-18
This undated presentation from the NSA’s European Cryptologic Center explains some of the activities of the agency’s main European base: see the Der Spiegel article Terrorverdächtige: NSA nutzte Erkenntnisse aus Deutschland-Filiale für Tötungen, 15 June 2014.
(Uj Running btrategic
Analytics Affecting Europe
and Africa
The overall classification of this briefing is:
TOP SECRET//COM INT//REL USA, FVEYS//2D291
Region: Europe, Middle East
(Isra...
0.0
I Hunt Sys Admins
Document
Release Date:
2014-03-20
Document Date:
2012-01-01
A series of casual posts written by a single author stationed in the NSA’s Signals Intelligence Directorate and posted on the agency’s intranet in 2012. Several posts written in December of that year describe the rationale and methodology of targeting systems administrators: see the Intercept article Inside the NSA’s Secret Efforts to Hunt and Hack […]
UHCLASSIFIED//FOUO
Copyright! (U) utility of "security conferences" HsFiH(hide)
2012.02.08- 09:53 am
Do not reuse
this image!
(U//F0U0) Caveat: it's been a couple years since I have a...