DocumentRelease Date: 2014-03-18
This extract from the NSA’s Special Source Operations division’s weekly memo describes the operation of SCALAWAG, the SIGAD (or collection address) associated with the MYSTIC collection of bulk telephony data: see the Washington Post article NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls, 18 March 2014.
(U) Tasking of SCALAWAG (TS//SI//REL TO USA, FVEY) SCALAWAG/US-3310BG has long since reached the point where it was collecting and sending home far more than the bandwidth could handle. Over ...
DocumentRelease Date: 2015-07-01
This undated NSA technical document describes how to configure XKeyScore to send search results to NUCLEON, the agency’s database for voice data: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
voip-readme-p1-normal.gif: SECRET//REL TO USA, FVEY (U) VoIP Configuration and Forwarding Read Me (U) Overview (U//FOUO) In the late 1990s, voice over IP (VoIP) emerged as an alternativ...
DocumentRelease Date: 2014-12-28
This undated NSA presentation from the agency’s Information Technology Directorate, aimed at analysts, describes techniques for decrypting IPSec VPN traffic: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
This Briefing is Classified TOP SECRET//COMINT//REL USA, FVEY Analytic Challenges from Active-Passive Integration S324 This Briefing is Classified TOP SECRET//COMINT//REL USA,FVEY DER...
DocumentRelease Date: 2018-03-01 Document Date: 2006-02-09
This 2006 post from the internal NSA newsletter SIDToday describes the opening of VICTORYGARDEN, a “state-of-the-art FORNSAT site”: see the Intercept article Norway Used NSA Technology for Potentially Illegal Spying, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) Norway Gets FORNSAT Collection Capability On Par With NSA's FROM: FAD's Engineer...
DocumentRelease Date: 2015-07-01 Document Date: 2009-03-01
This NSA presentation from March 2009 shows how VOIP intercepts are handled in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
voip-in-xks-p1-normal.gif: TOP SECRET//COMINT7/REL TO USA. AUS, CAN, GBR, NZL//20291123 VOIP in XKEYSCORE March 2009 TOP SECRET//COMINT//REL TO USA. AUS. CAN, GBR, NZL//20291123voip-in-...
DocumentRelease Date: 2018-01-19 Document Date: 2010-06-02
This February 2010 post from the internal NSA newsletter SIDToday draws attention to voice-masking technology used by subjects of surveillance to frustrate the agency’s voice-recognition efforts: see the Intercept article Finding Your Voice, 19 January 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI//REL) Alvin, Simon, and... Al Qaeda? Finding Modified Voice in SIGINT Traffic F...
DocumentRelease Date: 2018-01-19 Document Date: 2007-10-27
This 26 October 2007 article in the internal NSA newsletter SIDToday describes the agency’s special collection for then-Iranian President Mahmoud Ahmadinejad’s New York City trip for the United Nations General Assembly and provides a detailed study of the technology in action: see the Intercept article Finding Your Voice, 19 January 2018.
TOP SECRET//COMINT//NOFORN//20320108 Friday, October 26, 2007 (U//FOUO) Tips for a Successful Quick Reaction Capability by (U) Collaboration is a way to get the job done. (TS//SI//NF...
DocumentRelease Date: 2018-01-19 Document Date: 2006-02-03
This letters column, published in a 2006 edition of the internal NSA newsletter SIDToday includes one from an analyst who describes the problems with introducing voice recognition technology, which did not function well to begin with: see the Intercept article Finding Your Voice, 19 January 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Letters to the Editor: Still More on Tool Development FROM: the editor Unknown ...
DocumentRelease Date: 2014-03-12
Slides from an NSA Turbulence presentation describe two of the agency’s specialised implants, aimed at compromising virtual private networks (VPNs) and online telephony (VOIP): see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 APEX VPN Phases ► VPN Phase 1: IKE Metadata Only (Spin 15) - IKE packets are exfiled to TURMOIL APEX. ■ APEX reconstructs/r...
DocumentRelease Date: 2015-08-15
This undated NSA presentation, presented together with speaking notes, provides an introduction to the main cable access programmes facilitated by the agency’s corporate partners and specifies the relevant SIGADs: see the book No Place to Hide, 13 May 2014.
SSO Corporate Portfolio Overview Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 203612011 What is SSO’s Corporate Portfolio? What data can we collect? Where do I go for...
US-990, US-3206, US-3217, US-984, US-3230, US-984X*, US-3247, US-3251, US-3273, US-983, US-3277, US-3140, US-3354, US-3105S1, US-3105S1, US-3150, US-984XR, US-984X2, US-984T, US-984X, US-984X1, US-984P, US-984, US-984, US-984X*, US-3206
BLACKPEARL, BLARNEY, BLUEZEPHYR, CADENCE, COBALTFALCON, COWBOY, DARKTHUNDER, DISHFIRE, FAIRVIEW, OCELOT, MAINWAY (MW), MARINA, MISTRALWIND, MONKEYROCKET, NUCLEON, OAKSTAR, OCTAVE, ORANGEBLOSSOM, ORANGECRUSH, PERFECTSTORM, PINWALE, SERRATEDEDGE, SHIFTINGSHADOW, SILVERZEPHYR (SZ), STEELFLAUTA, STORMBREW, TOYGRIPPE, TWISTEDPATH, WHITESQUALL, XKEYSCORE (XKS), YACHTSHOP, YANKEE
DocumentRelease Date: 2014-12-28
This undated page from NSA’s internal WikiInfo describes VALIANTSURF “the coverterm for the development of Data Network Cipher (DNC) exploitation capabilities in TURMOIL”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
VALIANTSURF - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLE//ORCON/PROPIN/RELIDO/REL TO USA, FVEY * TOP SECRET1/SI/10RCON1REL TO USA, FVEY ...
USJ-759, USJ-759A, US-3150, USD-1001TEC, USF-787, USJ-759, USJ-759A, US-3150, US-3301, US-3167, DS-200B, USF-787
CADENCE, CORALREEF, FALLOUT, FISHWAY, ISLANDTRANSPORT (IT), KEYCARD, MAILORDER, MUSCULAR (JPM?), NUCLEON, ONEROOF, PICARESQUE (PIQ), PINWALE, POISON NUT, PRESSUREWAVE, SARATOGA, SCISSORS, TOYGRIPPE, TUBE, TUMULT, TURBULENCE (TU), TURTLEPOWER, XKEYSCORE (XKS)
DocumentRelease Date: 2018-01-19 Document Date: 2008-01-01
This extract from the January 2008 minutes of GCHQ’s Voice/Fax User Group (VFUG) discusses a November 2007 visit to NSA and being shown a version of Voice RT, which is described as a “one-stop shop” for voice-related insights: see the Intercept article Finding Your Voice, 19 January 2018.
SECRET STRAP1 a) Visit to R64, NSA and^^^^^^J from B14 visited our opposite numbers in R64 at NSA during the last week in November. The aim of the visit was threefold: i. to learn about t...
DocumentRelease Date: 2014-12-28 Document Date: 2012-08-01
This NSA document from August 2012 provides guidance for analysts on ordering the PRISM collection of Skype communications, capabilities that were added over the course of 2011: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//NOFORN (TS//SI//NF) User’s Guide For PRISM Skype Collection August 2012 POC For Document: S3531 l. (TS//SI//NF) Introduction a. PRISM Skype collection can be ...