Filtered By
United States (USA/US) X
Countries Mentioned [filter]
Phone Metadata X
Document Topic [filter]
Results
28 Total
0.0

To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; US SIGINT Provides Key Support

Document

Release Date: 2014-12-28 Document Date: 2009-06-12
This 12 June 2009 post from NSA’s internal SIDToday newsletter recounts a German/Afghan targeted operation and its support from the agency: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
SIDToday - To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; U.S. SIGINT Prov... DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS C...
0.0

GSM Temporary Selectors – Breakthroughs in Automated Identification

Document

Release Date: 2018-03-01 Document Date: 2005-07-27
This 2005 post from the NSA’s internal newsletter SIDToday explains how the agency overcame the obfuscation of IMSI codes by mobile phone companies: see the Intercept article NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (TS//SI) GSM Temporary Selectors - Breakthroughs in Automated Identification Target An...
0.0

SHELLTRUMPET Processes it’s One Trillionth Metadata Record

Document

Release Date: 2014-05-13 Document Date: 2012-12-31
This 31 December 2012 post from the NSA’s intranet describes the scale of the metadata records handled by the SHELLTRUMPET analysis tool: see the book No Place To Hide, 13 May 2014.
Page 100 (S//SI//REL TO USA, FVEY) SHELLTRUMPET Processes it|'s One Trillionth Metadata Record (S//SI//REL TO USA, FVEY) On December 21, 2012 SHELLTRUMPET processed its One Trillionth meta...
0.0

For Media Mining the Future Is Now!

Document

Release Date: 2018-01-19 Document Date: 2006-08-01
This 2006 article from the internal NSA newsletter SIDToday describes Voice in Real Time, or Voice RT, a system that allows the agency to automatically identify not just the speaker in a voice intercept, but also their language, gender, and dialect: see the Intercept article Finding Your Voice, 19 January 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) For Media Mining, the Future Is Now! FROM: Joseph Picone and Human Language Techno...
0.0

iPhone Location Services

Document

Release Date: 2013-09-09
These four sides from an undated NSA presentation boast the agency’s ability to access location information from iPhones – and makes fun of the “zombies” whose information is exfiltrated: see the Der Spiegel article iSpy: How the NSA Accesses Smartphone Data, 9 September 2013.
phone1.jpg: TS//SI//REL to USA, FVEY (S//RED iPhone Location Services (U) Who knew in 1984... TS//SI//RELto USA, FVEYphone2.jpg: TS//SI//REL to USA, FVEY (S//REL) iPhone Locatio...
0.0

AURORAGOLD

Document

Release Date: 2014-12-04 Document Date: 2011-01-01
This 4-page NSA document, presented at a Five Eyes SIGDEV conference 2011, gives an overview of the AURORAGOLD (AG) project, in which technical intelligence is gathered to ensure future agency access to mobile phone networks worldwide: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (u//fouo) AURORAGOLD (S//SI//REL) Project Overview: The mission of the AURORAGOLD (AG) project is to maintain data about international GSM/UMT...
0.0

Sharing Communications Metadata Across the US Intelligence Community

Document

Release Date: 2014-08-25 Document Date: 2007-05-15
This ODNI briefing from 15 May 2007 describes the rationale for ICREACH and the scale of metadata sharing that was envisioned: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
This Briefing is Classified TOP SECRET//COMINT//NOFORN//20320108 spates °v — — *i©#0*ie#a*i©#©'i©#©*iC#G*i©#©‘i©#0’i©#0*i©,©,iC#&‘ie#©*iC#3'i©#0*iC#©*ie#©*iC#3 1©#C*’€•©•’€...
0.0

Summary of DNR and DNI Co-Travel Analytics

Document

Release Date: 2013-12-10 Document Date: 2012-10-01
This 24 page white paper dated 1 October 2012 describes and evaluates some of the Co-Traveller tools the NSA and partner agencies uses to analyse phone location data: see the Washington Post article New documents show how the NSA infers relationships based on mobile location data, 10 December 2013.
TOP SECRET//COMINT//REL TO USA, FVEY Summary of DNR and DNI Co-Travel Analytics S2I5 1 October 2012 Contact information TOP SECRET//COMINT//REL TO USA, FVEY TOP SECRET//COMINT//R...
0.0

Boundless Informant heat maps

Document

Release Date: 2013-06-11 Document Date: 2013-03-26
These undated heat maps show the number of pieces of communications data the NSA gathers per country in a particular 30 day period, divided into telephony (DNR) and internet (DNI) metadata. Details in the second map refer to a period in January 2013 and third to a period ending in February the same year: see […]
boundlessinformant.pdf: Page 93 BOUNDLESSINFORMANT Top 5 Countries (i»t 30 o«>» t-om «¡xu/i ■Ohm.pdf: BOUNDLESSINFORMANT im!MwamHMiM:rta.]a;ii]aaMaiM,(.yiii:am«.'.«M«iMiaiiiiiPH;i!i...
0.0

Converged Analysis of Smartphone Devices

Document

Release Date: 2014-01-27 Document Date: 2010-05-01
This NSA presentation from May 2010 describes the kinds of information the agency can extract from smartphone traffic, describing the use of mobile apps as a “golden nugget”. Note that this is the first version of this document released online: see the Pro Publica article Spy Agencies Probe Angry Birds and Other Apps for Personal […]
(U) Converged Analysis of Smartphone Devices Identification/Processing/Tasking - All in a day’s work TOP SECRET//COMINT/REL TO USA, FVEY si Converged mobile devices offering adv...
0.0

SIGINT Analysts: In-flight GSM Is No Joke

Document

Release Date: 2016-12-07 Document Date: 2010-05-18
This 18 May 2010 article from the NSA internal newsletter SIDToday outlines how the agency is reacting to the growth of mobile phone services on board commercial aircraft: see the Intercept article American and British Spy Agencies Targeted In-flight Mobile Phone Use, 7 December 2016.
TOP SECRET//COMINT//RELTO USA, FVEY \\ (U//FOUO) In-Flight GSM S32423/S3T1 The overall classification of this briefing is TOP SECRET//COMTNT//REI, TOP SECRET//COMINT//REL TO USA, FVE...
0.0

SYNAPSE Data Model

Document

Release Date: 2013-09-28
This slide from an undated NSA presentation demonstrates how the agency uses email and phone data to analyse the social networks of targets (the “Agent” in the diagram): see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, 28 September 2013.
SECRET//SI//REL TO USA FVEY (S//SI//REL USA, FVEY) SYANPSE Data Model CUSSTXATWt SKKTAKOMiNVMl TO US*. M». OK, •». kftj IMM: 1« Paki 5 9 'P>rvr/*»^ <* Page 13 SECRET//SI//R...
0.0

Technology That Identifies People by the Sound of Their Voices

Document

Release Date: 2018-01-19 Document Date: 2006-01-04
This January 2006 post from the NSA internal newsletter SIDToday describes advances in voice-recognition technology, which is helping the agency identify the speakers on intercepted Al-Qaeda recordings. The agency is also developing the technology, which can identify a voice speaking multiple languages, to support its emerging Insider Threat Program: see the Intercept article Finding Your […]
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) Technology that Identifies People by the Sound of Their Voices FROM: Adolf Cusmariu...
0.0

Site Makes First-Ever Collect of High-Interest 4G Cellular Signal

Document

Release Date: 2014-12-04 Document Date: 2010-02-23
This 23 Febrauary 2010 post from the internal NSA newsletter SIDToday describes advances in the agency’s capabilities against 4G signals, described as “a very high priority for NSA and the Intelligence Community”: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014. site-makes-first-ever-collect-of-high-interest
(TS//SI//REL) Site Makes First-Ever Collect of High-Interest 4G Cellular Signal FROM: ■HU and ■HUH RAINFALL (F78) Run Date: 02/23/2010 (TS//SI//REL) A collaborative effort between on-sit...
0.0

AURORAGOLD – Target Technology Trends Center/T3C support to WPMO

Document

Release Date: 2014-12-04 Document Date: 2011-01-01
This NSA briefing, given at the Five Eyes SIGDEV conference in 2011, gives an overview of AURORAGOLD data flows: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
S//SI//REL TO USA, FVEY AURORAGDLD (U//FOUO) AURORAGOLD Target Technology Trends Center/T3C support to WPMO Overall briefing classification: S//SI//REL TO USA, FVEY S//SI//REL T...
0.0

IR.21 – A Technology Warning Mechanism

Document

Release Date: 2014-12-04 Document Date: 2010-01-08
This 19-page NSA paper, delivered at the 2010 Five Eyes SIGDEV conference, gives a technical explanation of the importance of sourcing mobile carriers’ roaming agreements (IR.21): see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014. ir21-a-technology-warning-mechanism
(S//REL TO USA, FVEY ) IR.21 - A Technology Warning Mechanism SDC2010 SSG4/T3C Technical Director Derived From: NSA/CSSM 1 -52 Dated: 20070108 Declassify On: 20341201 TOP SE...
0.0

Large Scale Expansion of NSA Metadata Sharing

Document

Release Date: 2014-05-13
These two slides, taken from an undated NSA presentation, illustrate the growth in the agency’s metadata collection between 1999 and 2007: see the book No Place To Hide, 13 May 2014.
Page 152 SECRET//CQMINT//REL TO USA, FVEY//203201Q8 Large Scale Expansion of NSA Metadata Sharing (S//SI//REL) Increases NSA communications metadata sharing from 50 billion records to 85...
0.0

SKYNET: Applying Advanced Cloud-based Behavior Analytics

Document

Release Date: 2015-05-08 Document Date: 2012-01-01
This NSA presentation from 2012 introduces SKYNET, a tool for detecting patterns in bulk phone metadata: see the Intercept article U.S. Government Designated Prominent Al Jazeera Journalist as “Member of Al Qaeda”, 8 May 2015.
SKYNET: Applying Advanced ^loud-b^Jteehavior Analytics i '?$ß Presenters m S2I51 R66F * W : t ' WH^'FromvNSA/eSSM 1452 ( -S ■ • • XV . :.' vDated:.20070108 w . , ; . ■ ...
0.0

SKYNET: Courier Detection via Machine Learning

Document

Release Date: 2015-05-08 Document Date: 2012-06-05
This NSA presentation from 5 June 2012 introduces SKYNET, a tool for detecting patterns in bulk phone metadata: see the Intercept article U.S. Government Designated Prominent Al Jazeera Journalist as “Member of Al Qaeda”, 8 May 2015.
TOP SECRET//COMINT//REL TO USA, FVEY SKYNET: Courier Detection via Machine Learning I, R66F/JHU R66F R66F T1211 |, T1211 S2I51 S2I5/TD June 5, 2012 TOP SECRET//COMINT/...
0.0

The London Bombings — an Insider’s View

Document

Release Date: 2018-03-01 Document Date: 2005-08-24
This 2005 post from the NSA internal newsletter SIDToday gives a personal account of the 7/7 London bombings from the head of the agency’s delegation in London: see the Intercept article How London’s 7/7 Bombings Led to “Unprecedented” Surveillance Tactics, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) The London Bombings -- an Insider's View FROM: Chief ofoperations, SUSLOL London...
0.0

Mission Management Success Stories

Document

Release Date: 2014-03-05
Two images from an NSA presentation describe Dutch-US cooperation in an international mission against Somali pirates in which signals intelligence was used to map contacts and support a naval mission. Identifying and technical details have been redacted: see the NRC Handelsblad article The secret role of the Dutch in the American war on terror, 5 […]
Sheet1.jpg: SECRET//SI//REL TO USA, N LD Mission Management Success Stories (S//SI//RELTO USA, NLP) Collection of Somali) operation to board a Pakistani vessel hijacked by Somali pirat...
0.0

AURORAGOLD Working Group

Document

Release Date: 2014-12-04 Document Date: 2012-06-06
This 26-page NSA document, originally presented at 2012’s Five Eyes SIGDEV conference, gives a detailed overview of the agency’s information gathering on world mobile phone networks. Some intercepted technical and contact details have been redacted: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//SI//REL TO FVEY (U//FOUO) AURORAGOLD Working Group (S//SI//REL) Shaping understanding of the global GSm/uMTS/LTE landscape SIGDEV Conference - 6 June 2012 This briefing is cl...
0.0

Intelligence Community (IC) Reach Team

Document

Release Date: 2014-08-25 Document Date: 2010-12-01
This extract from a December 2010 NSA memo gives a broad overview of the NSA’s ICREACH middleware, including the participation of Second Party (Five Eyes) partner: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
INTELLIGENCE COMMUNITY (IC) REACH TEAM (C// REL TO USA, FVEY) (Submitted by the SID Technical Director) (C//REL TO USA. FVEY) ICREACH is an NSA information-sharing initiative for customers a...
0.0

Mobility Business Records Flow Significantly Increases Volume of Records Delivered Under BR FISA

Document

Release Date: 2015-08-15 Document Date: 2011-08-30
This 30 August 2011 post from the NSA internal newsletter SSO Weekly reveals that AT&T (FAIRVIEW) began sending over 1.1bn US mobile phone records to the agency every day: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
(TS//SI//NF) Mobility Business Records Flow Significantly Increases Volume of Records Delivered Under BR FISA By^^^^^Hon 2011-08-30 1440 (TS//SI//NF) On 29 August, FAIRVIEW started delivering...
0.0

In-Flight GSM

Document

Release Date: 2016-12-07 Document Date: 2009-01-01
This 2009 NSA presentation, based on an internal agency newsletter article from 20 March that year, describes the growth in airlines offering onboard mobile phone services, which the Agency had alreadyu been actively collecting for at least a year: see the Intercept article American and British Spy Agencies Targeted In-flight Mobile Phone Use, 7 December […]
TOP SECRET//COMINT//RELTO USA, FVEY \\ (U//FOUO) In-Flight GSM S32423/S3T1 The overall classification of this briefing is TOP SECRET//COMTNT//REI, TOP SECRET//COMINT//REL TO USA, FVE...
0.0

ICREACH in the Black Budget

Document

Release Date: 2014-08-25
These extracts from the Congressional Budget Justification for the financial year 2013 show that increased funding was sought for ICREACH: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
[S//REL TO USA. FVEY) Provide 1C analysts with access to a wider set of shareable data through the ICREACH Application. ICREACH allows IC analysts the ability to perform more comprehensive analys...
0.0

Sharing of MetaData across the IC —- Dissemination of SIGINT Metadata Beyond NSA

Document

Release Date: 2014-08-25 Document Date: 2005-07-06
This memorandum dated 6 July 2005 describes features of the intelligence sharing systems that preceded ICREACH: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
SECRET//NOFORN//MR UNITED STATES GOVERNMENT memorandum TAC-0xx-05 DATE: 06 July 2005 REPLY TO ATTN OF: TD/TAC SUBJECT: Sharing of MetaData across the IC —Dissemination of SIGINT ...
0.0

Network Tradecraft Advancement Team

Document

Release Date: 2014-12-04 Document Date: 2010-06-10
This GCHQ document from June 2010 describes cooperation between members of the Five Eyes alliance, particularly Canada’s CSEC, on the technical analysis of international mobile phone networks: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
Network Tradecraft Advancement Team (NTAT) 3G > 2nd SCAMP at CSEC process ■ Worked with CSEC H3 developers to implement IRASCIABLE RABBIT into OLYMPIA ■ Developed 41 use cases ■ Devel...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh