Results
102 Total
0.0
FAIRVIEW and STORMBREW: ‘Live’ – On the Net
Document
Release Date:
2016-08-10
Document Date:
2003-11-19
This post from internal NSA newsletter SIDToday dated 19 November 2003 provides an early description of FAIRVIEW and STORMBREW, later known as Upstream collection: see the Intercept article Iraqi Insurgents Stymied the NSA and Other Highlights from 263 Internal Agency Reports, 10 August 2016.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(S//SI) FAIRVIEW and STORMBREW: 'Live' - On the Net
FROM: and
Special Source Oper...
0.0
Special Source Operations Weekly – 18 April 2013
Document
Release Date:
2016-08-10
Document Date:
2013-04-18
This extract from the 18 April 2013 edition of the internal NSA newsletter Special Source Operations Weekly provides details of five PRISM reports based on the output of Iranian academics working in the field of medical science. The presentation says the universities “are suspected of being linked to Iranian CBW [chemical and biological warfare] programs”: […]
UNCLASSIFIED//FOR OFFICIAL USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE ONLY
The overall classification of this briefing is:
TOP SECRET//SI//ORCON/NOFORN
Approval for dissemination of infor...
0.0
HIMR Data Mining Research Problem Book
Document
Release Date:
2016-02-02
Document Date:
2011-09-20
This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The […]
UK TOP SECRET STRAP1 COMINT
AUS/CAN/NZ/UK/US EYES ONLY
Reference: OPC-M/TECH.A/455 (v1.0, r206)
Date: 20 September 2011
Copy no:
HIMR Data Mining Research Problem Book
OPC-MCR, G...
0.0
Another Successful Olympics Story
Document
Release Date:
2015-09-29
Document Date:
2004-10-06
This post from the NSA’s internal SIDToday newsletter, dated 6 October 2004, reviews the agency’s operations for the recently-concluded Athens Olympics: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
id-863-redacted-formatted-p1-normal.gif:
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(U) Another Successful Olympics Story
FROM:...
0.0
PullThrough Steering Group Meeting #16
Document
Release Date:
2015-09-25
Document Date:
2008-02-29
This set of GCHQ minutes from 29 February 2008 describes a set of tools that were under development at that point, including the metadata analysis tool KARMA POLICE: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
pull-through-steering-group-minutes-p1-normal.gif:
TOP SECRET STRAP1
THQ/1202THQ/1900/0058
29 February 2008
PullThrough Steering Group Meeting #16
29 February 2008.
Distribute to: In...
0.0
United Nations DNI Collection Enabled
Document
Release Date:
2015-08-15
Document Date:
2012-04-18
This 18 April 2012 post from the NSA internal newsletter SSO Weekly reveals that AT&T (FAIRVIEW) cooperated with the NSA, under the terms of a FISA court order, to enable the agency to surveil the internet traffic going to and from the United Nations headquarters in New York: see the New York Times article AT&T […]
(TS//SI//NF) United Nations DNI Collection Enabled
By on 2012-04-18 0853
(TS//SI//NF) FAIRVIEW and BLARNEY engineers collaborated to enable
the delivery of 700Mbps of paired packet switched t...
0.0
FAIRVIEW Tour
Document
Release Date:
2015-08-15
Document Date:
2012-03-28
This 28 March 2012 post from the NSA internal newsletter SSO Weekly describes the agency’s relationship with AT&T (FAIRVIEW) as “highly collaborative”: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
(TS//SI//REL FVEY) FAIRVIEW Tour
By
on 2012-03-28 1333
(TS//SI//REL FVEY) On 23 March, S3 and GAO Technical Directors: S3
- and
HHHH7an^b^blGINT Lom^^nce and Arcnl^^U^e Lead
I, a...
0.0
XKEYSCORE Workflows 2009
Document
Release Date:
2015-07-01
Document Date:
2009-03-05
This NSA presentation dated 5 March 2009 outlines the use of Workflows within XKeyScore and includes screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-workflows-2009-p1-normal.gif:
XKEYSCORE
Workflows
05 March 2009
i3I
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, MZL
i —*
DERIVED FROM: NSA/CSSM 1-52
DATED: 20070108
...
0.0
Tech Strings in Documents (aka Tech Extractor) 2009
Document
Release Date:
2015-07-01
Document Date:
2009-12-01
This December 2009 NSA presentation explains how keyword selection works within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-tech-extractor-2009-p1-normal.gif:
TOP SECRET//COMINT//REL TO USA. AUS, CAN, GBR. NZU/20291123
Tech Strings in
Documents
(aka Tech Extractor)
December 2009xks-tech-extractor-2009-p2...
0.0
Continued effort against the South Pacific region
Document
Release Date:
2015-03-05
Document Date:
2009-06-06
This extract from the NSA’s minutes of a June 2009 meeting at the agency’s headquarters in Fort Meade, where a GCSB officer was present: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 May 2015.
TOP SECRET//COMINT//REL10 USA, AUS, CAN, GBR, NZL
Continued effort against the South Pacific region - GCSB s access development
activities will be focused on the South Pacific region and entai...
0.0
GCSB has identified an MFA data link
Document
Release Date:
2015-04-19
Document Date:
2013-04-01
This short extract from an April 2013 NSA document describes a “verbal agreement” between GCSB and NSA to proceed with the FROSTBITE / BASILHAYDEN project to infiltrate a Chinese diplomatic data link: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
(TS//SI//NF) New Zealand: GCSB has identified an MFA data link between the
Chinese Consulate and Chinese Visa Office in Auckland. NSA and GCSB have
verbally agreed to move forward with a coopera...
0.0
SUSLOW monthly report for March 2013
Document
Release Date:
2015-04-19
Document Date:
2013-03-01
This monthly report from the NSA’s Special US Liaison Officer in Wellington outlines progress on FROSTBITE (BASILHAYDEN) – a project to infiltrate the Chinese diplomatic computer network: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
| TOP SECRET//SI//REL TO USA, FVEY
(U//FOUO) SUSLOW Monthly Report for March 2013
(U) March highlights:
(U) Intelligence update:
o (S//SI//REL TO USA, FVEY) GCSB project FROSTBITE / TA...
0.0
NSA Activities in Progress 2013
Document
Release Date:
2015-03-05
Document Date:
2013-01-01
This single redacted slide from a 2013 NSA presentation confirms that New Zealand participates in Five Eyes cable access operations and reports the existence of a joint plan to infiltrate a Chinese diplomatic data connection: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 March […]
Snowden3.png:
Key Activities In Progress: Access
New Zealand: Joint effort to exploit Chinese MFA link.
New Zealand: Partner cable access program achieves Phase 1.
TOP SECRET//COMINT//NO...
0.0
XKEYSCORE, Cipher Detection, and You!
Document
Release Date:
2013-12-11
Document Date:
2008-08-21
This presentation from NSA’s Mathematics Research Group, dated 21 August 2008 provides an introduction to the XKeyScore system’s data sources and fingerprinting capabilities: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
xks-cipher-detection-and-you-p1-normal.gif:
TOP SECRET//COMINT//REL TO USA, FVEY
, Cipher Detection, and You!
Mathematics Research Group
21 August 2008
TOP SECRET//COMINT//REL TO USA, F...
0.0
Tracking Targets on Online Social Networks
Document
Release Date:
2014-05-13
Document Date:
2009-09-01
This September 2009 NSA presentation outline some of the insights that analysts can gather from online social networks (OSNs) and show the XKeyScore interface for performing such searches: see the book No Place To Hide, 13 May 2014.
TOP SECRET//COMINT//REL TO USA, FVEY
(S//SI//REL) Tracking
Targets on Online
Social Networks
The overall classification of this briefing to TOP SECRET//COMINT//REL TO USA, FVEY
Online...
0.0
HTTP Activity in XKEYSCORE
Document
Release Date:
2015-07-01
Document Date:
2009-03-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123
HTTP Activity in
XKEYSCORE
March 2009
Derived From: NSA/QSSM 1-52
Dated: 200701 (T
Declassify On: 202911
...
0.0
Email Address vs User Activity
Document
Release Date:
2015-07-01
Document Date:
2009-06-24
This NSA presentation from 24 June 2009 explains how to use the email search functionality within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123
vs User Activity
24 June 2009
"»Ol 01
t » «4
Ha#f* IWt
De rived From: NSA/CSSM 1-52 ...
0.0
FISA: Teaming with the FBI in the Global War on Terrorism
Document
Release Date:
2017-11-30
Document Date:
2005-08-17
This 2005 article from the NSA internal newsletter SIDToday makes it clear that, at that time, 40% of all the agency’s counterterrorism information was drawn from FISA sources, in collaboration with the FBI: see the Intercept article NSA Secretly Helped Convict Defendants in U.S. Courts, 30 November 2017.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(U) FISA: Teaming with the FBI in the Global War on Terrorism
FROM:
Special Source O...
0.0
TEMPORA
Document
Release Date:
2014-06-18
Document Date:
2012-05-21
This page from GCHQ’s internal GCWiki, last edited in May 2012, provides background information on the agency’s “internet buffer business capability”: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
[edit] News
BREAKING NEWS (May 2012) - The second tranche of 'deep dive' processing capability at
RPC has gone live. In addition 2 extra lOG's are being processed at OPC. This brings the curre...
0.0
XKeyScoreTabs XKS Development
Document
Release Date:
2014-06-18
This page from GCHQ’s internal GCWiki provides a guide to the NSA’s XKeyScore tool: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
XKeyscoreTabs XKS Development
Jump to: navigation. search
N BWS
Getting __ .
I Using
an ---- „
XKevscure
Account
Training
XKS
Development
XKS
Cuntacts
Requirem...
0.0
Dragons, Shrimp, and XKEYSCORE: Tales from the Land of Brothers Grimm
Document
Release Date:
2014-06-18
Document Date:
2012-04-13
This internal NSA post dated 13 April 2012 from the European Cryptologic Center in Darmstadt, Germany recounts an “XKS training blitz”: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) Dragons, Shrimp, and XKEYSCORE; Tales from the Land of
Brothers Grimm
European Cryptologic Center, SIGDEV (F22)
Run Date: 04/13/2012
(S//REL) The European Cryptologic Center ...
0.0
BLARNEY Exploits the Social Network via Expanded Facebook Collection
Document
Release Date:
2014-05-13
Document Date:
2011-03-14
This NSA intranet post dated 14 March 2011 describes how Facebook collection capabilities have been augmented with the help of corporate partner BLARNEY (AT&T) and the FBI: see the book No Place To Hide, 13 May 2014.
Page 160
(TS//SI//NF) blarney Exploits the Social Network via
Expanded Facebook Collection
By [ NAMCRfDACTeo | on 2011-03-14 0737
(TS//SI//NF) SSO HIGHLIGHT - BLARNEY Exploits the Social...
0.0
SILVERZEPHYR
Document
Release Date:
2014-05-13
Document Date:
2009-11-06
This internal NSA document dated 6 November 2009 describes work the agency has done with a corporate partner codenamed SILVERZEPHYR to develop collection capabilities in Brazil and Columbia: see the book No Place To Hide, 13 May 2014.
Page 106
SILVERZEPHYR FAA DNI Access Initiated at NSAW (TS//SI//NF)
By
NAME REDACTED
---------------m
on 2009-11-06 0918
(TS//SI//NF) On Thursday, 11/5/09, the SSO-OAKSTAR
SILVE...
0.0
Email Address Queries in XKeyScore
Document
Release Date:
2014-05-13
These two slides demonstrate how email search queries are conducted in XKeyScore: see the book No Place To Hide, 13 May 2014.
email1.jpg:
Page 157
TOP SECRET,VCOWNTflREL TO U8A, AU8, CAN, OBR, NZL
Creating Email Address Queries
Enter usernames and domains into query
Search: Email Addresses
Quary Name ...
0.0
SSO HIGHLIGHT – Microsoft Skydrive Collection Now Part of PRISM Standard Stored Communications Collection
Document
Release Date:
2014-05-13
Document Date:
2013-03-08
This post from NSA’s intranet dated 8 March 2013 announces the addition of Microsoft cloud computing Skydrive data to PRISM, which has been implemented with the company’s active cooperation: see the book No Place To Hide, 13 May 2014.
Page 113
(TS//SI//NF) SSO HIGHLIGHT - Microsoft Skydrive Collection Now Part of
PRISM Standard Stored Communications Collection
»------------------
NAME REDACTED
on 2013-03-08 1500
...
0.0
Potentially Undesirable Images
Document
Release Date:
2014-02-28
Document Date:
2010-01-01
Extracts from a GCHQ’s internal GCWiki, last accessed in 2012, describe some of the privacy implications of the agency’s Optic Nerve tool: see the Guardian article Optic Nerve: millions of Yahoo webcam images intercepted by GCHQ, 28 February 2014.
NSA-ragout-3-001.jpg:
Metadata:
• At the moment OPTIC NERVE’S data supply (run by B13) does not select but
simply collects in bulk, and as a trade-off only collects an image every 5 minutes.
...
0.0
PTC Glossary
Document
Release Date:
2014-11-25
This undated screenshot from GCHQ’s internal GCWiki provides details of INCENSER, “a GERONTIC delivery from the NIGELLA access” – in other words, a supply of data arranged by Cable & Wireless from a rival company’s infrastructure: see the Süddeutsche Zeitung article Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts, 25 November 2014. Download […]
TOP SECRET STRAP 1 COMINT
The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate
content.
For GCWiki help contact: page
PTC Glossary
F...
0.0
India: Support to Terrorist Attacks in Mumbai
Document
Release Date:
2014-12-21
This extract from an undated NSA document claims that GCHQ surveillance of Lashkar-e-Taiba operative Zarrar Shah “yielded a complete operations plan” for the 2008 Mumbai terrorist attacks – but only after the plot had succeeded: see the New York Times article In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted Puzzle, 21 December […]
0.0
X-KEYSCORE as a SIGDEV tool
Document
Release Date:
2015-07-01
Document Date:
2009-01-01
This 2009 NSA presentation describes some of the plug ins available and the way the tool relates to other NSA methods for searching internet metadata, with XKeyScore having the broadest capability: see the book No Place To Hide, 13 May 2014.
xks-as-a-sigdev-tool-p1-normal.gif:
X-KEYSCORE as a SIGDEV tool
2009
■EBTxks-as-a-sigdev-tool-p2-normal.gif:
What is X-KEYSCORE?xks-as-a-sigdev-tool-p3-normal.gif:
TOP SECRET//COMINT//ORC...
0.0
VoIP Configuration and Forwarding Read Me
Document
Release Date:
2015-07-01
This undated NSA technical document describes how to configure XKeyScore to send search results to NUCLEON, the agency’s database for voice data: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
voip-readme-p1-normal.gif:
SECRET//REL TO USA, FVEY
(U) VoIP Configuration
and Forwarding Read Me
(U) Overview
(U//FOUO) In the late 1990s, voice over IP (VoIP) emerged as an alternativ...