DocumentRelease Date: 2016-08-10 Document Date: 2003-11-19
This post from internal NSA newsletter SIDToday dated 19 November 2003 provides an early description of FAIRVIEW and STORMBREW, later known as Upstream collection: see the Intercept article Iraqi Insurgents Stymied the NSA and Other Highlights from 263 Internal Agency Reports, 10 August 2016.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S//SI) FAIRVIEW and STORMBREW: 'Live' - On the Net FROM: and Special Source Oper...
DocumentRelease Date: 2016-08-10 Document Date: 2013-04-18
This extract from the 18 April 2013 edition of the internal NSA newsletter Special Source Operations Weekly provides details of five PRISM reports based on the output of Iranian academics working in the field of medical science. The presentation says the universities “are suspected of being linked to Iranian CBW [chemical and biological warfare] programs”: […]
UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY The overall classification of this briefing is: TOP SECRET//SI//ORCON/NOFORN Approval for dissemination of infor...
DocumentRelease Date: 2016-02-02 Document Date: 2011-09-20
This GCHQ research report dated 20 September 2011, cowritten by researchers at Heilbronn Institute for Mathematical Research based at the University of Bristol, concerns the use of data mining techniques to develop usable intelligence as well as the contradictions that arise from the use of algorithms to identify wrong doers, or potential wrong doers. The […]
UK TOP SECRET STRAP1 COMINT AUS/CAN/NZ/UK/US EYES ONLY Reference: OPC-M/TECH.A/455 (v1.0, r206) Date: 20 September 2011 Copy no: HIMR Data Mining Research Problem Book OPC-MCR, G...
DocumentRelease Date: 2015-09-29 Document Date: 2004-10-06
This post from the NSA’s internal SIDToday newsletter, dated 6 October 2004, reviews the agency’s operations for the recently-concluded Athens Olympics: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
id-863-redacted-formatted-p1-normal.gif: DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Another Successful Olympics Story FROM:...
DocumentRelease Date: 2015-09-25 Document Date: 2008-02-29
This set of GCHQ minutes from 29 February 2008 describes a set of tools that were under development at that point, including the metadata analysis tool KARMA POLICE: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
pull-through-steering-group-minutes-p1-normal.gif: TOP SECRET STRAP1 THQ/1202THQ/1900/0058 29 February 2008 PullThrough Steering Group Meeting #16 29 February 2008. Distribute to: In...
DocumentRelease Date: 2015-08-15 Document Date: 2012-04-18
This 18 April 2012 post from the NSA internal newsletter SSO Weekly reveals that AT&T (FAIRVIEW) cooperated with the NSA, under the terms of a FISA court order, to enable the agency to surveil the internet traffic going to and from the United Nations headquarters in New York: see the New York Times article AT&T […]
(TS//SI//NF) United Nations DNI Collection Enabled By on 2012-04-18 0853 (TS//SI//NF) FAIRVIEW and BLARNEY engineers collaborated to enable the delivery of 700Mbps of paired packet switched t...
DocumentRelease Date: 2015-08-15 Document Date: 2012-03-28
This 28 March 2012 post from the NSA internal newsletter SSO Weekly describes the agency’s relationship with AT&T (FAIRVIEW) as “highly collaborative”: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
(TS//SI//REL FVEY) FAIRVIEW Tour By on 2012-03-28 1333 (TS//SI//REL FVEY) On 23 March, S3 and GAO Technical Directors: S3 - and HHHH7an^b^blGINT Lom^^nce and Arcnl^^U^e Lead I, a...
DocumentRelease Date: 2015-07-01 Document Date: 2009-03-05
This NSA presentation dated 5 March 2009 outlines the use of Workflows within XKeyScore and includes screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-workflows-2009-p1-normal.gif: XKEYSCORE Workflows 05 March 2009 i3I SECRET//COMINT//REL TO USA, AUS, CAN, GBR, MZL i —* DERIVED FROM: NSA/CSSM 1-52 DATED: 20070108 ...
DocumentRelease Date: 2015-07-01 Document Date: 2009-12-01
This December 2009 NSA presentation explains how keyword selection works within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-tech-extractor-2009-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. AUS, CAN, GBR. NZU/20291123 Tech Strings in Documents (aka Tech Extractor) December 2009xks-tech-extractor-2009-p2...
DocumentRelease Date: 2013-12-11 Document Date: 2008-08-21
This presentation from NSA’s Mathematics Research Group, dated 21 August 2008 provides an introduction to the XKeyScore system’s data sources and fingerprinting capabilities: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
xks-cipher-detection-and-you-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, FVEY , Cipher Detection, and You! Mathematics Research Group 21 August 2008 TOP SECRET//COMINT//REL TO USA, F...
DocumentRelease Date: 2014-05-13 Document Date: 2009-09-01
This September 2009 NSA presentation outline some of the insights that analysts can gather from online social networks (OSNs) and show the XKeyScore interface for performing such searches: see the book No Place To Hide, 13 May 2014.
TOP SECRET//COMINT//REL TO USA, FVEY (S//SI//REL) Tracking Targets on Online Social Networks The overall classification of this briefing to TOP SECRET//COMINT//REL TO USA, FVEY Online...
DocumentRelease Date: 2015-07-01 Document Date: 2009-03-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HTTP Activity in XKEYSCORE March 2009 Derived From: NSA/QSSM 1-52 Dated: 200701 (T Declassify On: 202911 ...
Iran (IRN/IR), Iraq (IRQ/IQ), Kuwait (KWT/KW), Lebanon (LBN/LB), Pakistan (PAK/PK), Palestine (PSE/PS), Qatar (QAT/QA), Saudi Arabia (SAU/SA), Turkey (TUR/TR), United Kingdom (GBR/GB), United States (USA/US)
DocumentRelease Date: 2015-07-01 Document Date: 2009-06-24
This NSA presentation from 24 June 2009 explains how to use the email search functionality within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 vs User Activity 24 June 2009 "»Ol 01 t » «4 Ha#f* IWt De rived From: NSA/CSSM 1-52 ...
DocumentRelease Date: 2015-04-19 Document Date: 2013-03-01
This monthly report from the NSA’s Special US Liaison Officer in Wellington outlines progress on FROSTBITE (BASILHAYDEN) – a project to infiltrate the Chinese diplomatic computer network: see the New Zealand Herald article Leaked papers reveal NZ plan to spy on China for US, 19 April 2015.
| TOP SECRET//SI//REL TO USA, FVEY (U//FOUO) SUSLOW Monthly Report for March 2013 (U) March highlights: (U) Intelligence update: o (S//SI//REL TO USA, FVEY) GCSB project FROSTBITE / TA...
DocumentRelease Date: 2015-03-05 Document Date: 2013-01-01
This single redacted slide from a 2013 NSA presentation confirms that New Zealand participates in Five Eyes cable access operations and reports the existence of a joint plan to infiltrate a Chinese diplomatic data connection: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 March […]
Snowden3.png: Key Activities In Progress: Access New Zealand: Joint effort to exploit Chinese MFA link. New Zealand: Partner cable access program achieves Phase 1. TOP SECRET//COMINT//NO...
DocumentRelease Date: 2015-03-05 Document Date: 2009-06-06
This extract from the NSA’s minutes of a June 2009 meeting at the agency’s headquarters in Fort Meade, where a GCSB officer was present: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 May 2015.
TOP SECRET//COMINT//REL10 USA, AUS, CAN, GBR, NZL Continued effort against the South Pacific region - GCSB s access development activities will be focused on the South Pacific region and entai...
DocumentRelease Date: 2014-12-21
This extract from an undated NSA document claims that GCHQ surveillance of Lashkar-e-Taiba operative Zarrar Shah “yielded a complete operations plan” for the 2008 Mumbai terrorist attacks – but only after the plot had succeeded: see the New York Times article In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted Puzzle, 21 December […]
DocumentRelease Date: 2014-11-25
This undated screenshot from GCHQ’s internal GCWiki provides details of INCENSER, “a GERONTIC delivery from the NIGELLA access” – in other words, a supply of data arranged by Cable & Wireless from a rival company’s infrastructure: see the Süddeutsche Zeitung article Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts, 25 November 2014. Download […]
TOP SECRET STRAP 1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: page PTC Glossary F...
DocumentRelease Date: 2014-06-18 Document Date: 2012-05-21
This page from GCHQ’s internal GCWiki, last edited in May 2012, provides background information on the agency’s “internet buffer business capability”: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
 News BREAKING NEWS (May 2012) - The second tranche of 'deep dive' processing capability at RPC has gone live. In addition 2 extra lOG's are being processed at OPC. This brings the curre...
DocumentRelease Date: 2014-06-18
This page from GCHQ’s internal GCWiki provides a guide to the NSA’s XKeyScore tool: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
XKeyscoreTabs XKS Development Jump to: navigation. search N BWS Getting __ . I Using an ---- „ XKevscure Account Training XKS Development XKS Cuntacts Requirem...
DocumentRelease Date: 2014-06-18 Document Date: 2012-04-13
This internal NSA post dated 13 April 2012 from the European Cryptologic Center in Darmstadt, Germany recounts an “XKS training blitz”: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014.
(U//FOUO) Dragons, Shrimp, and XKEYSCORE; Tales from the Land of Brothers Grimm European Cryptologic Center, SIGDEV (F22) Run Date: 04/13/2012 (S//REL) The European Cryptologic Center ...
DocumentRelease Date: 2014-05-13 Document Date: 2011-03-14
This NSA intranet post dated 14 March 2011 describes how Facebook collection capabilities have been augmented with the help of corporate partner BLARNEY (AT&T) and the FBI: see the book No Place To Hide, 13 May 2014.
Page 160 (TS//SI//NF) blarney Exploits the Social Network via Expanded Facebook Collection By [ NAMCRfDACTeo | on 2011-03-14 0737 (TS//SI//NF) SSO HIGHLIGHT - BLARNEY Exploits the Social...
DocumentRelease Date: 2014-05-13 Document Date: 2009-11-06
This internal NSA document dated 6 November 2009 describes work the agency has done with a corporate partner codenamed SILVERZEPHYR to develop collection capabilities in Brazil and Columbia: see the book No Place To Hide, 13 May 2014.
Page 106 SILVERZEPHYR FAA DNI Access Initiated at NSAW (TS//SI//NF) By NAME REDACTED ---------------m on 2009-11-06 0918 (TS//SI//NF) On Thursday, 11/5/09, the SSO-OAKSTAR SILVE...
DocumentRelease Date: 2014-05-13
These two slides demonstrate how email search queries are conducted in XKeyScore: see the book No Place To Hide, 13 May 2014.
email1.jpg: Page 157 TOP SECRET,VCOWNTflREL TO U8A, AU8, CAN, OBR, NZL Creating Email Address Queries Enter usernames and domains into query Search: Email Addresses Quary Name ...
SSO HIGHLIGHT – Microsoft Skydrive Collection Now Part of PRISM Standard Stored Communications Collection
DocumentRelease Date: 2014-05-13 Document Date: 2013-03-08
This post from NSA’s intranet dated 8 March 2013 announces the addition of Microsoft cloud computing Skydrive data to PRISM, which has been implemented with the company’s active cooperation: see the book No Place To Hide, 13 May 2014.
Page 113 (TS//SI//NF) SSO HIGHLIGHT - Microsoft Skydrive Collection Now Part of PRISM Standard Stored Communications Collection »------------------ NAME REDACTED on 2013-03-08 1500 ...
DocumentRelease Date: 2014-02-28 Document Date: 2010-01-01
Extracts from a GCHQ’s internal GCWiki, last accessed in 2012, describe some of the privacy implications of the agency’s Optic Nerve tool: see the Guardian article Optic Nerve: millions of Yahoo webcam images intercepted by GCHQ, 28 February 2014.
NSA-ragout-3-001.jpg: Metadata: • At the moment OPTIC NERVE’S data supply (run by B13) does not select but simply collects in bulk, and as a trade-off only collects an image every 5 minutes. ...
DocumentRelease Date: 2016-06-07 Document Date: 2007-05-08
This GCHQ document dated 8 May 2007 provides technical information about PRESTON, the British system for intercepting the communications of targets under warrant: see the Intercept article Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
SECRET STRAP 1 PRESTON Business Processes Sigmod/00003CPO/4502/SIG010900/23 8 May 2007 PRESTON Business Processes Version 1.0 Synopsis The purpose of this document is to present ...
DocumentRelease Date: 2016-06-07 Document Date: 2009-01-01
This extract from a 2009 GCHQ presentation includes a report on PRESTON, the agency’s programme for intercepting the communications of individuals or organisations who are subject to surveillance warrants. The report found that, in one six-month period, 97% of such communications had not been viewed by the authorities: see the Intercept article Facing Data Deluge, […]
TOP SECRET STRAP 1 DGO and DOC Special TOP SECRET STRAP 1 This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other...
DocumentRelease Date: 2016-05-16 Document Date: 2003-07-05
This post from internal NSA newsletter SIDToday dated 5 July 2003 describes how the agency utilised medical SIGINT to gain insights into the impact of China’s SARS outbreak that year, including details of the partner agencies NSA collaborated with: see the Intercept article How the U.S. Spies on Medical Nonprofits and Health Defenses Worldwide, 10 […]
<p data-reactid=".ti.18.104.22.168.0.1.$0.0" class="SidTodayFilesDetailViewer-pages-page-paragraph">DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR N...