Filtered By
Internet Metadata X
Document Topic [filter]
Results
62 Total
0.0

Third Parties – Last 30 Days

Document

Release Date: 2014-06-18
This Boundless Informant slide shows the number of German phone (DNR) and internet (DNI) records collected day-by-day between 10 December 2012 and 8 January 2013, from Third Party sources. The US-987LA sigad that accounts for the largest number of records is based in Germany: see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with […]
3RD PARTY - Last 30 Days DHR Signal Profile Most Volume Top 5 Techs g fcs IN MAR g MOIP HFCF VSAT FSTH DNI
0.0

SSO – Last 30 days

Document

Release Date: 2014-05-13
This Boundless Informant slide shows the immense number of phone (DNR) and internet (DNI) metadata records collected day-by-day between 10 December 2012 and 8 January 2013 for NSA Special Source Operations from a number of sources including XKeyScore: see the book No Place To Hide, 13 May 2014.
Page 159 SSO - Last 30 Days 2 DNI DNR Signal Profile Most Volume Top 5 Techs fl PCS IN MAR MOIP US-3171: 57.783.148,908 Records XKEYSCORE: 41,996,304.149 Records a Hpc...
0.0

FAIRVIEW – Last 30 days

Document

Release Date: 2014-05-13
This Boundless Informant slide shows the number of phone records collected between 10 December 2012 and 8 January 2013 by NSA’s unidentified corporate partner FAIRVIEW (US-990) – some 6 billion in total: see the book No Place To Hide, 13 May 2014.
Page 105 Dec 10 Dec 17 Dec24 Dec31 Jan ^ Signal Profile H PCS INMAR a WOP a HPCP VSAT PSTN DNI Most Volume US-990 6,142,932,557 Records Top 5 Techs US-990: ...
0.0

Boundless Informant heat maps

Document

Release Date: 2013-06-11 Document Date: 2013-03-26
These undated heat maps show the number of pieces of communications data the NSA gathers per country in a particular 30 day period, divided into telephony (DNR) and internet (DNI) metadata. Details in the second map refer to a period in January 2013 and third to a period ending in February the same year: see […]
boundlessinformant.pdf: Page 93 BOUNDLESSINFORMANT Top 5 Countries (i»t 30 o«>» t-om «¡xu/i ■Ohm.pdf: BOUNDLESSINFORMANT im!MwamHMiM:rta.]a;ii]aaMaiM,(.yiii:am«.'.«M«iMiaiiiiiPH;i!i...
0.0

Blazing Saddles

Document

Release Date: 2015-09-25
This page from GCHQ’s internal GCWiki describes the BLAZING SADDLES tool for handling huge amounts of metadata and the specialised analysis it supports: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
blazing-saddles-tools-p1-normal.gif: TOP SECRET STRAP 1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki h...
0.0

SYNAPSE Data Model

Document

Release Date: 2013-09-28
This slide from an undated NSA presentation demonstrates how the agency uses email and phone data to analyse the social networks of targets (the “Agent” in the diagram): see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, 28 September 2013.
SECRET//SI//REL TO USA FVEY (S//SI//REL USA, FVEY) SYANPSE Data Model CUSSTXATWt SKKTAKOMiNVMl TO US*. M». OK, •». kftj IMM: 1« Paki 5 9 'P>rvr/*»^ <* Page 13 SECRET//SI//R...
0.0

MONKEYROCKET Achieves Initial Operational Capability

Document

Release Date: 2018-03-20 Document Date: 2012-07-24
This extract from the internal NSA newsletter SSO News dated 24 July 2012 describes the start of MONEYROCKET collection, at which point it was recording around 2000 events a day, from a user base concentrated in India and China: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 […]
(TS//SI//NF) MONKEYROCKET Achieves Initial Operational Capability By REDACTED on 2012-07-24 1442 (TS//SI//NF) Special Source Operations-OAKSTAR program MONKEYROCKET, a non- Western Internet an...
0.0

Data Stored in BLACK HOLE

Document

Release Date: 2015-09-25
This undated page from GCHQ’s internal GCWiki provides technical information about the agency’s BLACK HOLE repository: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
data-stored-in-black-hole-p1-normal.gif: TOP SECRET STRAP 1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWi...
0.0

Social Anthropoid

Document

Release Date: 2015-09-25
This undated GCHQ presentation describes SOCIAL ANTHROPOID, a “converged comms database” that analyses metadata from emails, instant messenger chats, social media connections and conversations, together with “telephony” metadata from phone calls, mobile phone locations, text and multimedia messages: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 […]
social-anthropoid-briefing-p1-normal.gif: SECRET STRAP1social-anthropoid-briefing-p2-normal.gif: © What is Social Anthropoid? ■ A CONVERGED CCMMS DATABASE. IT ALLOWS YCU TC SEE WHEN YOUR ...
0.0

Large Scale Expansion of NSA Metadata Sharing

Document

Release Date: 2014-05-13
These two slides, taken from an undated NSA presentation, illustrate the growth in the agency’s metadata collection between 1999 and 2007: see the book No Place To Hide, 13 May 2014.
Page 152 SECRET//CQMINT//REL TO USA, FVEY//203201Q8 Large Scale Expansion of NSA Metadata Sharing (S//SI//REL) Increases NSA communications metadata sharing from 50 billion records to 85...
0.0

Germany – Last 30 days

Document

Release Date: 2013-07-01 Document Date: 2013-01-01
This Boundless Informant slide shows the number of German phone (DNR) and internet (DNI) records collected day-by-day between 10 December 2012 and 8 January 2013, from sources codenamed US-987LA and US-987LB: see the Der Spiegel article How the NSA Targets Germany and Europe, 1 July 2013.
GERMANY. Last 30 Days B 3* B C*<* * ■ 50.000.000 u ftf 40.000.000 - 30.000.000 1 ^ Signal Profile Most Volume Top 5 Techs n US 987LA 47 12i6 8*4 Records ■ ...
0.0

Knowing what we have – Guiding Light

Document

Release Date: 2014-05-13 Document Date: 2011-01-01
This extract from a 2011 GCHQ presentation illustrates the sheer scale (“massive access”) of the agency’s collection operations: see the book No Place To Hide, 13 May 2014.
Page 100 UK TOP SECRET STRAP 1 COMINT REL TO UK/US/AUS/CAN/NZ EYES ONLY Knowing what we have - Guiding Light ■ GCHQ has massive access to international internet communications ■ We re...
0.0

User-agents: Why and How and How to

Document

Release Date: 2015-07-01 Document Date: 2010-07-01
This NSA presentation from July 2010 explains the User-agent options within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
user-agents-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. FVEY (S//SI//REL) User-agents: Why and How and How to The overall classification of this briefing to TOP SECRET//COMINT//REL TO US...
0.0

HTTP Activity vs. User Activity

Document

Release Date: 2015-07-01 Document Date: 2009-06-19
This NSA presentation from 19 June 2009 explains the metadata capabilities of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL m V HTTP Activity vs User Activity 19 June 2009 Derived From: NSA/CSSM 1-52 Bated :l2007i MM TOP SEC...
0.0

Target Detection Identifiers

Document

Release Date: 2015-09-25 Document Date: 2009-03-01
This GCHQ presentation from March 2009 shows that the agency has targeted a number of popular websites in a concerted effort to harvest cookies (“target detection indentifiers”) on a massive scale: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
tdi-introduction-p1-normal.gif: Target Detection Identifiers c This rtcrmation is exempt under the Freedom of Irfbrmation Act 2000 (FOIA) and may be exempt under other UK information legislati...
0.0

Anna Politkovskaya

Document

Release Date: 2016-12-29
This undated entry from the NSA’s internal wiki suggests that the agency discovered an attempt by Russian intelligence to access Anna Politkovskaya’s email account, a year before she was killed in 2006: see the Intercept article Top-Secret Snowden Document Reveals what the NSA Knew about Previous Russian Hacking, 29 December 2016.
(U//FOUO) Anna Politkovskaya a TOP SECRET//SI//NOFORN Contents 1 (U) Biography 2 (U) Murder 2.1 (U) Reaction ■ 2.2 (U) Investigation 2.3 (U) Trial 3 (U) Professional Work ...
0.0

Broadcast/Intenet Radio Exploitation and Analysis

Document

Release Date: 2015-09-25 Document Date: 2009-11-06
This GCHQ research paper from 6 November 2009 outlines what kinds of data the agency can extract from internet radio stations and their listenership, grouped by country: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
broadcast-analysis-p1-normal.gif: UK TOP SECRET//COMINT//REL FVEY Broadcast/lnternet Radio Exploitation and Analysis 6th November 2009 OPD-NAC Distribution (via email) (ST2) BS...
0.0

OAKSTAR Weekly Update – 22 March 2013

Document

Release Date: 2018-03-20 Document Date: 2013-03-01
This internal NSA technical update from March 2013 makes it clear that information from the access point codenamed MONEYROCKET, which tracked Bitcoin users, could be accessed through the agency’s main search interface for analysts, XKeyScore: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
TOP SECRET//COMINT//NOFORN OAKSTAR Weekly Update Program Highlights Week of: March 16-22, 2013 ETS: PRIMECANE Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 T...
0.0

Intelligence Community (IC) Reach Team

Document

Release Date: 2014-08-25 Document Date: 2010-12-01
This extract from a December 2010 NSA memo gives a broad overview of the NSA’s ICREACH middleware, including the participation of Second Party (Five Eyes) partner: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
INTELLIGENCE COMMUNITY (IC) REACH TEAM (C// REL TO USA, FVEY) (Submitted by the SID Technical Director) (C//REL TO USA. FVEY) ICREACH is an NSA information-sharing initiative for customers a...
0.0

WINDSTOP – Last 30 days

Document

Release Date: 2013-11-04
This Boundless Informant slide shows the number of WINDSTOP records collected day-by-day between 10 December 2012 and 8 January 2013. WINDSTOP covers at least four NSA collection systems that depend on Five Eyes partners; the MUSCULAR project to intercept traffic from Google and Yahoo data centres is representated by the code DS-200B. In the given […]
WINDSTOP- Last 30 Days DNI DNR 600,000,000 -j 500,000,000 - 400,000,000 - 300,000,000 - 200,000,000 - 100,000,000 - 1221 12.-12 12.'15 12-16 1221 12-13 12...
0.0

ORANGE CRUSH

Document

Release Date: 2014-05-13
This undated NSA document describes a new data collection stream from Poland, demonstrating how the NSA’s relationships with governments and corporate partners can interact: see the book No Place To Hide, 13 May 2014.
Page 106 (TS//SI//NF) ORANGECRUSH, part of the OAKSTAR program under SSO's corporate portfolio, began forwarding metadata from a third party partner site (Poland) to NSA repositories as of 3 ...
0.0

NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks

Document

Release Date: 2013-09-16 Document Date: 2010-01-01
These three slides from an NSA presentation made for the 2010 SIGDEV conference show that the agency is actively targeting payments networks: see the Der Spiegel article ‘Follow the Money’: NSA Monitors Financial World, 13 September 2013.
(S//REL TO USA, FVEY) NSA: How Network Mapping is Helping to Target the Credit Card Authorization Networks (U//FOUO) NSA, Network Analysis Center 2010 SIGDEV Conference 09/13/13 SE...
0.0

Full Log vs. HTTP

Document

Release Date: 2015-07-01 Document Date: 2009-06-11
This NSA presentation from 11 June 2009 explains the scope of metadata collection within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Log vs. HTTP 11 June 2009 * WHv:i DERIV TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//...
0.0

Finding and Querying on Document Metadata

Document

Release Date: 2015-07-01 Document Date: 2009-04-01
This NSA presentation from April 2009 explains how analysts can make use of document metadata available through XKeyScore, together with worked examples and screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Finding and Querying on Document Metadata tooz|/ 1 Booz|Allen| Hamilton Sigint Development Support / SIGINT Technica...
0.0

Event (SIGINT)

Document

Release Date: 2015-09-25
This undated page from GCHQ’s internal GCWiki provides a definition of “event”, the term the agency uses to refer to a metadata record, showing the variety of data collected: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
events-p1-normal.gif: SECRET STRAP 1 COMiNT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webtea...
0.0

Next Generation Events (NGE) – BLACK HOLE ConOp

Document

Release Date: 2015-09-25 Document Date: 2009-08-18
This GCHQ document from 18 August 2009 describes BLACK HOLE, a massive data repository, and describes how this interacts with other systems developed by the agency: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
nge-black-hole-conop-p1-normal.gif: SECRET STRAP1 18th August 2009 Next Generation Events (NGE) - BLACK HOLE ConOp Author: l(TDB),| l(TSE), I |(TDB) Issue Date Author Amendm...
0.0

ICTR Cloud Effects

Document

Release Date: 2015-09-25 Document Date: 2011-07-01
This GCHQ presentation from July 2011 discusses various technical aspects of “population-scale” datamining: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
cloud-developers-exchange-july-2011-p1-normal.gif: “ICTR Cloud Efforts” developing “canonical” SIGINT analytics, finding hard targets and exploratory data analysis at scale Data Mining Re...
0.0

The Saudi Assassination Plot — How It Was Thwarted

Document

Release Date: 2017-11-30 Document Date: 2005-08-09
In this 2005 article from the internal NSA newsletter SIDToday, an NSA employee credits the agency with securing the conviction of Abdurahman Alamoudi in the Eastern District of Virgina: see the Intercept article NSA Secretly Helped Convict Defendants in U.S. Courts, 30 November 2017.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (S) The Saudi Assassination Plot -- How It Was Thwarted FROM :| DeputyChiefTCustomer...
0.0

SSO dictionary – MONKEYROCKET

Document

Release Date: 2018-03-20
This extract is taken from an undated dictionary produced by NSA Special Source Operations: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
MONKEYROCKET (TS//SI//NF) A pending OAKSTAR access. Collection of full-take data sessions, and user data such as billing information and Internet Protocol addresses of selected CT targets utilizing...
0.0

OAKSTAR Weekly Update – 8 March 2013

Document

Release Date: 2018-03-20 Document Date: 2013-03-01
This internal NSA technical update from March 2013 describes a source of information codenamed MONEYROCKET, which provides data on users of the digital currency Bitcoin: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
TOP SECRET//COMINT//NOFORN OAKSTAR Weekly Update Program Highlights Week of: March 2-8, 2013 ETS: Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 TOP SECRET//COMI...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh