DocumentDocument Date: 2012-01-01Release Date: 2015-05-21
This 2012 presentation from the Network Tradecraft Advancement Team (NTAT), a joint Five Eyes surveillance unit, discusses options for installing malware on smartphones in light of the challenge posed by the Arab Spring: see the CBC News article Spy agencies target mobile phones, app stores to implant spyware, 21 May 2015.
Synergising Network Analysis Tradecraft Network Tradecraft Advancement Team (NTAT) Overview TOP SECRET//SI Tradecraft? Tradecraft • “The development of methods, techni...
DocumentDocument Date: 2009-05-01Release Date: 2015-07-01
This NSA presentation from May 2009 describes the procedure for analysing phone data within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015. analyzing-mobile-cellular-dni-in-xks
Analyzing Mobile/Cellular DNI in XKEYSCORE May 2009 TOP SECRET//COMINT//REL TO USA, AUS, CAN. GBR. NZL//20291123 08 TOP SECRET/,'COMINT//REL TO USA, AUS, CAN, GBR, NZL Mobile DNI ...
DocumentDocument Date: 2012-04-01Release Date: 2015-08-15
This April 2012 NSA presentation uses an AT&T specific term – Common Backbone or CBB – to refer to the Internet backbone of the corporate partner it codenames FAIRVIEW: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
flip Dataflow Diagrams April 2012 Note: Please refer to previous diagrams for decommissioned systems. Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20361101 Corporate...
BUGCATCHER, CADENCE, CLEARSIGHT, COURIERSKILL, DISHFIRE, FAIRVIEW, FALLOUT, FASCIA, FISHWAY, GATEKEEP, HIGHDECIBEL, MAILORDER, MAINWAY (MW), MARINA, MESA, PINECONE, PINWALE, RAGTIME (RGT), RIMROCK, SCISSORS, TOPROCK, WEALTHYCLUSTER (WC), XKEYSCORE (XKS), YANKEE
DocumentDocument Date: 2013-03-22Release Date: 2015-08-15
This NSA Special Source Operations presentation from 22 March 2013 supplies a detail about the Breckenridge access point that supports the identification of the corporate partner codenamed STORMBREW as US telecommunications company Verizon: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN TOPSECRET//SI//REL USA, Cyber Threats and Special Source Operations A Current Perspective for NTOC March 22 2013 Classified...
DocumentRelease Date: 2013-12-02
A selection of slides from a Secure and Trustworthy Cyberspace (SaTC) presentation gives case studies on the use of graph analysis in relation to the political leadership of Mexico and Brazil: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
glenn1-30.jpg: ?86 H6MTW£8MllflfHi® T8 Bifc SIS: SHI; ESH; H5t I(TS//SI//REL) Intelligently filtering your data Brazil and Mexico case studies SATC i86 ieff«E8fHHWB£l: ?8 HIS; 886; SH...
DocumentDocument Date: 2012-01-01Release Date: 2014-05-13
These slides from a 2012 GCHQ presentation outline the progress the agency has made in intercepting mobile phone calls made on board commercial aircraft: see the book No Place To Hide, 13 May 2014.
Page 164 ■ ITT, THIEVING MAGPIE Using on-board GSM/GPRS services to track targets NAME & CONTACT INFORMATION REDACTED TOP SECRET//COMINT//REL TO USA, FVEY STRAP 1 This inform...
DocumentRelease Date: 2014-06-18
This 4-page excerpt from the 2013 Black Budget describes the two elements of NSA’s Foreign Partner Access operations – RAMPART-A and WINSTSTOP – together with their funding: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 18 June 2014.
TOP SECRET//SI/TK//NOFORN (U) SPECIAL SOURCE ACCESS (U) FOREIGN PARTNER ACCESS This Exhibit is SECRET//NOFORN FY 20111 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 201...
DocumentRelease Date: 2013-09-09
This slide, from an undated NSA presentation, shows that the agency is able to defeat BlackBerry encryption technology – using an email from a Mexican government official as an example: see the Der Spiegel article iSpy: How the NSA Accesses Smartphone Data, 9 September 2013.
TOPSECRET//COMNÏ//RH TO USA, FVEY (U) Post Processed BES collection t Type Data Type Mensaje original De: Enviado el: Para: Asunto: RE: URGENTE: Gracias. TOP SE...
DocumentDocument Date: 2011-01-01Release Date: 2015-03-06
This extract from a 2011 GCHQ document indicates that the agency had access to satellite and full take data from South Pacific sources collected by New Zealand’s GCSB via XKeyScore: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 March 2015.
I edit! GCSB access For GCSB access GCSB have given us access to their XKS deployments at IRONS AND ; a GCSB comsat site, which is rich in data for the South Pacific region. Specifically we can...
DocumentDocument Date: 2010-03-01Release Date: 2015-04-02
This excerpted GCHQ newsletter from March 2010 describes ongoing surveillance operations against Argentina: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET//STRAP 1 COMET NEWS (March 2010) This quick-read newsletter is intended to inform GCHQ primary target areas of some of the most recent technology developments/findings, tasking ...
DocumentDocument Date: 2006-08-29Release Date: 2015-05-05
This 29 August 2006 post from the internal NSA newsletter SIDToday explains how the Human Language Technology analysts working on speech-to-text technology within the agency understand their role in dealing with large amounts of intercepted data: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May […]
(S//SI) Dealing With a 'Tsunami' of Intercept FROM: Human Language Technology (S23) Run Date: 08/29/2006 (S//SI) Everyone knows that analysts have been drowning in a tsunami of intercept...
DocumentRelease Date: 2015-08-15
This undated NSA Special Source Operations presentation describes the agency’s relationship with corporate partner AT&T, codenamed FAIRVIEW: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
TOP SECRET//SI/OC//NOFORN CAIDVICUU SSO FAIRVIEW Overview TOP SECRET//SI/OC//NOFORN • (U) FAIRVIEW DEFINED • (U) OPERATIONAL AUTHORITIES/CAPABILITIES • (U) STATS: WHO IS USING D...
DocumentRelease Date: 2015-08-15
This extract is from an undated dictionary produced by NSA Special Source Operations, provides glosses for several terms associated with the corporate partner FAIRVIEW, including the AT&T-specific term ‘SNRC’: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
LITHIUM (TS//SI//NF) BLARNEY'S covername for one of their corporate partners. Need WPG ECI for company name NODDY-3 (TS//SI//NF) FAIRVIEW'S covername for Coverage of Current and Forecasted NR...
DocumentRelease Date: 2014-03-18
This is cover slide from a briefing presentation on MYSTIC produced by the NSA’s Special Source Operations: see the Washington Post article NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls, 18 March 2014.
UNCLASSIFIED//FOR OFFICIAL USE ONLY (U//FOUO) MYSTIC (U//FOUO) UNCLASSIFIED//FOR OFFICIAL USE ONLY
DocumentRelease Date: 2014-03-18
This extract from the NSA’s Special Source Operations division’s weekly memo describes the operation of SCALAWAG, the SIGAD (or collection address) associated with the MYSTIC collection of bulk telephony data: see the Washington Post article NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls, 18 March 2014.
(U) Tasking of SCALAWAG (TS//SI//REL TO USA, FVEY) SCALAWAG/US-3310BG has long since reached the point where it was collecting and sending home far more than the bandwidth could handle. Over ...
DocumentDocument Date: 2009-01-01Release Date: 2014-03-12
This classification guide from 2009 describes different elements of the Bush-era warrantless wiretapping programme. In particular, the guide casts light on the FISA Court’s permissive “Large Content” orders of January 2007. The revision of these expansive court orders in April that year led to the formulation of the August 2007 Protect America Act: see the […]
TOP SECRET//SI//ORCON/NOFORN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U//FOUO) STELLARWIND Classification Guide (2-400) Effective Date: 21 January 2 009 Kejch B. Alexande...
DocumentDocument Date: 2013-04-01Release Date: 2014-05-13
This slide, taken from an April 2013 presentation from NSA Special Source Operations, reveals the role played by the agency’s partnership with AT&T (BLARNEY) in surveilling the United Nations: see the book No Place To Hide, 13 May 2014.
Page 142 TOP SECRET//SI//NOFORN (U) OPERATIONAL HIGHLIGHT (TS//SI//NF) BLARNEY Team assists S2C52 analysts in implementing Xkeyscore fingerprints that yield access to U.N. Secretary G...
DocumentDocument Date: 2010-05-20Release Date: 2014-05-13
This internal NSA briefing dated 20 May 2010 shows US diplomatic personnel ‘reaching out’ for signals intelligence to give them an edge in international negotiations and the extent of the agency’s assistance: see the book No Place To Hide, 13 May 2014.
Page 143 (S//SI) BLARNEY Team Provides Outstanding Support to Enable UN Security Council Collection (TS//SI//NF) With the UN vote on sanctions against Iran approaching and several countrie...
DocumentDocument Date: 2010-10-01Release Date: 2014-06-18
This NSA presentation from 1 October 2010 describes RAMPART-A, the agency’s “unconventional special access program”: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 19 June 2014.
RAMPART-A Project Overview 1 October 2010 TOP SECRET//COMINT//NOFORN This briefing is classified TOP SECRET//COMINT//NOF TOP SECRET//COMINT//NOFORN RAMP ART-A Overview Covern...
DocumentDocument Date: 2006-10-31Release Date: 2014-06-18
This article from the internal NSA newsletter Foreign Affairs Digest, dated 31 October 2006, describes the visit of agency personnel to a BND FORNSAT site and the degree to which data is shared between the US and German services: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014. Download […]
(S//SI//REL) NSAers Make First-Ever Visit to FORNSAT Collection Site in Germany FROM Joint SIGINT Activity (H52G) Run Date: 10/31/2006 (U) Visitors impressed with software demos. ...
DocumentDocument Date: 2006-08-01Release Date: 2015-05-05
This 1 August 2006 post from the internal NSA newsletter SIDToday describes advances in the agency’s text-to-speech capability: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015. sidtoday-future-is-now-final
(U) For Media Mining, the Future Is Now! FROM: Human Language Technology (S23) Run Date: 08/01/2006 (TS//SI) In the first article on the Human Language Technology Program Management Offi...
DocumentDocument Date: 2010-04-27Release Date: 2015-02-19
This April 2010 GCHQ report proposes an automated approach to seizing large numbers of mobile phone encryption keys: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
TOP SECRET STRAP 1 Reference: OPC-TDSD/TECH/21 Date: 27th April 2010 PCS Harvesting at Scale (OPC-TDSD) (OPC-TDSD) (OPC-CAP) (OPC-TDSD) Summary This report explores the ...
Afghanistan (AFG/AF), Bangladesh (BGD/BD), Dominica (DMA/DM), French Guiana (GUF/GF), Gabon (GAB/GA), Guadeloupe (GLP/GP), Iceland (ISL/IS), India (IND/IN), Indonesia (IDN/ID), Iran (IRN/IR), Italy (ITA/IT), Martinique (MTQ/MQ), Montenegro (MNE/ME), Namibia (NAM/NA), Pakistan (PAK/PK), Saint Lucia (LCA/LC), Serbia (SRB/RS), Somalia (SOM/SO), Tajikistan (TJK/TJ), Turkmenistan (TKM/TM), United Kingdom (GBR/GB), Vietnam (VNM/VN), Yemen (YEM/YE), Zimbabwe (ZWE/ZW)
DocumentDocument Date: 2011-08-23Release Date: 2015-08-15
This 23 August 2011 post from the internal NSA newsletter SSO Weekly describes the disruption caused to collection from a Japanese-American cable by an earthquake. The date of service resumption correlated with the AT&T operated cable in the region: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, […]
(TS//SI//NF) FAIRVIEW: CLIFFSIDE Site - Collection Resumes After Months By H on 2011-08-23 0805 ~5 (TS//SI//NF) On 5 Aug 2011, collection of DNR and DNI traffic at the FAIRVIEW CLIFF...
DocumentDocument Date: 2009-11-01Release Date: 2013-11-17
This six-slide presentation from November 2009 details mobile phone interception in Indonesia by Australia’s Defence Signals Directorate (now the Australian Signals Directorate): see the Guardian article Australia tried to monitor Indonesian president’s phone, 17 November 2013.
Page 122 While we have invested significant analytic and collection effort of our own to find and exploit these communications, the difficulties we face in obtaining regular and reliable acce...
DocumentDocument Date: 2012-01-01Release Date: 2014-05-13
These two slides, taken from a 2012 NSA presentation, describe the agency’s monitoring of in-air communications and the sharing of that information among the Five Eyes: see the book No Place To Hide, 13 May 2014.
Page 166 TOP SECRET//COMINT//REL TO USA, FVEY (U) ANALYTIC DRIVER (CONT.) □(S//SI//REL FVEY) Analytic Question Given a GSM handset detected on a known aircraft flight, what is the lik...
DocumentDocument Date: 2010-04-21Release Date: 2015-03-08
This GCSB presentation dated 22 April 2010 details some of the systems available at the agency’s Waihopai base: see the Sunday Star Times article Snowden files: Inside Waihopai’s domes, 8 March 2015.
COMSAT Advisory Board (CAB) GCSB Update 22 April 2010 The Overall Classification of this briefing is: S E C R E T COMINT REL TO USA, FVEY o Economic Climate o Court Decision o S...
DocumentDocument Date: 2011-09-06Release Date: 2015-05-05
This 6 September 2011 post from the NSA’s internal SIDToday newsletter describes progress in the agency’s speech-to-text capability over the course of the year: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
(S//SI//REL) How Is Human Language Technology (HLT) Progressing? FROM: (U//FOUO)^^^H Language Analysis Modernization Lead (S2) Run Date: 09/06/2011 (S//SI//REL) Editor's intro: At the SI...
DocumentDocument Date: 2006-06-05Release Date: 2015-05-05
This NSA presentation from June 2006 describes advances in voice recognition technology, particularly in the context of operations in Iraq: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
RT10 Overview June 2006 TOPSECRET//COMINT//20291123 TOPSECRET//COMINT//20291123 Current Challenges - Why Innovate? ► Network is converging and dataflow is increasing ► Pushing ev...
DocumentDocument Date: 2009-03-01Release Date: 2015-07-01
This NSA presentation from March 2009 shows how VOIP intercepts are handled in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
voip-in-xks-p1-normal.gif: TOP SECRET//COMINT7/REL TO USA. AUS, CAN, GBR, NZL//20291123 VOIP in XKEYSCORE March 2009 TOP SECRET//COMINT//REL TO USA. AUS. CAN, GBR, NZL//20291123voip-in-...
DocumentDocument Date: 2004-10-06Release Date: 2015-09-29
This post from the NSA’s internal SIDToday newsletter, dated 6 October 2004, reviews the agency’s operations for the recently-concluded Athens Olympics: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
id-863-redacted-formatted-p1-normal.gif: DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Another Successful Olympics Story FROM:...