DocumentRelease Date: 2015-09-29 Document Date: 2004-10-06
This post from the NSA’s internal SIDToday newsletter, dated 6 October 2004, reviews the agency’s operations for the recently-concluded Athens Olympics: see the Intercept article A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?, 29 September 2015.
id-863-redacted-formatted-p1-normal.gif: DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U) Another Successful Olympics Story FROM:...
DocumentRelease Date: 2015-05-05 Document Date: 2008-10-23
This October 2008 article from an NSA internal newsletter SIDToday Enhanced Video Text and Audio Processing (eViTAP), a tool that provides automatic translations of news broadcasts in English, Russian, Spanish, Arabic, Mandarin and Farsi: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015. sidtoday-non-linguists-final
(U//FOUO) Coming Soon! A Tool that Enables Non-Linguists to Analyze Foreign-TV News ______________________ Programs FROM: Center for Time-Sensitive Information (S2413) Run Date: 10/23/20...
DocumentRelease Date: 2015-03-08 Document Date: 2010-04-21
This GCSB presentation dated 22 April 2010 details some of the systems available at the agency’s Waihopai base: see the Sunday Star Times article Snowden files: Inside Waihopai’s domes, 8 March 2015.
COMSAT Advisory Board (CAB) GCSB Update 22 April 2010 The Overall Classification of this briefing is: S E C R E T COMINT REL TO USA, FVEY o Economic Climate o Court Decision o S...
DocumentRelease Date: 2015-02-19 Document Date: 2010-04-27
This April 2010 GCHQ report proposes an automated approach to seizing large numbers of mobile phone encryption keys: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
TOP SECRET STRAP 1 Reference: OPC-TDSD/TECH/21 Date: 27th April 2010 PCS Harvesting at Scale (OPC-TDSD) (OPC-TDSD) (OPC-CAP) (OPC-TDSD) Summary This report explores the ...
Afghanistan (AFG/AF), Bangladesh (BGD/BD), Dominica (DMA/DM), French Guiana (GUF/GF), Gabon (GAB/GA), Guadeloupe (GLP/GP), Iceland (ISL/IS), India (IND/IN), Indonesia (IDN/ID), Iran (IRN/IR), Italy (ITA/IT), Martinique (MTQ/MQ), Montenegro (MNE/ME), Namibia (NAM/NA), Pakistan (PAK/PK), Saint Lucia (LCA/LC), Serbia (SRB/RS), Somalia (SOM/SO), Tajikistan (TJK/TJ), Turkmenistan (TKM/TM), United Kingdom (GBR/GB), Vietnam (VNM/VN), Yemen (YEM/YE), Zimbabwe (ZWE/ZW)
DocumentRelease Date: 2015-02-19
These six slides from 2010 GCHQ presentation outline the results of a trial operation to acquire SIM encryption keys: see the Intercept article The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle, 19 February 2015.
where-are-these-keys.pdf: TOP SECRET STRAP 1 Where are these keys? Keys live on the SIM card in the phone They also need to be present on the mobile network; are kept carefully protecte...
DocumentRelease Date: 2014-05-13 Document Date: 2009-11-06
This internal NSA document dated 6 November 2009 describes work the agency has done with a corporate partner codenamed SILVERZEPHYR to develop collection capabilities in Brazil and Columbia: see the book No Place To Hide, 13 May 2014.
Page 106 SILVERZEPHYR FAA DNI Access Initiated at NSAW (TS//SI//NF) By NAME REDACTED ---------------m on 2009-11-06 0918 (TS//SI//NF) On Thursday, 11/5/09, the SSO-OAKSTAR SILVE...
DocumentRelease Date: 2014-05-13 Document Date: 2012-01-01
These two slides, taken from a 2012 NSA presentation, describe the agency’s monitoring of in-air communications and the sharing of that information among the Five Eyes: see the book No Place To Hide, 13 May 2014.
Page 166 TOP SECRET//COMINT//REL TO USA, FVEY (U) ANALYTIC DRIVER (CONT.) □(S//SI//REL FVEY) Analytic Question Given a GSM handset detected on a known aircraft flight, what is the lik...
DocumentRelease Date: 2014-03-18
This extract from the NSA’s Special Source Operations division’s weekly memo describes the operation of SCALAWAG, the SIGAD (or collection address) associated with the MYSTIC collection of bulk telephony data: see the Washington Post article NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls, 18 March 2014.
(U) Tasking of SCALAWAG (TS//SI//REL TO USA, FVEY) SCALAWAG/US-3310BG has long since reached the point where it was collecting and sending home far more than the bandwidth could handle. Over ...
DocumentRelease Date: 2013-12-02
A selection of slides from a Secure and Trustworthy Cyberspace (SaTC) presentation gives case studies on the use of graph analysis in relation to the political leadership of Mexico and Brazil: see the Fantástico article Veja os documentos ultrassecretos que comprovam espionagem a Dilma, 2 December 2013.
glenn1-30.jpg: ?86 H6MTW£8MllflfHi® T8 Bifc SIS: SHI; ESH; H5t I(TS//SI//REL) Intelligently filtering your data Brazil and Mexico case studies SATC i86 ieff«E8fHHWB£l: ?8 HIS; 886; SH...
DocumentRelease Date: 2013-11-17 Document Date: 2009-11-01
This six-slide presentation from November 2009 details mobile phone interception in Indonesia by Australia’s Defence Signals Directorate (now the Australian Signals Directorate): see the Guardian article Australia tried to monitor Indonesian president’s phone, 17 November 2013.
Page 122 While we have invested significant analytic and collection effort of our own to find and exploit these communications, the difficulties we face in obtaining regular and reliable acce...
DocumentRelease Date: 2016-06-07 Document Date: 2007-05-08
This GCHQ document dated 8 May 2007 provides technical information about PRESTON, the British system for intercepting the communications of targets under warrant: see the Intercept article Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure, 7 June 2016.
SECRET STRAP 1 PRESTON Business Processes Sigmod/00003CPO/4502/SIG010900/23 8 May 2007 PRESTON Business Processes Version 1.0 Synopsis The purpose of this document is to present ...
DocumentRelease Date: 2016-06-07 Document Date: 2009-01-01
This extract from a 2009 GCHQ presentation includes a report on PRESTON, the agency’s programme for intercepting the communications of individuals or organisations who are subject to surveillance warrants. The report found that, in one six-month period, 97% of such communications had not been viewed by the authorities: see the Intercept article Facing Data Deluge, […]
TOP SECRET STRAP 1 DGO and DOC Special TOP SECRET STRAP 1 This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other...
DocumentRelease Date: 2015-07-01
This undated NSA technical document describes how to configure XKeyScore to send search results to NUCLEON, the agency’s database for voice data: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
voip-readme-p1-normal.gif: SECRET//REL TO USA, FVEY (U) VoIP Configuration and Forwarding Read Me (U) Overview (U//FOUO) In the late 1990s, voice over IP (VoIP) emerged as an alternativ...
DocumentRelease Date: 2015-07-01 Document Date: 2009-05-01
This NSA presentation from May 2009 describes the procedure for analysing phone data within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015. analyzing-mobile-cellular-dni-in-xks
Analyzing Mobile/Cellular DNI in XKEYSCORE May 2009 TOP SECRET//COMINT//REL TO USA, AUS, CAN. GBR. NZL//20291123 08 TOP SECRET/,'COMINT//REL TO USA, AUS, CAN, GBR, NZL Mobile DNI ...
DocumentRelease Date: 2015-05-21 Document Date: 2012-01-01
This 2012 presentation from the Network Tradecraft Advancement Team (NTAT), a joint Five Eyes surveillance unit, discusses options for installing malware on smartphones in light of the challenge posed by the Arab Spring: see the CBC News article Spy agencies target mobile phones, app stores to implant spyware, 21 May 2015.
Synergising Network Analysis Tradecraft Network Tradecraft Advancement Team (NTAT) Overview TOP SECRET//SI Tradecraft? Tradecraft • “The development of methods, techni...
DocumentRelease Date: 2015-05-05 Document Date: 2011-09-06
This 6 September 2011 post from the NSA’s internal SIDToday newsletter describes progress in the agency’s speech-to-text capability over the course of the year: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
(S//SI//REL) How Is Human Language Technology (HLT) Progressing? FROM: (U//FOUO)^^^H Language Analysis Modernization Lead (S2) Run Date: 09/06/2011 (S//SI//REL) Editor's intro: At the SI...
DocumentRelease Date: 2015-05-05 Document Date: 2006-06-05
This NSA presentation from June 2006 describes advances in voice recognition technology, particularly in the context of operations in Iraq: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
RT10 Overview June 2006 TOPSECRET//COMINT//20291123 TOPSECRET//COMINT//20291123 Current Challenges - Why Innovate? ► Network is converging and dataflow is increasing ► Pushing ev...
DocumentRelease Date: 2015-05-05 Document Date: 2006-08-01
This 1 August 2006 post from the internal NSA newsletter SIDToday describes advances in the agency’s text-to-speech capability: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015. sidtoday-future-is-now-final
(U) For Media Mining, the Future Is Now! FROM: Human Language Technology (S23) Run Date: 08/01/2006 (TS//SI) In the first article on the Human Language Technology Program Management Offi...
DocumentRelease Date: 2015-03-06 Document Date: 2011-01-01
This extract from a 2011 GCHQ document indicates that the agency had access to satellite and full take data from South Pacific sources collected by New Zealand’s GCSB via XKeyScore: see the New Zealand Herald article The price of the Five Eyes club: Mass spying on friendly nations, 5 March 2015.
I edit! GCSB access For GCSB access GCSB have given us access to their XKS deployments at IRONS AND ; a GCSB comsat site, which is rich in data for the South Pacific region. Specifically we can...
DocumentRelease Date: 2014-06-18 Document Date: 2006-10-31
This article from the internal NSA newsletter Foreign Affairs Digest, dated 31 October 2006, describes the visit of agency personnel to a BND FORNSAT site and the degree to which data is shared between the US and German services: see the Der Spiegel article New NSA Revelations: Inside Snowden’s Germany File, 18 June 2014. Download […]
(S//SI//REL) NSAers Make First-Ever Visit to FORNSAT Collection Site in Germany FROM Joint SIGINT Activity (H52G) Run Date: 10/31/2006 (U) Visitors impressed with software demos. ...
DocumentRelease Date: 2014-06-18
This 4-page excerpt from the 2013 Black Budget describes the two elements of NSA’s Foreign Partner Access operations – RAMPART-A and WINSTSTOP – together with their funding: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 18 June 2014.
TOP SECRET//SI/TK//NOFORN (U) SPECIAL SOURCE ACCESS (U) FOREIGN PARTNER ACCESS This Exhibit is SECRET//NOFORN FY 20111 Actual FY 2012 Enacted FY 2013 Request FY 2012 - FY 201...
DocumentRelease Date: 2014-05-13 Document Date: 2013-04-01
This slide, taken from an April 2013 presentation from NSA Special Source Operations, reveals the role played by the agency’s partnership with AT&T (BLARNEY) in surveilling the United Nations: see the book No Place To Hide, 13 May 2014.
Page 142 TOP SECRET//SI//NOFORN (U) OPERATIONAL HIGHLIGHT (TS//SI//NF) BLARNEY Team assists S2C52 analysts in implementing Xkeyscore fingerprints that yield access to U.N. Secretary G...
DocumentRelease Date: 2014-05-13 Document Date: 2012-01-01
These slides from a 2012 GCHQ presentation outline the progress the agency has made in intercepting mobile phone calls made on board commercial aircraft: see the book No Place To Hide, 13 May 2014.
Page 164 ■ ITT, THIEVING MAGPIE Using on-board GSM/GPRS services to track targets NAME & CONTACT INFORMATION REDACTED TOP SECRET//COMINT//REL TO USA, FVEY STRAP 1 This inform...
DocumentRelease Date: 2014-03-18
This is cover slide from a briefing presentation on MYSTIC produced by the NSA’s Special Source Operations: see the Washington Post article NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls, 18 March 2014.
UNCLASSIFIED//FOR OFFICIAL USE ONLY (U//FOUO) MYSTIC (U//FOUO) UNCLASSIFIED//FOR OFFICIAL USE ONLY
DocumentRelease Date: 2013-12-10 Document Date: 2006-09-20
This internal NSA document from 20 September 2006 outlines the agency’s ability to intercept, process and discern location data from mobile phone calls: see the Washington Post article New documents show how the NSA infers relationships based on mobile location data, 10 December 2013.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//MR Description of Information Classification/ Markings Reason Declass Remarks b. (U) In association with NSA, SIGINT or Intelligence. SECRE...
DocumentRelease Date: 2015-08-15 Document Date: 2012-04-01
This April 2012 NSA presentation uses an AT&T specific term – Common Backbone or CBB – to refer to the Internet backbone of the corporate partner it codenames FAIRVIEW: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
Dataflow Diagrams April 2012 Note: Please refer to previous diagrams for decommissioned systems. Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20361101 TOP SECRET//COMIN...
BUGCATCHER, CADENCE, CLEARSIGHT, COURIERSKILL, DISHFIRE, FAIRVIEW, FALLOUT, FASCIA, FISHWAY, GATEKEEP, HIGHDECIBEL, MAILORDER, MAINWAY (MW), MARINA, MESA, PINECONE, PINWALE, RAGTIME (RGT), RIMROCK, SCISSORS, TOPROCK, WEALTHYCLUSTER (WC), XKEYSCORE (XKS), YANKEE
DocumentRelease Date: 2015-07-01 Document Date: 2009-03-01
This NSA presentation from March 2009 shows how VOIP intercepts are handled in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
voip-in-xks-p1-normal.gif: TOP SECRET//COMINT7/REL TO USA. AUS, CAN, GBR, NZL//20291123 VOIP in XKEYSCORE March 2009 TOP SECRET//COMINT//REL TO USA. AUS. CAN, GBR, NZL//20291123voip-in-...
DocumentRelease Date: 2015-04-02 Document Date: 2010-03-01
This excerpted GCHQ newsletter from March 2010 describes ongoing surveillance operations against Argentina: see the Intercept article Britain Used Spy Team to Shape Latin American Public Opinion on Falklands, 2 April 2015.
TOP SECRET//STRAP 1 COMET NEWS (March 2010) This quick-read newsletter is intended to inform GCHQ primary target areas of some of the most recent technology developments/findings, tasking ...
DocumentRelease Date: 2014-06-18
These three undated NSA Special Source Operation slides supply details on selected RAMPART-A cable access sites: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 18 June 2014.
TOP SECRET//COMINT//NOFORN RAMPART A Sites Five sites, 4 with a Trusted 3rd Party Partner ■ US-3127!VH AZUREPHOENIX**4mb BW/1 Ogb/day ■ US-3145/KX MOONLIGHTPATH** - ~2mb BW/5gb/day ...
DocumentRelease Date: 2014-06-18 Document Date: 2010-10-01
This NSA presentation from 1 October 2010 describes RAMPART-A, the agency’s “unconventional special access program”: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 19 June 2014.
RAMPART-A Project Overview 1 October 2010 TOP SECRET//COMINT//NOFORN This briefing is classified TOP SECRET//COMINT//NOF TOP SECRET//COMINT//NOFORN RAMP ART-A Overview Covern...