Filtered By
Phone MetadataX
Document Topic [filter]
Results
51 Total
1.0

Event (SIGINT)

Document

Release Date: 2015-09-25
This undated page from GCHQ’s internal GCWiki provides a definition of “event”, the term the agency uses to refer to a metadata record, showing the variety of data collected: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
events-p1-normal.gif: SECRET STRAP 1 COMiNT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webtea...
1.0

2007 agreement on UK contact identifiers

Document

Document Date: 2007-05-16Release Date: 2013-11-20
This memo from 2007 details an agreement reached that year that increased the categories of data the UK Government allowed the NSA to retain and analyse about British citizens: see the Guardian article US and UK struck secret deal to allow NSA to ‘unmask’ Britons’ personal data, 20 November 2013.
(S//SI//REL) SID Analysts Can Now Unminimize Incidentally Collected UK Contact Identifiers SIGINT Policy (S02L1) Run Date: 05/16/2007 (S//SI//REL) SIGINT Policy (S02L1) and the UK Liaison...
1.0

Verizon FISA Court order

Document

Document Date: 2013-04-25Release Date: 2013-06-06
A FISA Court order issued to Verizon demanded daily call records for all communications within the US and between the US and abroad: see the Guardian article NSA collecting phone records of millions of Verizon customers daily, 6 June 2013.
TOP SECRET//SI//NOFORN UNITED STATES FOREIGN INTELLIGENCE SURVEILLANCE COURT WASHINGTON, D.C. IN RE APPLICATION OF THE FEDERAL BUREAU OF INVESTIGATION FOR AN ORDER REQUIRING THE Dock...
1.0

Mission Management Success Stories

Document

Release Date: 2014-03-05
Two images from an NSA presentation describe Dutch-US cooperation in an international mission against Somali pirates in which signals intelligence was used to map contacts and support a naval mission. Identifying and technical details have been redacted: see the NRC Handelsblad article The secret role of the Dutch in the American war on terror, 5 […]
Sheet1.jpg: SECRET//SI//REL TO USA, N LD Mission Management Success Stories (S//SI//RELTO USA, NLP) Collection of Somali) operation to board a Pakistani vessel hijacked by Somali pirat...
1.0

Converged Analysis of Smartphone Devices

Document

Document Date: 2010-05-01Release Date: 2014-01-27
This NSA presentation from May 2010 describes the kinds of information the agency can extract from smartphone traffic, describing the use of mobile apps as a “golden nugget”. Note that this is the first version of this document released online: see the Pro Publica article Spy Agencies Probe Angry Birds and Other Apps for Personal […]
(U) Converged Analysis of Smartphone Devices Identification/Processing/Tasking - All in a day’s work TOP SECRET//COMINT/REL TO USA, FVEY si Converged mobile devices offering adv...
1.0

Third Parties – Last 30 Days

Document

Release Date: 2014-06-18
This Boundless Informant slide shows the number of German phone (DNR) and internet (DNI) records collected day-by-day between 10 December 2012 and 8 January 2013, from Third Party sources. The US-987LA sigad that accounts for the largest number of records is based in Germany: see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with […]
3RD PARTY - Last 30 Days DHR Signal Profile Most Volume Top 5 Techs g fcs IN MAR g MOIP HFCF VSAT FSTH DNI
1.0

Boundless Informant – Describing Mission Capabilities from Metadata Records

Document

Document Date: 2012-07-30Release Date: 2013-06-08
These slides, taken from a presentation dated 13 July 2012, outline some of the features of Boundless Informant, a tool used to describe the capabilities of the NSA unit called Global Access Operations (GAO): see the Guardian article Boundless Informant: the NSA’s secret tool to track global surveillance data, 8 June 2013.
pB» II® Global Access Operations TOP SECRET//SI//NOFORN Global Access Operations w The Old Way (U//FOUO) Typical SIG1NT Data Calls/Questions How many sites do we have in the r...
1.0

CHALKFUN and TAPERLAY

Document

Release Date: 2013-12-04
This excerpt from an NSA training manual shows the use of TAPERLAY and CHALKFUN tools. The former looks up the provider and country where a phone was first activated and the latter searches the FASCIA database to find a mobile phone’s past or current location: see the Washington Post article NSA tracking cellphone locations worldwide, […]
2 Human intelligence source indicates person is located outside the U.S. RFI -Foreign Factor: Human intelligence source indicates person is located outside the U.S. -Foreign Source ID: ABCD...
1.0

Meeting notes 22-23 April, 2008

Document

Release Date: 2013-12-02
Extracts from a draft report of a meeting between representatives of 5-Eyes partners at GCHQ in Cheltenham show that Australia took a relatively permissive approach to the sharing of its citizens’ metadata: see the Guardian article Australian spy agency offered to share data about ordinary citizens, 2 December 2013.
aus1.jpeg: 4. CSEC are able to make use of unselected (comment do we need to define selected' and 'iinselected" and “unintentional* in the context of this section As I D*rrv*d From NSACSSM 1-...
1.0

Boundless Informant – Frequently Asked Questions

Document

Document Date: 2012-09-06Release Date: 2013-06-08
This three-page memo is an internal guide to the NSA’s Boundless Informant tool, which allows the agency’s Global Access Operations to assess its collection capabilities by means of metadata record counts: see the Guardian article Boundless Informant: the NSA’s secret tool to track global surveillance data, 8 June 2013.
UNCLASSIFIED//FOR OFFICIAL USE ONLY BOUNDLESSINFORMANT - Frequently Asked Questions_09-06-2012 (U/FOUO) Questions 1 ) What is BOUNDLESSINFORMANT? What is its purpose? 2) Who are the in...
1.0

New Tactical Collection System Joins the War on Terrorism

Document

Document Date: 2005-03-03Release Date: 2014-02-10
This extract from a 3 March 2005 NSA briefing acknowledges that the use of geolocation technology to facilitate drone strikes “represents the dawn of a new era”: see the Intercept article The NSA’s Secret Role in the U.S. Assassination Program, 10 February 2014.
(S) New Tactical Collection System Joins the War on Terrorism (repost) FROM: name redacted Technical Advisor, Target Reconnaissance and Survey (S316) Run Date: 03/03/2005 DISTANTFOCUS po...
1.0

SHELLTRUMPET Processes it’s One Trillionth Metadata Record

Document

Document Date: 2012-12-31Release Date: 2014-05-13
This 31 December 2012 post from the NSA’s intranet describes the scale of the metadata records handled by the SHELLTRUMPET analysis tool: see the book No Place To Hide, 13 May 2014.
Page 100 (S//SI//REL TO USA, FVEY) SHELLTRUMPET Processes it|'s One Trillionth Metadata Record (S//SI//REL TO USA, FVEY) On December 21, 2012 SHELLTRUMPET processed its One Trillionth meta...
1.0

FAIRVIEW – Last 30 days

Document

Release Date: 2014-05-13
This Boundless Informant slide shows the number of phone records collected between 10 December 2012 and 8 January 2013 by NSA’s unidentified corporate partner FAIRVIEW (US-990) – some 6 billion in total: see the book No Place To Hide, 13 May 2014.
Page 105 Dec 10 Dec 17 Dec24 Dec31 Jan ^ Signal Profile H PCS INMAR a WOP a HPCP VSAT PSTN DNI Most Volume US-990 6,142,932,557 Records Top 5 Techs US-990: ...
1.0

Germany – Last 30 days

Document

Document Date: 2013-01-01Release Date: 2013-07-01
This Boundless Informant slide shows the number of German phone (DNR) and internet (DNI) records collected day-by-day between 10 December 2012 and 8 January 2013, from sources codenamed US-987LA and US-987LB: see the Der Spiegel article How the NSA Targets Germany and Europe, 1 July 2013.
GERMANY. Last 30 Days B 3* B C*<* * ■ 50.000.000 u ftf 40.000.000 - 30.000.000 1 ^ Signal Profile Most Volume Top 5 Techs n US 987LA 47 12i6 8*4 Records ■ ...
1.0

Sharing of MetaData across the IC —- Dissemination of SIGINT Metadata Beyond NSA

Document

Document Date: 2005-07-06Release Date: 2014-08-25
This memorandum dated 6 July 2005 describes features of the intelligence sharing systems that preceded ICREACH: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
SECRET//NOFORN//MR UNITED STATES GOVERNMENT memorandum TAC-0xx-05 DATE: 06 July 2005 REPLY TO ATTN OF: TD/TAC SUBJECT: Sharing of MetaData across the IC —Dissemination of SIGINT ...
1.0

Sharing Communications Metadata Across the US Intelligence Community

Document

Document Date: 2007-05-15Release Date: 2014-08-25
This ODNI briefing from 15 May 2007 describes the rationale for ICREACH and the scale of metadata sharing that was envisioned: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
This Briefing is Classified TOP SECRET//COMINT//NOFORN//20320108 spates °v — — *i©#0*ie#a*i©#©'i©#©*iC#G*i©#©‘i©#0’i©#0*i©,©,iC#&‘ie#©*iC#3'i©#0*iC#©*ie#©*iC#3 1©#C*’€•©•’€...
1.0

Network Tradecraft Advancement Team

Document

Document Date: 2010-06-10Release Date: 2014-12-04
This GCHQ document from June 2010 describes cooperation between members of the Five Eyes alliance, particularly Canada’s CSEC, on the technical analysis of international mobile phone networks: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
Network Tradecraft Advancement Team (NTAT) 3G > 2nd SCAMP at CSEC process ■ Worked with CSEC H3 developers to implement IRASCIABLE RABBIT into OLYMPIA ■ Developed 41 use cases ■ Devel...
1.0

AURORAGOLD Working Group

Document

Document Date: 2012-06-06Release Date: 2014-12-04
This 26-page NSA document, originally presented at 2012’s Five Eyes SIGDEV conference, gives a detailed overview of the agency’s information gathering on world mobile phone networks. Some intercepted technical and contact details have been redacted: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//SI//REL TO FVEY (U//FOUO) AURORAGOLD Working Group (S//SI//REL) Shaping understanding of the global GSm/uMTS/LTE landscape SIGDEV Conference - 6 June 2012 This briefing is cl...
1.0

IR.21 – A Technology Warning Mechanism

Document

Document Date: 2010-01-08Release Date: 2014-12-04
This 19-page NSA paper, delivered at the 2010 Five Eyes SIGDEV conference, gives a technical explanation of the importance of sourcing mobile carriers’ roaming agreements (IR.21): see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014. ir21-a-technology-warning-mechanism
(S//REL TO USA, FVEY ) IR.21 - A Technology Warning Mechanism SDC2010 SSG4/T3C Technical Director Derived From: NSA/CSSM 1 -52 Dated: 20070108 Declassify On: 20341201 TOP SE...
1.0

AURORAGOLD – Target Technology Trends Center/T3C support to WPMO

Document

Document Date: 2011-01-01Release Date: 2014-12-04
This NSA briefing, given at the Five Eyes SIGDEV conference in 2011, gives an overview of AURORAGOLD data flows: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
S//SI//REL TO USA, FVEY AURORAGDLD (U//FOUO) AURORAGOLD Target Technology Trends Center/T3C support to WPMO Overall briefing classification: S//SI//REL TO USA, FVEY S//SI//REL T...
1.0

To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; US SIGINT Provides Key Support

Document

Document Date: 2009-06-12Release Date: 2014-12-28
This 12 June 2009 post from NSA’s internal SIDToday newsletter recounts a German/Afghan targeted operation and its support from the agency: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
SIDToday - To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; U.S. SIGINT Prov... DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS C...
1.0

WINDSTOP – Last 30 days

Document

Release Date: 2013-11-04
This Boundless Informant slide shows the number of WINDSTOP records collected day-by-day between 10 December 2012 and 8 January 2013. WINDSTOP covers at least four NSA collection systems that depend on Five Eyes partners; the MUSCULAR project to intercept traffic from Google and Yahoo data centres is representated by the code DS-200B. In the given […]
WINDSTOP- Last 30 Days DNI DNR 600,000,000 -j 500,000,000 - 400,000,000 - 300,000,000 - 200,000,000 - 100,000,000 - 1221 12.-12 12.'15 12-16 1221 12-13 12...
1.0

CSEC – Advanced Network Tradecraft

Document

Document Date: 2012-06-01Release Date: 2013-10-06
This CSEC presentation from June 2012, slides from which were first published by Fantástico in October 2013, describes the Canadian agency’s use of the Olympia suite of analytic tools in the context of spying on Brazil’s Ministry of Mines and Energy: see the Globe and Mail article How CSEC became an electronic spying giant, 30 […]
1-b5263447e8.jpg: AND THEY SAID TO THE TITANS: « WATCH OUT OLYMPIANS IN THE HOUSE! » CSEC - Advanced Network Tradecraft SD Conference June 2012 Overall Classification: TOP SECRET//SI2-6...
1.0

Boundless Informant heat maps

Document

Document Date: 2013-03-26Release Date: 2013-06-11
These undated heat maps show the number of pieces of communications data the NSA gathers per country in a particular 30 day period, divided into telephony (DNR) and internet (DNI) metadata. Details in the second map refer to a period in January 2013 and third to a period ending in February the same year: see […]
boundlessinformant.pdf: Page 93 BOUNDLESSINFORMANT Top 5 Countries (i»t 30 o«>» t-om «¡xu/i ■Ohm.pdf: BOUNDLESSINFORMANT im!MwamHMiM:rta.]a;ii]aaMaiM,(.yiii:am«.'.«M«iMiaiiiiiPH;i!i...
1.0

Poland – Last 30 days

Document

Release Date: 2014-05-13
This Boundless Informant slide shows the number of Polish phone records collected day-by-day between 10 December 2012 and 8 January 2013, from a facility codenamed US-916: see the book No Place To Hide, 13 May 2014.
Page 99 POLAND - Last 30 Days 3DN| Qi :+ a 5,000,000 4,000.000 - 3,000,000 - wo 2,000,000 - 1,000,000 - 1217 I 1218 12’19 1225 12-26 Dec 17 Dec 24 Dec 31 ...
1.0

Foreign Partners – Last 30 Days

Document

Release Date: 2014-06-18
This Boundless Informant slide shows the number of phone (DNR) and internet (DNI) records collected day-by-day between 10 December 2012 and 8 January 2013, from NSA’s foreign partners: see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.
FOREIGN PARTNER - Last 30 Days DNR DNI 400.000. 000 -| 350.000. 000 - 300.000. 000 - 12-11 121Ö 12'U Dec 10 Dec 17 Dec 24 Dec 31 Jan Signal Profile Mo...
1.0

CRISSCROSS/PROTON

Document

Document Date: 2006-02-26Release Date: 2014-08-25
This NSA Point Paper dated 22 February 2006 provides a history of the CRISSCROSS and PROTON information sharing systems that preceded ICREACH: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
TOP SECRET//COMINT//ORCON/NOFORN//MR POINT PAPER SUBJECT: CRISSCROSS/PROTON PURPOSE: Provide DIRNSA information on subject. BACKGROUND: 22 Feb 06 (U) History of CRISSCROSS/PROTON...
1.0

AURORAGOLD

Document

Document Date: 2011-01-01Release Date: 2014-12-04
This 4-page NSA document, presented at a Five Eyes SIGDEV conference 2011, gives an overview of the AURORAGOLD (AG) project, in which technical intelligence is gathered to ensure future agency access to mobile phone networks worldwide: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (u//fouo) AURORAGOLD (S//SI//REL) Project Overview: The mission of the AURORAGOLD (AG) project is to maintain data about international GSM/UMT...
1.0

PullThrough Steering Group Meeting #16

Document

Document Date: 2008-02-29Release Date: 2015-09-25
This set of GCHQ minutes from 29 February 2008 describes a set of tools that were under development at that point, including the metadata analysis tool KARMA POLICE: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
pull-through-steering-group-minutes-p1-normal.gif: TOP SECRET STRAP1 THQ/1202THQ/1900/0058 29 February 2008 PullThrough Steering Group Meeting #16 29 February 2008. Distribute to: In...
1.0

Events analysis

Document

Document Date: 2008-11-27Release Date: 2015-09-25
This GCHQ slide taken from a presentation dates 27 November 2008 confirms that agency metadata repositories can be datamined for information relating to individuals within the UK: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
Events analysis SALAMANCA, HAUSTORIUM, THUGGEE, IMMINGLE less intrusive than communications content authorisation not needed for individuals in the UK necessity and proportionality st...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh