DocumentRelease Date: 2014-12-04 Document Date: 2011-01-01
This 4-page NSA document, presented at a Five Eyes SIGDEV conference 2011, gives an overview of the AURORAGOLD (AG) project, in which technical intelligence is gathered to ensure future agency access to mobile phone networks worldwide: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (u//fouo) AURORAGOLD (S//SI//REL) Project Overview: The mission of the AURORAGOLD (AG) project is to maintain data about international GSM/UMT...
DocumentRelease Date: 2014-08-25 Document Date: 2010-09-21
This 21 September 2010 memo from the NSA’s CIA Liaison Support Group reveals that ICREACH is available to “over 1000 analysts across 23 US Intelligence Community agencies”: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
(S//REL) CIA Colleagues Enthusiastically Welcome NSA Training FROM: (U//FOUO)^^^^^^^| Chief, Liaison Support Group at CIA (FBI) Run Date: 09/21/2010 (S//REL) From our perspective - that of...
DocumentRelease Date: 2013-09-28
This slide from an undated NSA presentation demonstrates how the agency uses email and phone data to analyse the social networks of targets (the “Agent” in the diagram): see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, 28 September 2013.
SECRET//SI//REL TO USA FVEY (S//SI//REL USA, FVEY) SYANPSE Data Model CUSSTXATWt SKKTAKOMiNVMl TO US*. M». OK, •». kftj IMM: 1« Paki 5 9 'P>rvr/*»^ <* Page 13 SECRET//SI//R...
DocumentRelease Date: 2014-12-04 Document Date: 2010-01-08
This 19-page NSA paper, delivered at the 2010 Five Eyes SIGDEV conference, gives a technical explanation of the importance of sourcing mobile carriers’ roaming agreements (IR.21): see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014. ir21-a-technology-warning-mechanism
(S//REL TO USA, FVEY ) IR.21 - A Technology Warning Mechanism SDC2010 SSG4/T3C Technical Director Derived From: NSA/CSSM 1 -52 Dated: 20070108 Declassify On: 20341201 TOP SE...
DocumentRelease Date: 2014-02-10 Document Date: 2005-03-03
This extract from a 3 March 2005 NSA briefing acknowledges that the use of geolocation technology to facilitate drone strikes “represents the dawn of a new era”: see the Intercept article The NSA’s Secret Role in the U.S. Assassination Program, 10 February 2014.
(S) New Tactical Collection System Joins the War on Terrorism (repost) FROM: name redacted Technical Advisor, Target Reconnaissance and Survey (S316) Run Date: 03/03/2005 DISTANTFOCUS po...
DocumentRelease Date: 2014-12-04 Document Date: 2012-06-06
This 26-page NSA document, originally presented at 2012’s Five Eyes SIGDEV conference, gives a detailed overview of the agency’s information gathering on world mobile phone networks. Some intercepted technical and contact details have been redacted: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//SI//REL TO FVEY (U//FOUO) AURORAGOLD Working Group (S//SI//REL) Shaping understanding of the global GSm/uMTS/LTE landscape SIGDEV Conference - 6 June 2012 This briefing is cl...
DocumentRelease Date: 2014-08-25 Document Date: 2005-07-06
This memorandum dated 6 July 2005 describes features of the intelligence sharing systems that preceded ICREACH: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
SECRET//NOFORN//MR UNITED STATES GOVERNMENT memorandum TAC-0xx-05 DATE: 06 July 2005 REPLY TO ATTN OF: TD/TAC SUBJECT: Sharing of MetaData across the IC —Dissemination of SIGINT ...