Results
47 Total
0.0
To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; US SIGINT Provides Key Support
Document
Release Date:
2014-12-28
Document Date:
2009-06-12
This 12 June 2009 post from NSA’s internal SIDToday newsletter recounts a German/Afghan targeted operation and its support from the agency: see the Der Spiegel article Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan, 28 December 2014.
SIDToday - To Nab Afghan Nemesis, German Forces Launch Rare Take-Down Operation; U.S. SIGINT Prov...
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS C...
0.0
Events analysis
Document
Release Date:
2015-09-25
Document Date:
2008-11-27
This GCHQ slide taken from a presentation dates 27 November 2008 confirms that agency metadata repositories can be datamined for information relating to individuals within the UK: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
Events analysis
SALAMANCA, HAUSTORIUM, THUGGEE, IMMINGLE
less intrusive than communications content
authorisation not needed for individuals in
the UK
necessity and proportionality st...
0.0
PullThrough Steering Group Meeting #16
Document
Release Date:
2015-09-25
Document Date:
2008-02-29
This set of GCHQ minutes from 29 February 2008 describes a set of tools that were under development at that point, including the metadata analysis tool KARMA POLICE: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
pull-through-steering-group-minutes-p1-normal.gif:
TOP SECRET STRAP1
THQ/1202THQ/1900/0058
29 February 2008
PullThrough Steering Group Meeting #16
29 February 2008.
Distribute to: In...
0.0
Graph theory in the operational environment
Document
This undated presentation from GCHQ’s Information and Communications Technology Research department discusses the agency’s efforts in finding “closed loops” of cheap burner phones, a major focus for the agency in the wake of the 7/7 London bombings: see the Intercept article How London’s 7/7 Bombings Led to “Unprecedented” Surveillance Tactics, 1 March 2018.
TOP SECRET STRAP1
Graph theory in the operational
environment
TOP SECRET STRAP1
What I will cover
Finding operational closed loops:
- The reality of target behaviour
- ...
0.0
GSM Temporary Selectors – Breakthroughs in Automated Identification
Document
Release Date:
2018-03-01
Document Date:
2005-07-27
This 2005 post from the NSA’s internal newsletter SIDToday explains how the agency overcame the obfuscation of IMSI codes by mobile phone companies: see the Intercept article NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(TS//SI) GSM Temporary Selectors - Breakthroughs in Automated
Identification
Target An...
0.0
RT10 Initiative Overview
Document
Release Date:
2018-01-19
Document Date:
2006-11-09
This 2006 NSA technical presentation discusses the agency’s Voice RT system for real-time voice recognition and the role voice recordings from US conflict theatres played in developing the system: see the Intercept article Finding Your Voice, 19 January 2018.
TOP SECRET//COMINT//REL
RT10 Initiative
Overview
Dr. James Heath
Program Management & Advisors: COL Bob Harms / COL Barb Trent /
Michelle Gerhard
Architects:
/ Mark Ross
Prese...
0.0
Italy, Spain – Last 30 Days
Document
Release Date:
2013-07-01
Document Date:
2013-01-01
This Boundless Informant slide shows the number of Italian and Spanish phone records collected day-by-day between 10 December 2012 and 8 January 2013: see the Spiegel article How the NSA Targets Germany and Europe, 1 July 2013.
SPAIN - Last 30 Days
Q«. c**
* ■
ITALY - Last 30 Days Q m D os- % ■
5.000000
Oec 10 0«:17 C*c24 Otcll Jan
0.0
SHELLTRUMPET Processes it’s One Trillionth Metadata Record
Document
Release Date:
2014-05-13
Document Date:
2012-12-31
This 31 December 2012 post from the NSA’s intranet describes the scale of the metadata records handled by the SHELLTRUMPET analysis tool: see the book No Place To Hide, 13 May 2014.
Page 100
(S//SI//REL TO USA, FVEY) SHELLTRUMPET Processes it|'s One Trillionth
Metadata Record
(S//SI//REL TO USA, FVEY) On December 21, 2012 SHELLTRUMPET processed its
One Trillionth meta...
0.0
For Media Mining the Future Is Now!
Document
Release Date:
2018-01-19
Document Date:
2006-08-01
This 2006 article from the internal NSA newsletter SIDToday describes Voice in Real Time, or Voice RT, a system that allows the agency to automatically identify not just the speaker in a voice intercept, but also their language, gender, and dialect: see the Intercept article Finding Your Voice, 19 January 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(U) For Media Mining, the Future Is Now!
FROM: Joseph Picone and
Human Language Techno...
0.0
Human Language Technology in Your Future
Document
Release Date:
2018-01-19
Document Date:
2006-07-20
This 2006 post from the internal NSA newsletter SIDToday describes the agency’s use of voice recognition (Human Language technology) and that it could already be used to label certain conversations as involving a “subject of interest”: see the Intercept article Finding Your Voice, 19 January 2018.
(U) Human-Language Technology in Your Future
FROM: Anita H. Kulman
Mission Area Director, HLT PMO (S23)
Run Date: 07/20/2006
SERIES:
(U) HLT
(U//FOUO) New tools for analysts to us...
0.0
iPhone Location Services
Document
Release Date:
2013-09-09
These four sides from an undated NSA presentation boast the agency’s ability to access location information from iPhones – and makes fun of the “zombies” whose information is exfiltrated: see the Der Spiegel article iSpy: How the NSA Accesses Smartphone Data, 9 September 2013.
phone1.jpg:
TS//SI//REL to USA, FVEY
(S//RED iPhone Location Services
(U) Who knew in
1984...
TS//SI//RELto USA, FVEYphone2.jpg:
TS//SI//REL to USA, FVEY
(S//REL)
iPhone Locatio...
0.0
AURORAGOLD
Document
Release Date:
2014-12-04
Document Date:
2011-01-01
This 4-page NSA document, presented at a Five Eyes SIGDEV conference 2011, gives an overview of the AURORAGOLD (AG) project, in which technical intelligence is gathered to ensure future agency access to mobile phone networks worldwide: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL
(u//fouo) AURORAGOLD
(S//SI//REL) Project Overview: The mission of the AURORAGOLD (AG) project is to maintain
data about international GSM/UMT...
0.0
Sharing Communications Metadata Across the US Intelligence Community
Document
Release Date:
2014-08-25
Document Date:
2007-05-15
This ODNI briefing from 15 May 2007 describes the rationale for ICREACH and the scale of metadata sharing that was envisioned: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
This Briefing is Classified TOP SECRET//COMINT//NOFORN//20320108
spates °v
—
—
*i©#0*ie#a*i©#©'i©#©*iC#G*i©#©‘i©#0’i©#0*i©,©,iC#&‘ie#©*iC#3'i©#0*iC#©*ie#©*iC#3 1©#C*’€•©•’€...
0.0
CIA Colleagues Enthusiastically Welcome NSA Training
Document
Release Date:
2014-08-25
Document Date:
2010-09-21
This 21 September 2010 memo from the NSA’s CIA Liaison Support Group reveals that ICREACH is available to “over 1000 analysts across 23 US Intelligence Community agencies”: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
(S//REL) CIA Colleagues Enthusiastically Welcome NSA Training
FROM: (U//FOUO)^^^^^^^|
Chief, Liaison Support Group at CIA (FBI)
Run Date: 09/21/2010
(S//REL) From our perspective - that of...
0.0
SSO GHOSTMACHINE Analytics
Document
Release Date:
2013-12-10
Excerpts from slides describing GHOSTMACHINE, the NSA Special Source Operations cloud-based analytics platform: see the Washington Post article New documents show how the NSA infers relationships based on mobile location data, 10 December 2013.
SSO GHOSTMACHINE Analytics
TOP SECRET//COMINT//NOFORN
Fascia Limit?
5,000M
4,000M -
3,000M -
2,000M -
1,000M -
OM
Hitting The Wall
Tuskattire Volume Totals
H CERF
...
0.0
Summary of DNR and DNI Co-Travel Analytics
Document
Release Date:
2013-12-10
Document Date:
2012-10-01
This 24 page white paper dated 1 October 2012 describes and evaluates some of the Co-Traveller tools the NSA and partner agencies uses to analyse phone location data: see the Washington Post article New documents show how the NSA infers relationships based on mobile location data, 10 December 2013.
TOP SECRET//COMINT//REL TO USA, FVEY
Summary of DNR and DNI Co-Travel Analytics
S2I5
1 October 2012
Contact information
TOP SECRET//COMINT//REL TO USA, FVEY
TOP SECRET//COMINT//R...
0.0
Foreign Partners – Last 30 Days
Document
Release Date:
2014-06-18
This Boundless Informant slide shows the number of phone (DNR) and internet (DNI) records collected day-by-day between 10 December 2012 and 8 January 2013, from NSA’s foreign partners: see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with the NSA, 18 June 2014.
FOREIGN PARTNER - Last 30 Days
DNR
DNI
400.000. 000 -|
350.000. 000 -
300.000. 000 -
12-11
121Ö 12'U
Dec 10
Dec 17
Dec 24
Dec 31
Jan
Signal Profile
Mo...
0.0
Third Parties – Last 30 Days
Document
Release Date:
2014-06-18
This Boundless Informant slide shows the number of German phone (DNR) and internet (DNI) records collected day-by-day between 10 December 2012 and 8 January 2013, from Third Party sources. The US-987LA sigad that accounts for the largest number of records is based in Germany: see the Der Spiegel article Spying Together: Germany’s Deep Cooperation with […]
3RD PARTY - Last 30 Days
DHR
Signal Profile
Most Volume
Top 5 Techs
g fcs
IN MAR
g MOIP
HFCF
VSAT
FSTH
DNI
0.0
SSO – Last 30 days
Document
Release Date:
2014-05-13
This Boundless Informant slide shows the immense number of phone (DNR) and internet (DNI) metadata records collected day-by-day between 10 December 2012 and 8 January 2013 for NSA Special Source Operations from a number of sources including XKeyScore: see the book No Place To Hide, 13 May 2014.
Page 159
SSO - Last 30 Days
2 DNI DNR
Signal Profile
Most Volume
Top 5 Techs
fl PCS
IN MAR
MOIP
US-3171: 57.783.148,908 Records
XKEYSCORE: 41,996,304.149 Records
a Hpc...
0.0
FAIRVIEW – Last 30 days
Document
Release Date:
2014-05-13
This Boundless Informant slide shows the number of phone records collected between 10 December 2012 and 8 January 2013 by NSA’s unidentified corporate partner FAIRVIEW (US-990) – some 6 billion in total: see the book No Place To Hide, 13 May 2014.
Page 105
Dec 10 Dec 17 Dec24 Dec31 Jan
^ Signal Profile
H PCS
INMAR
a WOP
a HPCP
VSAT
PSTN
DNI
Most Volume
US-990
6,142,932,557 Records
Top 5 Techs
US-990: ...
0.0
Boundless Informant heat maps
Document
Release Date:
2013-06-11
Document Date:
2013-03-26
These undated heat maps show the number of pieces of communications data the NSA gathers per country in a particular 30 day period, divided into telephony (DNR) and internet (DNI) metadata. Details in the second map refer to a period in January 2013 and third to a period ending in February the same year: see […]
boundlessinformant.pdf:
Page 93
BOUNDLESSINFORMANT
Top 5 Countries (i»t 30 o«>» t-om «¡xu/i
■Ohm.pdf:
BOUNDLESSINFORMANT
im!MwamHMiM:rta.]a;ii]aaMaiM,(.yiii:am«.'.«M«iMiaiiiiiPH;i!i...
0.0
Converged Analysis of Smartphone Devices
Document
Release Date:
2014-01-27
Document Date:
2010-05-01
This NSA presentation from May 2010 describes the kinds of information the agency can extract from smartphone traffic, describing the use of mobile apps as a “golden nugget”. Note that this is the first version of this document released online: see the Pro Publica article Spy Agencies Probe Angry Birds and Other Apps for Personal […]
(U) Converged Analysis of
Smartphone Devices
Identification/Processing/Tasking -
All in a day’s work
TOP SECRET//COMINT/REL TO USA, FVEY
si
Converged mobile devices
offering adv...
0.0
SIGINT Analysts: In-flight GSM Is No Joke
Document
Release Date:
2016-12-07
Document Date:
2010-05-18
This 18 May 2010 article from the NSA internal newsletter SIDToday outlines how the agency is reacting to the growth of mobile phone services on board commercial aircraft: see the Intercept article American and British Spy Agencies Targeted In-flight Mobile Phone Use, 7 December 2016.
TOP SECRET//COMINT//RELTO USA, FVEY
\\
(U//FOUO) In-Flight GSM
S32423/S3T1
The overall classification of this briefing is TOP SECRET//COMTNT//REI,
TOP SECRET//COMINT//REL TO USA, FVE...
0.0
SYNAPSE Data Model
Document
Release Date:
2013-09-28
This slide from an undated NSA presentation demonstrates how the agency uses email and phone data to analyse the social networks of targets (the “Agent” in the diagram): see the New York Times article N.S.A. Gathers Data on Social Connections of U.S. Citizens, 28 September 2013.
SECRET//SI//REL TO USA FVEY
(S//SI//REL USA, FVEY) SYANPSE Data Model
CUSSTXATWt SKKTAKOMiNVMl TO US*. M». OK, •». kftj IMM: 1«
Paki
5
9
'P>rvr/*»^ <*
Page 13
SECRET//SI//R...
0.0
Technology That Identifies People by the Sound of Their Voices
Document
Release Date:
2018-01-19
Document Date:
2006-01-04
This January 2006 post from the NSA internal newsletter SIDToday describes advances in voice-recognition technology, which is helping the agency identify the speakers on intercepted Al-Qaeda recordings. The agency is also developing the technology, which can identify a voice speaking multiple languages, to support its emerging Insider Threat Program: see the Intercept article Finding Your […]
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(S) Technology that Identifies People by the Sound of Their Voices
FROM: Adolf Cusmariu...
0.0
Site Makes First-Ever Collect of High-Interest 4G Cellular Signal
Document
Release Date:
2014-12-04
Document Date:
2010-02-23
This 23 Febrauary 2010 post from the internal NSA newsletter SIDToday describes advances in the agency’s capabilities against 4G signals, described as “a very high priority for NSA and the Intelligence Community”: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014. site-makes-first-ever-collect-of-high-interest
(TS//SI//REL) Site Makes First-Ever Collect of High-Interest 4G Cellular Signal
FROM: ■HU and ■HUH
RAINFALL (F78)
Run Date: 02/23/2010
(TS//SI//REL) A collaborative effort between on-sit...
0.0
AURORAGOLD – Target Technology Trends Center/T3C support to WPMO
Document
Release Date:
2014-12-04
Document Date:
2011-01-01
This NSA briefing, given at the Five Eyes SIGDEV conference in 2011, gives an overview of AURORAGOLD data flows: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
S//SI//REL TO USA, FVEY
AURORAGDLD
(U//FOUO)
AURORAGOLD
Target Technology Trends Center/T3C
support to WPMO
Overall briefing classification: S//SI//REL TO USA, FVEY
S//SI//REL T...
0.0
IR.21 – A Technology Warning Mechanism
Document
Release Date:
2014-12-04
Document Date:
2010-01-08
This 19-page NSA paper, delivered at the 2010 Five Eyes SIGDEV conference, gives a technical explanation of the importance of sourcing mobile carriers’ roaming agreements (IR.21): see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014. ir21-a-technology-warning-mechanism
(S//REL TO USA, FVEY ) IR.21 - A Technology
Warning Mechanism
SDC2010
SSG4/T3C Technical Director
Derived From: NSA/CSSM 1 -52
Dated: 20070108
Declassify On: 20341201
TOP SE...
0.0
New Tactical Collection System Joins the War on Terrorism
Document
Release Date:
2014-02-10
Document Date:
2005-03-03
This extract from a 3 March 2005 NSA briefing acknowledges that the use of geolocation technology to facilitate drone strikes “represents the dawn of a new era”: see the Intercept article The NSA’s Secret Role in the U.S. Assassination Program, 10 February 2014.
(S) New Tactical Collection System Joins the War on Terrorism (repost)
FROM: name redacted
Technical Advisor, Target Reconnaissance and Survey (S316)
Run Date: 03/03/2005
DISTANTFOCUS po...
0.0
Large Scale Expansion of NSA Metadata Sharing
Document
Release Date:
2014-05-13
These two slides, taken from an undated NSA presentation, illustrate the growth in the agency’s metadata collection between 1999 and 2007: see the book No Place To Hide, 13 May 2014.
Page 152
SECRET//CQMINT//REL TO USA, FVEY//203201Q8
Large Scale Expansion of NSA Metadata Sharing
(S//SI//REL) Increases NSA communications metadata sharing
from 50 billion records to 85...