DocumentRelease Date: 2014-03-15 Document Date: 2011-04-01
This short extract from an April 2011 NSA document describes the operation of the agency’s QUANTUMHAND tool: see the Intercept article Compare the NSA’s Facebook Malware Denial to its Own Secret Documents, 15 March 2014.
(TS//SI//NF) QUANTUMTHEORY (QT) is a set of CNO Man-on-the-Side capabilities that involve real-time responses to passive collection. After the recent TURMOIL upgrade at SSO’s SARATOGA access, TA...
DocumentRelease Date: 2014-03-12
These slides from an NSA presentation show how the automated malware deployment tool Turbine depends on a network of passive collection sensors (Turmoil), installed at locations including Fort Meade in Maryland, Misawa in Japan and Menwith Hill in the UK: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, […]
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Sensors: Passive Collection \ Internet * Cloud Internet 1 Cloud Internet <1 Cloud pUttMQJ.l I (S//SI//REÜ High-spe...
DocumentRelease Date: 2014-03-12
This extract from an undated NSA document describes the planned capability of the automated malware injection system Turbine as extending to “potentially millions of implants”: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
(TS//SI//REL) A new intelligent command and control capability designed to manage a very large number of covert implants for active SIGINT and active Attack that reside on the GENIE covert infras...
DocumentRelease Date: 2014-02-18 Document Date: 2011-07-01
This page from the NSA intranet dated July 2011 supplies advice from the NSA Offices of General Counsel (OGC) and Oversight and Compliance (NOC) on the admissibility of targeting strategies against the users of popular websites (including WikLeaks and the Pirate Bay): see the Intercept article Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed […]
TOP SECRET//SI//REL TO USA, FVEY Navigation Main Page Community portal Recent changes Random page Help Toolbox What links here Related changes Upload file Special pages Printab...
DocumentRelease Date: 2017-04-24 Document Date: 2004-10-15
FOSSWAY is a Five Eyes-wide project that's "dedicated to the development of massive analytic attacks against global metadata supported by extensive automation." The goal of FOSSWAY is to help analysts focus on high-level tasks, like thinking about how their targets organize, rather than low-level tasks like data manipulation. There was meeting in September 2004 that had about 90 participants from all five intelligence agencies discussing a variety of topics related to FOSSWAY and how to move it forward.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(TS//SI) FOSSWAY: Massive Analysis Attacks<br>FROM: <br>Advanced Analysis Lab (S211...
DocumentRelease Date: 2017-04-24 Document Date: 2005-01-04
The intelligence analysis intern deployed to Haiti describes how the SIGINT used by tactical forces on the ground is different from the product for most SID customers.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U) Eye-Opening Experience in Haiti (part 2)<br>FROM:<br>Intelligence Analysis Inte...
DocumentRelease Date: 2016-12-07 Document Date: 2004-03-11
(Repost) Photo display of MG Quirk's November 2002 trip to Baghdad, including a visit to Abu Ghraib prison. In this version, only the captions are included.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(U//FOUO) MG Quirk Leads Group to Iraq (repost)<br>FROM: Ron Carback<br>Iraq Issue ...
DocumentRelease Date: 2016-12-07 Document Date: 2004-02-23
The NSA has been monitoring communications associated with FARC commanders and radio operators in an effort to locate three U.S. hostages held after the 2003 crash of a U.S. Cessna plane surveilling coca fields in Colombia.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL <br><br>(S//SI) SID Support to SOUTHCOM - Update on U.S. Hostages<br>FROM:<br>SOUTHCOM Acco...
DocumentRelease Date: 2016-08-10 Document Date: 2003-09-25
A “ground-based INMARSAT geolocation capability” originally deployed for Western Hemisphere narcotics targets will be expanded globally.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS<br>TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL<br><br>(U//FOUO) CANYONDUST Goes Global<br>FROM: SIGINT Communications<br>Unknown<br>Run Da...
DocumentRelease Date: 2015-01-17 Document Date: 2010-11-18
This CSEC presentation for a November 2010 conference outlines CSEC capabilities in the recognition of trojans and other “network based anomolies”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT ■ Communications Security Establishment Canada Centre de la sécurité des télécommunications Canada CSEC SIGINT Cyber Discovery: Summary of the current effort ...
DocumentRelease Date: 2015-01-17 Document Date: 2010-11-12
This GCHQ research paper dated 12 November 2010 discuss some of the agency’s attacks against iPhone handsets: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET STRAP1 12th November 2010 ICTR-MCT Team (ICTR-MCT-GCHQ-dl) MHE Team (MHETeam-GCHQ-dl) OPDSDHQ^^^H TEA Benhall Records Centre iPhone target analysis and exploitation wit...
DocumentRelease Date: 2014-12-28 Document Date: 2010-01-01
This GCHQ Experiment Profile from 2010 proposes a joint NSA/GCHQ trial of SSL decryption on a massive scale: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET STRAP1 Experiment Profile Experiment Name Cryptanalytic Services Experiment Reference Version Date Experiment Owner (GCHQ) Department NSA/S3/CES GCHQ/PTD Experiment Start...
DocumentRelease Date: 2015-06-04 Document Date: 2012-03-23
This NSA memo from 23 March 2012 presentation describes the agency’s proposal for a fourth FAA 702 certification that would allow it to target hackers “tied to malicious cyber activity”: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
(TS//SI//NF) New FAA702 Certification in the Works - Cyber Threat By on 2012-03-23 1423 (TS//SI//NF) NSA has drafted a new FAA702 Certification to target Cyber Threats. It is close to being r...
DocumentRelease Date: 2015-06-22 Document Date: 2008-07-15
This GCHQ document last updated on 15 June 2008 describes the purpose of the agency’s attempts to reverse engineer commercial antivirus software: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET Software Reverse Engineering Network Defence performs reverse engineering both of malicious and of non- malicious code - i.e,.code is translated from machine-readable to human-re...
DocumentRelease Date: 2015-05-08 Document Date: 2012-06-05
This NSA presentation from 5 June 2012 introduces SKYNET, a tool for detecting patterns in bulk phone metadata: see the Intercept article U.S. Government Designated Prominent Al Jazeera Journalist as “Member of Al Qaeda”, 8 May 2015.
TOP SECRET//COMINT//REL TO USA, FVEY SKYNET: Courier Detection via Machine Learning I, R66F/JHU R66F R66F T1211 |, T1211 S2I51 S2I5/TD June 5, 2012 TOP SECRET//COMINT/...
DocumentRelease Date: 2015-05-05
This extract from the 2013 Intelligence Community Budget Justification (“the Black Budget”) outlines the budget for speech recognition technologies: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
TOP SECRET//SI/TK//NOFORN 'hit Exhibit is SECRET'/SIz/NOFORh! ' of ai funding -:ti Millions CCP 00083 - Number of voice files rendered searchable by text queries. Projects: Analytics M...
DocumentRelease Date: 2015-07-01 Document Date: 2009-06-19
This NSA presentation from 19 June 2009 explains the metadata capabilities of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL m V HTTP Activity vs User Activity 19 June 2009 Derived From: NSA/CSSM 1-52 Bated :l2007i MM TOP SEC...
DocumentRelease Date: 2015-07-01 Document Date: 2009-08-13
This NSA presentation from 13 August 2009 explains how data from Free File Uploaders (FFU) can be analysed within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Agenda TOP SECRET//COMINT//RELTO USA, AUS, CAN, GBR, NZL ■ Ove...
DocumentRelease Date: 2015-08-03 Document Date: 2011-01-01
This January 2011 article from Northwest Passage, the NSA internal newsletter for the Yakima Research Station gives an account of its history, including its involvement in ECHELON: see the Intercept article GCHQ and Me: My Life Unmasking British Eavesdroppers, 3 August 2015.
TOP SECRET//COMINT//REL TO USA, FVEY Volume 2, Issue 1 THE NORTHWEST PASSAGE January 2011 (U) BLAST FROM THE PAST: YRS IN THE BEGINNING (U//FOUO) YRS has recently unearthed mountain...
DocumentRelease Date: 2015-08-15 Document Date: 2011-08-23
This 23 August 2011 post from the internal NSA newsletter SSO Weekly describes the disruption caused to collection from a Japanese-American cable by an earthquake. The date of service resumption correlated with the AT&T operated cable in the region: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, […]
(TS//SI//NF) FAIRVIEW: CLIFFSIDE Site - Collection Resumes After Months By H on 2011-08-23 0805 ~5 (TS//SI//NF) On 5 Aug 2011, collection of DNR and DNI traffic at the FAIRVIEW CLIFF...
DocumentRelease Date: 2015-08-15
This undated NSA Special Source Operations presentation describes the agency’s relationship with corporate partner AT&T, codenamed FAIRVIEW: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
TOP SECRET//SI/OC//NOFORN CAIDVICUU SSO FAIRVIEW Overview TOP SECRET//SI/OC//NOFORN • (U) FAIRVIEW DEFINED • (U) OPERATIONAL AUTHORITIES/CAPABILITIES • (U) STATS: WHO IS USING D...
DocumentRelease Date: 2016-08-19 Document Date: 2010-12-15
This December 2010 instructional presentation explains how to use the see the BADDECISION tool to redirect web traffic to a FOXACID server: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//COMINT//NOFORN CLOSE « ACCESS Introduction to BADDECISION December 15-16, 2010 TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN Classification CLOSE ACCESS...
DocumentRelease Date: 2018-03-20 Document Date: 2013-03-01
This internal NSA technical update from March 2013 makes it clear that information from the access point codenamed MONEYROCKET, which tracked Bitcoin users, could be accessed through the agency’s main search interface for analysts, XKeyScore: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
TOP SECRET//COMINT//NOFORN OAKSTAR Weekly Update Program Highlights Week of: March 16-22, 2013 ETS: PRIMECANE Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 T...
DocumentRelease Date: 2018-01-19 Document Date: 2007-10-27
This 26 October 2007 article in the internal NSA newsletter SIDToday describes the agency’s special collection for then-Iranian President Mahmoud Ahmadinejad’s New York City trip for the United Nations General Assembly and provides a detailed study of the technology in action: see the Intercept article Finding Your Voice, 19 January 2018.
TOP SECRET//COMINT//NOFORN//20320108 Friday, October 26, 2007 (U//FOUO) Tips for a Successful Quick Reaction Capability by (U) Collaboration is a way to get the job done. (TS//SI//NF...
DocumentRelease Date: 2015-03-10 Document Date: 2013-04-01
This NSA information paper from April 2013 describes the state of the agency’s intelligence relationship with its New Zealand counterpart: see the New Zealand Herald article NZ’s spy reach stretches across globe, 11 March 2015.
TOP SECRET//SI//REL TO USA, FVEY National Security Agency April 2013 Central Security Service Information Paper (U) Subject: NSA Intelligence Relationship with New Zealand (U) Execu...
Antarctica (ATA/AQ), Australia (AUS/AU), Bangladesh (BGD/BD), Belgium (BEL/BE), Canada (CAN/CA), China (CHN/CN), Denmark (DNK/DK), France (FRA/FR), Germany (DEU/DE), India (IND/IN), Iran (IRN/IR), Italy (ITA/IT), Japan (JPN/JP), North Korea (PRK/KP), Korea (KOR/KR), Netherlands (NLD/NL), New Caledonia (NCL/NC), New Zealand (NZL/NZ), Norway (NOR/NO), Pakistan (PAK/PK), Singapore (SGP/SG), Spain (ESP/ES), Sweden (SWE/SE), Thailand (THA/TH), United Kingdom (GBR/GB), United States (USA/US), Vietnam (VNM/VN)
DocumentRelease Date: 2015-02-04
This page from GCHQ’s internal GCWIki, last modified on 25 June 2012, enumerates open-source data sets that are available in various agency databases: see the Intercept article Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise, 4 February 2015.
TOP SECRET STRAP1 COMINT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click lo reporl inappropriale conlenl. For GCWiki help conlacl: webleam [REDACTED] Suppor p...
DocumentRelease Date: 2013-09-09
This slide, from an undated NSA presentation, shows that the agency is able to defeat BlackBerry encryption technology – using an email from a Mexican government official as an example: see the Der Spiegel article iSpy: How the NSA Accesses Smartphone Data, 9 September 2013.
TOPSECRET//COMNÏ//RH TO USA, FVEY (U) Post Processed BES collection t Type Data Type Mensaje original De: Enviado el: Para: Asunto: RE: URGENTE: Gracias. TOP SE...
DocumentRelease Date: 2014-03-12
This slide lists the range of selectors the Turmoil infrastructure at UK base Menwith Hill can use to identify targets, many of which show the ability of Five Eyes agencies to piggyback on commercial services: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL TO USA, FVEY Selector Types Machine IDs - Cookies • Hotmail GUIDs • Google prefIDs • YahooBcookies • mallruMRCU • yandexUid • twitter Hash • r...
DocumentRelease Date: 2014-03-12
Slides from an NSA Turbulence presentation describe two of the agency’s specialised implants, aimed at compromising virtual private networks (VPNs) and online telephony (VOIP): see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 APEX VPN Phases ► VPN Phase 1: IKE Metadata Only (Spin 15) - IKE packets are exfiled to TURMOIL APEX. ■ APEX reconstructs/r...
DocumentRelease Date: 2014-03-12 Document Date: 2012-02-01
This classification guide from February 2012 outlines the sensitivity of different elements of the US legal regime governing surveillance. In particular, the guide mentions the 2007 Large Content FISA Court order, which had not previously been disclosed: see the New York Times article How a Court Secretly Evolved, Extending U.S. Spies’ Reach, 12 March 2014. […]
TOP SECRET//SI//NOFORN NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U//FOUO) CLASSIFICATION GUIDE FOR FOREIGN INTELLIGENCE SURVEILLANCE ACT (FISA)/PROTECT AMERICA ACT (PAA)/FISA AME...