2014    (2013)
IC off the Record - Complete listing of all the Snowden NSA leaks
IC OFF THE RECORD:

Direct access to leaked information related to the surveillance activities of the U.S. Intelligence Community and their partners.

 

2014 Leaks

 

2013 Leaks View all

 

EDWARD SNOWDEN:  Interviews, Statements, Testimony & Appearances
View all

 

RELATED CONTENT:

ANT Product Catalog
Black Budget
Boundless Informant
Petrobras Screenshots
PRISM slides
XKeyscore

About this website

 


Too much information? Visit the redacted
IC ON THE RECORD website instead.

Having trouble keeping track? It's all in here:
The NSA Mind Map

Your NSA dictionary:
NSA Nicknames and Codewords

NSA Files:  Decoded
What the revelations mean for you

The NSA Archive
Searchable database of NSA documents


Open Letter to Intelligence Employees

 


PARTNERS:

Five Eyes (FVEY)
US:   NSA
UK:   GCHQ
CA:   CSEC
AU:   ASD
NZ:   GCSB

Nine Eyes (+4)
DK:   FE
FR:   DGSE
NL:   AIVD
NO:   NIS

Fourteen Eyes (+5)
BE:   GISS
DE:   BND
IT:   AISE
SP:   CNI
SE:   FRA

NSA's Partnership with Saudi Ministry of Interior

July 25, 2014

The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police

DOCUMENT:  Saudi Arabia Information Paper


NSA Information Paper: NSA Intelligence Relationship with Saudi Arabia (4 pages)

SIGINT Authority Decision Tree - Executive Order 12333

July 23, 2014

Privacy watchdog’s next target: the least-known but biggest aspect of NSA surveillance

EO 12333 flowchart - SIGINT authority decision tree
NSA internal training materials graphic showing the various authorities for SIGINT collection

How GCHQ Controls the Internet Using JTRIG Tools

July 14, 2014

Hacking Online Polls and Other Ways British Spies Seek to Control the Internet

DOCUMENT:  JTRIG Tools and Techniques

JTRIG Tools and Techniques - GCHQ online wiki
JTRIG Tools and Techniques (8 pages)  Text-searchable transcription

 

RELATED LEAKS:  Intelligence Agencies Using Social Media for Propaganda
                              GCHQ Online Covert Operations
                              GCHQ JTRIG Unit Uses "Dirty Tricks"
                              GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger

 



NSA and FBI Targeted Muslim-American Leaders

July 9, 2014

Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On

DOCUMENTS:

FISA Recap spreadsheet - NSA, FBI
A selection from the FISA Recap spreadsheet showing email addresses listed as monitored   (view larger)

NSA target Faisal Gill
Entries from the FISA Recap spreadsheet related to Faisal Gill

NSA target Asim Ghafoor
Entries from the FISA Recap spreadsheet related to Asim Ghafoor

NSA target Agha Saeed
Entries from the FISA Recap spreadsheet related to Agha Saeed

NSA target Nihad Awad
Entries from the FISA Recap spreadsheet related to Nihad Awad

NSA target Hooshang Amirahmadi
Entries from the FISA Recap spreadsheet related to Hooshang Amirahmadi

NSA Mohammed Raghead memo
Instructional document on how to properly format internal memos to justify FISA surveillance

FISA data flow
NSA document showing that Case Notation codes beginning with the prefix “XX.SQF” are assigned to all “FISA accounts” as a unique identifier


Related:  Civil Rights Groups Ask Administration to Explain NSA Surveillance of American Muslims
              White House: racial slurs in NSA intelligence material 'unacceptable'

Ordinary Web Users Are Caught in NSA's Surveillance Net

July 5, 2014

In NSA-intercepted data, those not targeted far outnumber the foreigners who are

A breakdown of the cache of NSA-intercepted communications

DOCUMENT:  Target package prepared by the NSA - Muhammad Tahir Shahzad

Follow-up story:  How 160,000 intercepted communications led to our latest NSA story

Target package prepared by the NSA prior to the capture of Muhammad Tahir Shahzad in January 2011

NSA intercepted image of women - FISA - Australia taliban
Composite image of two of the many private photos NSA collected from online accounts in the U.S.

XKeyscore Source Code Targets TOR and TAILS Users

July 3, 2014

NSA targets the privacy-conscious

Branded by the NSA as an extremist (Original German version)

SOURCE CODE:  XKeyscore rules


XKeyscore Rules
 XKeyscore source code

 

VIEW RELATED LEAK:  How NSA Targets TOR

More about XKeyscore

 

XKEYSCORE

Danish Partnership with NSA

June 19, 2014

Snowden documents reveal Danish partnership with NSA (Information.dk)

More countries involved in the NSA's global mass surveillance (Information.dk)

NSA 3rd party partners tap Internet backbone in global surveillance program (Information.dk)

How Secret Partners Expand NSA’s Surveillance Dragnet (The Intercept)


DOCUMENTS:  

Keith Alexander meeting notes with Denmark DDIS

Keith Alexander's speech notes for Danish DDIS (DENUSA conference)



Black Budget - foreign partner access

Excerpt from Black Budget: Foreign Partner Access



Rampart-A project overview slides

Rampart-A Project Overview October 2010 (23 slides)



Special Source Operations slides - Rampart-A

Special Source Operations slides (6 of 8 slides are new)



SSO slides - Rampart-A tasking

Special Source Operations slides (3 additional RAMPART-A slides)

View 2013 leak containing related SSO Slides: NSA Taps Into Google and Yahoo Data Centers



RAMPART-A; SMOKYSINK; AZUREPHOENIX; SPINNERET; TRANQUIL; MOONLIGHTPATH; FIREBIRD; FLASHMARK; FALCONSTRIKE; DULCIMER; REDHARVEST; CONDORSPEAK


NSA in Germany

June 18, 2014

New NSA Revelations: Inside Snowden's Germany File (Der Spiegel)

Spying Together: Germany's Deep Cooperation with the NSA (Der Spiegel)

The NSA in Germany: Snowden's Documents Available for Download (Der Spiegel)


Related stories:

How the NSA may be using games to encourage digital snooping (Washington Post)

The NSA's big problem, explained by the NSA (The Week)

Tell a lie, remove the gear: How the NSA covers up when cable taps are found (Ars Technica)


BND, BfV, and BSI Documents:

Germany BND Snowden documents
Snowden slides showing structure of the German BND
Snowden documents - BND, BSI, BfV, NSA

NSA/BND Joint SIGINT Activity (JSA):

Snowden documents - BND, NSA Joint Sigint Activity JSA documents

European Security Center(ESC), ESOC, and European Cryptologic Center(ECC):

European Security Center(ESC), ESOC, and European Cryptologic Center(ECC) documents

European Technical Center (ETC):

European Technical Center Snowden documents

NSA workers in Germany:


NSA guidelines and locations:

classification guidelines of NSA SIGINT details, NSA sites in Germany
Worldwide locations of the Cryptologic Services Groups and FORNSAT satellite
NSA/CIA unit Special Collection Service - Pacific SIGDEV conference slides

BoundlessInformant Documents:  (View all released to date)

NSA maps
Boundless informant 3rd party and foreign partners maps
Boundless Informant US and UK collection maps

PRISM slides:  (View all PRISM slides released to date)

PRISM slides - faa 702 utt dni - US-984xn per opi

XKeyscore-related documents: (View all XKeyscore slides released to date)

Xkeyscore documents - training ecc Dagger Complex - BfV

TEMPORA-related documents:

Tempora documents

Other miscellaneous documents:

Analytics for Europe and Africa - terrorism, xkeyscore fingeprints
NSA content extraction analytics slides - Center for Content Extraction
NSA searching for terror suspects, NYMROD database
NSA NYMROD mission slides - Alfred E. Neuman
NSA wharpdrive discovered
list of NSA German SIGADS

View full set of above documents in single PDF (source: Cryptome)

 

XKEYSCORE; ACRIDMINI; LUTEUSICARUS; HEADMOVIES; APERTURESCIENCE; CROSSEYEDSLOTH; KOALAPUNCH; BALLOONKNOT; MAGNUMOPUS; WAXTITAN; WILDCOUGAR; MURPHYSLAW; DARKFIRE; CHOCOLATESHIP; SCREAMINGHARPY; WILDCHOCOBO; WHISTLINGDIXIE; CHAOSOVERLORD; SHAREDTAFFY; POTBED; DARKTHUNDER; JEEPFLEA; SHARPSHADOW; HIGHCASTLE; TROJAN CLASSIC XXI; CADENCE; PINWALE, BLACKPEARL; ROADBED; GODLIKELESION; BOTANICREALTY; LADYLOVE; UNCANNY; SALTYDOGS; TROPICPUMA; GRANDMASTER; WEALTHYCLUSTER; DISHFIRE; JUGGERNAUT; TURMOIL; BLACKNIGHT; CYBERTRANS; PAINTBALL; SYNAPSE; JOURNEYMAN; GOLDENRETRIEVER; SOCIOPATH; TEMPORA; GENESIS; NYMROD; ANCHORY; INTERQUAKE; PANOPLY; MIRROR; DARKQUEST; BIRDWATCHER; WHARPDRIVE


GCHQ:  Middle East Spy Hub in Oman

June 3, 2014

REVEALED: GCHQ's BEYOND TOP SECRET Middle Eastern INTERNET SPY BASE


VIEW RELATED LEAK:  GCHQ: TEMPORA Telecom Partners (BT, Verizon Business, Vodafone Cable, Global Crossing, Level 3, Viatel, Interoute)

 

CIRCUIT; TIMPANI; GUITAR; CLARINET; REMEDY; GERONTIC

NSA Collects Web Images for Facial Recognition Programs

May 31, 2014

N.S.A. Collecting Millions of Faces From Web Images

DOCUMENT:  Identity Intelligence: Image is Everything

NSA facial recognition slides - Identity Intelligence
Identity Intelligence: Image Is Everything (4 slides)

View the Identity Intelligence slide #4 full-size

 

TUNDRAFREEZE; WELLSPRING; PISCES; PINWALE

Official statement from the government of the Bahamas - NSA surveillance is a moral failing

The Government of The Bahamas in response to the NSA spying revelation (Source)

No Place to Hide by Glenn Greenwald (official website)

May 13, 2014

Download the complete set of documents contained in the book


New Boundless Informant documents:   (click each to enlarge)
  • Boundless Informant - Poland

    Boundless Informant - Poland

  • Boundless Informant - Fairview

    Boundless Informant - FAIRVIEW

  • Boundless Informant - SSO

    Boundless Informant - SSO


View all Boundless Informant documents released to date

 

New XKEYSCORE documents:   (click each to enlarge)
  • XKEYSCORE plugins

     

  • XKEYSCORE email address queries

     

  • XKEYSCORE why interested in http

     

  • XKEYSCORE activity search

     

  • XKEYSCORE http search example

     

  • XKEYSCORE user activity query

     

  • XKEYSCORE osn intelligence target

     


View all Xkeyscore documents released to date

 

New PRISM slides and related documents:   (click each to enlarge)
  • PRISM slide - unique selectors

     

  • PRISM slide - week in the life of PRISM

     

  • PRISM slide - week in the life of PRISM

    NSA message board - 6 PRISM msgs


View all PRISM documents released to date

 

SSO slides and documents:   (click each to enlarge)
  • SSO - Corporate Partner Access

     

  • SSO - Relationships and authorities

     

  • SSO - unique aspects

     

  • SSO - US-990 FAIRVIEW

     

  • SSO - FAIRVIEW; ORANGECRUSH; SILVERZEPHYR

    FAIRVIEW; ORANGECRUSH; SILVERZEPHYR

  • SSO - STORMBREW

     

  • SSO - BLARNEY

     

  • SSO - BLARNEY - US-984

     

  • SSO - BLARNEY - Operational highlight

     

  • SSO - BLARNEY Facebook collection

    BLARNEY expanded Facebook collection

 

Collect it all:   (click each to enlarge)
  • NSA slide - Collect it all, sniff it all, know it all, process it all, exploit it all, partner it all

     

  • NSA slide - why TARMAC

     

  • WORDGOPHER

    One step closer to collecting it all

  • GCHQ Guiding Light

     

  • SHELLTRUMPET - one trillion metadata records

    SHELLTRUMPET - one trillion metadata records

 

Spying:   (click each to enlarge)
  • NSA close access sigads list

    Close access SIGADS - Sept 2010

  • Australia DSD letter to NSA about spying on citizens

    2011 Australia DSD letter to NSA requesting data

  • NSA relationship with Israel - spying

    Relationship with Israel

  • NSA ISA economic and trade espionage

    2006 NSA ISI memo re NSA's economic and trade espionage

  • NSA interdict routers for TAO implants

    NSA intercepts routers for TAO implants

  • NSA memo about problems with intercepted Cisco routers

    April 2013 memo about Cisco

  • NSA - Aeroflot, SWIFT, Petrobras, Gazprom, Warid Telecom, French MFA

     

 

Partners:   (click each to enlarge)
  • NSA Tier A and Tier B countries - partnerships

     

  • NSA sigint partners - second parties, third parties, coalitions, muli-lats

     

  • NSA funding of partners

     

  • NSA strategic partnerships with Quest, EDS, HP, ATT, Microsoft, Intel, Verizon, Qualcomm, Oracle, IBM, Cisco, Motorola

     

 

GCHQ Global Telecommunications Exploitation (GTE) presentation to 2011 Five Eyes conference: (click each to enlarge)
  • GCHQ GTE slide - exploiting Facebook

     

  • GCHQ GTE slide - why OSNs

     

  • GCHQ GTE slide - passive environment

     

  • GCHQ GTE slide - Facebook's use of Akamai CDN

     

  • GCHQ GTE slide - exploting Facebook CDN

     

  • GCHQ GTE slide - obtaining profile and album images

     

  • GCHQ GTE slide - THIEVING MAGPIE

     

  • GCHQ GTE slide - airlines onboard GSM services

     

  • GCHQ GTE slide - SOUTHWINDS

     

  • GCHQ GTE slide - Blackberry phones in flight

     

  • GCHQ GTE slide - airplane travel tracking and surveillance

     

 

Other new documents published:   (click each to enlarge)
  • NSA customers list

     

  • Communications metadata fields in ICREACH

     

  • NSA collection challenge - too much data

    From Five Eyes SIGDEV conference

  • NSA chart showing yearly growth of metadata collected and shared

    Slide from 2006

  • NSA PROTON call events

    May 2007

  • NSA analytic driver

    2012 Five Eyes presentation

  • NSA HOMING PIEGEON FASTSCOPE

    2012 Five Eyes presentation

  • NSA ego

     

  • NSA threat

     

  • NSA slide - The threat today

    From an NSA overview briefing

 

Analysis:  NSA's largest cable tapping program: DANCINGOASIS

 

Related Stories:

Snowden docs: GCSB links to US spying programmes - New Zealand Herald

Canada actively spies for NSA, Glenn Greenwald claims in new book - Toronto Star

Australia asked Americans for more help to spy on Australian citizens - The Guardian

NSA Docs Detail Efforts To Collect Data From Microsoft’s Skype, SkyDrive, Outlook - TechCrunch

Microsoft colluded with FBI to bypass Outlook encryption - The Daily Dot

Book Reveals Wider Net of U.S. Spying on Envoys - New York Times

NSA’s sweeping efforts to ‘Know it All’ - The Washington Post

From M.L. King to Anonymous, the state targets dissenters not just "bad guys" - The Guardian

How the NSA tampers with US-made internet routers - The Guardian

NSA and GCHQ seek ways of monitoring airplane passenger communication - NY Daily News

 

ASPHALT; ARTIFICE; BLARNEY; BOUNDLESSINFORMANT; DANCINGOASIS; FAIRVIEW; HOMINGPIGEON; ORANGECRUSH; PRISM; SHELLTRUMPET; SILVERZEPHYR; SOUTHWINDS; STORMBREW; TARMAC; THIEVINGMAGPIE; WOLFPOINT; WORDGOPHER; XKEYSCORE


NSA Targets Revealed: ICTP, Honduran Resort, Telecoms & More

May 8, 2014

Revelations about NSA's underwater cable spying

Related:  NSA spied on research center in Trieste but the silence of the government continues



GCHQ Sought Unsupervised Access to NSA Data

April 30, 2014

British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools

DOCUMENT:  Lobban NSA Visit Précis

DOCUMENT:  GHOSTMACHINE: Identifier Lead Triage with ECHOBASE

DOCUMENT:  PRISM Olympic Option

NSA memo about GCHQ director Sir Iain Lobban's visit with NSA Director Keith Alexander
NSA briefing memo about GCHQ Director Sir Iain Lobban's visit to NSA on April 30, 2013 (4 pages)

 

NSA ECHOBASE slides showing Identifier Scoreboard, SIGINT Analytics, GHOSTMACHINE - Data sharing with GCHQ - Identifier Lead Triage with ECHOBASE
NSA SIGDEV slides: Identifier Lead Triage with ECHOBASE (14 slides)

Analysis:  The Triage Document

More about GHOSTMACHINE:  GHOSTMACHINE: The NSA's cloud analytics platform


PRISM Operations Highlight - Olympic Support for GCHQ
PRISM Operations Highlight - Olympics Support - GCHQ Using PRISM Access (1 slide)

 

ECHOBASE; GHOSTMACHINE; IDENTIFIER SCOREBOARD; SIGINT ANALYTICS; WAVELEGAL


Norway's NIS Acquires Supercomputer for Surveillance Data

April 26, 2014

NIS acquires supercomputer


Excerpts from NSA Information Paper: NSA Intelligence Relationship with Norway (4/17/2013)

 

VIEW RELATED LEAK:  NIS: Norway Spying for NSA

 

STEELWINTER; WINDSORBLUE

Snowden quote on Pulitzers

Edward Snowden in his statement on The Guardian and The Washington Post winning the Pulitzer Prize for public service (Source)

Keith Alexander quote on Pulitzers

General Keith Alexander in his interview with The Australian Financial Review on The Guardian and The Washington Post winning the Pulitzer Prize for public service (Source)

Intelligence Agencies Using Social Media for Propaganda

April 4, 2014

The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket

DOCUMENT:  Full-Spectrum Cyber Effects

DOCUMENT:  2009 SigDev Conference: "Best Yet and Continuing to Improve'

GCHQ Full Spectrum Cyber Effect slides - full set
GCHQ Full-Spectrum Cyber Effects (previously released here and here; Slides #14, #16, #19 are new)

NSA 2009 SIGDEV conference
2009 SigDev Conference: "Best Yet and Continuing to Improve' (2 pages)

 

RELATED LEAKS:  GCHQ Controls the Internet Using JTRIG Tools
                              GCHQ Online Covert Operations
                              GCHQ JTRIG Unit Uses "Dirty Tricks"
                              GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger

NSA/GCHQ Targeted World Leaders; Private German Companies

March 29, 2014

GCHQ and NSA Targeted Private German Companies  (Der Spiegel)

Der Spiegel: NSA Put Merkel on List of 122 Targeted Leaders  (The Intercept)

NSA Machine vs Manual Chief-of-State Citations - world leaders spying list NSA SSO FISA court orders for monitoring Germany, Jordan, and Morocco - 2013
Leaders listed in NSA Target Knowledge Base;   SSO report citing FISA authorization to monitor Germany

 

RELATED:  Additional names of world leaders listed in the NSA Target Knowledge Base

 

NYMROD

NSA Targets Chinese Government and Networking Firm Huawei

March 23, 2014

Additional slides published in Der Spiegel magazine

NSA Social Network Analysis of Huawei CEO Ren Zhengfei and Chairwoman Sun Yafang - NSA slide showing Chinese Exfiltrate Sensitive Military Technology
Related slides appearing in the print edition of Der Spiegel magazine (Source)

 

March 22, 2014

N.S.A. Breached Chinese Servers Seen as Security Threat  (New York Times)

Targeting Huawei: NSA Spied on Chinese Government and Networking Firm  (Der Spiegel)

DOCUMENT:  Slides Describe Mission Involving Huawei

NSA SHOTGIANT slide about hacking Huawei servers in China and notes about the objectives of the SHOTGIANT program - CNE Huawei routers in China allowing SIGINT collection
NSA slide from 2010 about Huawei products and notes about the objectives of the SHOTGIANT program

 

Analysis:  We may have witnessed a NSA "Shotgiant" TAO-like action

RELATED:  ANT Products for Huawei:  HALLUXWATER;   HEADWATER  (Source)

 

SHOTGIANT

CSEC Attributes Email Spying Program to France

March 21, 2014

France suspected of cyber espionage (English translation)

When Canadians go hunting for "Babar" (English translation)

DOCUMENT:  SNOWGLOBE: From Discovery to Attribution

CSEC SNOWGLOBE
CSEC slide presentation from 2011 describing the SNOWGLOBE spyware (7 slides)

 

RELATED STORY:   French spy software targeted Canada

 

SNOWGLOBE; BABAR

How NSA Hacks System Administrators

March 20, 2014

Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators

DOCUMENT:  I Hunt Sys Admins

NSA discussion board about hacking sys admins to access routers
Multiple posts published in 2012 on an internal NSA discussion board (View all 6 pages)

Orange (France Telecom) Shares Data With France's DGSE

March 20, 2014

Spying: How Orange and intelligence services cooperate  (English translation)



NSA Can Record All of a Foreign Country's Phone Calls

March 18, 2014

NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls

DOCUMENT:  NSA symbolizes data-collection program with wizard

DOCUMENT:  Description of data collection by NSA under MYSTIC

DOCUMENT:  Adding a country to MYSTIC efforts mentioned


MYSTIC slide;  Excerpt from a weekly briefing memo from NSA's Special Source Operations team

 

NSA MYSTIC description
Excerpt from the FY13 Congressional Budget Justification for the National Intelligence Program

 

MYSTIC; RETRO; SCALAWAG; DOUBLEARROW; NUCLEON

NSA Malware Plans

March 15, 2014 - Follow-up story responding to NSA's malware denial

Compare the NSA’s Facebook Malware Denial to its Own Secret Documents

NSA Public Affairs Office: Statement in Response to Press Allegations


NSA Facebook server impersonation using QUANTUMHAND and FOXACID
Excerpt from classified NSA document dated April 2011 explaining how NSA uses QUANTUMHAND to deploy its surveillance implants on target computers

 


Animation: How the NSA Secretly Masqueraded as Facebook to Hack Computers for Surveillance

 

 

March 12, 2014

How the NSA Plans to Infect ‘Millions’ of Computers with Malware

Documents:


- Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail
- Five Eyes Hacking Large Routers

 


- NSA Technology Directorate Analysis of Converged Data
- Selector Types
- There Is More Than One Way to Quantum

 


NSA Phishing Tactics and Man in the Middle Attacks

 


Quantum Insert Diagrams (5 slides total)

 


The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics (11 slides total)

 


TURBINE and TURMOIL

 


VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN

 


Industrial-Scale Exploitation                             Thousands of Implants

 

NSA TURBINE command and control documents
Excerpts from NSA documents related to TURBINE (View larger)

 

TURBINE; UNITEDRAKE; CAPTIVATEDAUDIENCE; GUMFISH; FOGGYBOTTOM; GROK; SALVAGERABBIT; HAMMERCHANT; HAMMERSTEIN; WILLOWVIXEN; SECONDDATE; FOXACID; VALIDATOR; TURMOIL; TUTELAGE; INSENSER; QUANTUMTHEORY; XKEYSCORE; DEEPDIVE; DRAGGABLEKITTEN; QUANTUMINSERT; QUANTUMBOT; QUANTUMBISCUIT; QUANTUMDNS; QUANTUMHAND; QUANTUMPHANTOM; QUANTUMSKY; QUANTUMCOPPER; QUANTUMSMACKDOWN; QUANTUMMUSH; QUANTUMSPIM; QUANTUMSQUEEL; QUANTUMSQUIRREL; QUANTUMDEFENSE; ISLANDTRANSPORT; SURPLUSHANGER; STRAIGHTBIZARRE; DAREDEVIL; SMOKEYSINK; SARATOGA; TOYGRIPPE; POISON NUT; APEX; KEYCARD; PRESSUREWAVE; FASCIA; FASHIONCLEFT; METROTUBE; CORALREEF; CONVEYANCE; NUCLEON


NSA Third Party Relationships

March 13, 2014

Foreign Officials In the Dark About Their Own Spy Agencies’ Cooperation with NSA

DOCUMENT:  Third Party Relationships

NSA Third Party relationships
Internal NSA interview with a SIGINT official in NSA’s Foreign Affairs Directorate about third party relationships (View larger)

Dutch Intelligence Shares Somali Phone Intercepts with NSA

March 8, 2014

The secret role of the Dutch in the American war on terror

NSA success stories about Dutch MIVD intercepting Somali pirate phone data from the Rotterdam - NATO OCEANSHIELD
NSA Foreign Affairs Division (FAD) Success Stories (Source)

Yahoo quote on GCHQ webcam spying -  a whole new level of violation of our users' privacy

Yahoo's reaction to news about GCHQ's bulk webcam interception (Source)

GCHQ Collected Yahoo Webcam Images in Bulk

February 27, 2014

Yahoo webcam images from millions of users intercepted by GCHQ

GCHQ Optic Nerve document showing spying on Yahoo webcam chats
Excerpts from documents related to GCHQ OPTIC NERVE (View larger)

 

OPTIC NERVE

GCHQ: Online Covert Operations

February 24, 2014

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

DOCUMENT:  The Art of Deception: Training for Online Covert Operations

GCHQ slides - The Art of Deception: Training for Online Covert Operations
GCHQ: The Art of Deception: Training for a New Generation of Online Covert Operations" (50 slides)

 

RELATED LEAKS:  GCHQ Controls the Internet Using JTRIG Tools
                              Intelligence Agencies Using Social Media for Propaganda
                              GCHQ JTRIG Unit Uses "Dirty Tricks"
                              GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger

NSA and GCHQ Spied on WikiLeaks

February 18, 2014

Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters

DOCUMENT:  Psychology - A New Kind of SIGDEV

DOCUMENT:  Discovery SIGINT Targeting Scenarios and Compliance

gchq anticrisi girl slides
ANTICRISIS GIRL slides from GCHQ's "Psychology - A New Kind of SIGDEV" (View all 44 slides)

 

NSA Wikilieaks manhunting timeline

NSA asking countries to file criminal charges against Wikileaks Julian Assange
Excerpt from Intelligence Community's Manhunting Timeline document showing how the U.S. urged other nations to file criminal charges against Julian Assange (Source)

 

NSA internal wiki
SIGINT targeting scenarios and compliance (View full document)

 

WikiLeaks Response:  NSA and GCHQ spying on WikiLeaks

 

ANTICRISIS GIRL

ASD Monitored U.S. Law Firm Representing Indonesia in Trade Talks With the United States

February 15, 2014

Spying by N.S.A. Ally Entangled U.S. Law Firm

DOCUMENT:  SUSLOC Facilitates Sensitive DSD Reporting on Trade Talks

SUSLOC DSD memo about spying on US law firm communications with Indesia about trade talks - NSA
Excerpt from February 2013 bulletin of SUSLOC, the NSA's liaison with ASD (Source)

Drone Program Identifies Targets Based on NSA Metadata Analysis and Cell Phone Tracking Technology

February 10, 2014

The NSA’s Secret Role in the U.S. Assassination Program

NSA VICTORYDANCE, GILGAMESH, DISTANTFOCUS, Anwar Nasser Aulaqi drone documents
Excerpts from NSA documents (source) - View larger

 

VIEW RELATED LEAK:  NSA's Role in the CIA's Drone Program (October 2013)

 

GEO CELL; GILGAMESH; SHENANIGANS; VICTORYDANCE; DISTANTFOCUS

GCHQ JTRIG Unit Uses "Dirty Tricks"

February 7, 2014

Snowden Docs: British Spies Used Sex and 'Dirty Tricks'

DOCUMENT:  Cyber Integration: The Art of the Possible

DOCUMENT:  Full Spectrum Cyber Effects: SIGINT Development as an Enabler for GCHQ's EFFECTS Mission

GCHQ JTRIG dirty tricks slide showing Ambassadors Reception
GCHQ slides from JTRIG presentation: Cyber Integration - The Art of the Possible (13 slides)

 

Full Spectrum Cyber Effects: SIGINT Development as an Enabler for GCHQ's EFFECTS Mission
Full Spectrum Cyber Effects: SIGINT Development as an Enabler for GCHQ's EFFECTS Mission (11 slides) Additional slides here

 

RELATED LEAKS:  GCHQ Controls the Internet Using JTRIG Tools
                              Intelligence Agencies Using Social Media for Propaganda
                              GCHQ Online Covert Operations
                              GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger

 

EFFECTS; AMBASSADORS RECEPTION; ROYAL CONCIERGE

GCHQ Targeted Hackers and DDoS'd IRC Chat Rooms

February 4, 2014

War on Anonymous: British Spies Attacked Hackers, Snowden Docs Show

DOCUMENT:  Hacktivism: Online Covert Action

GCHQ slides - DDOS anonymous irc hackers
GCHQ: Hacktivism: Online Covert Action (14 slides)

 

ROLLING THUNDER

NSA Spying at 2009 Climate Summit

January 30, 2014

NSA spied against UN climate negotiations

Snowden Docs: U.S. Spied On Negotiators At 2009 Climate Summit

DOCUMENT:  UN Climate Change Conference in Copenhagen

UN Climate Change Conference in Copenhagen -- Will the Developed and Developing World Agree on Climate Change
Document posted on an internal NSA website about NSA monitoring the 2009 Copenhagen Climate Change Conference (2 pages)

GCHQ:  Monitoring YouTube, Facebook, Twitter, Blogger

January 27, 2014

Snowden docs reveal British spies snooped on YouTube and Facebook

DOCUMENT:  Psychology - A New Kind of SIGDEV (GCHQ)

GCHQ slides - Psychology - A new kind of SIGDEV - youtube, facebook, twitter, blogger
Psychology - A New Kind of SIGDEV (42 slides - pages 2-43 of PDF)

 

GCHQ spying on Twitter - slides from 2010
Information Operations: The Social Web (5 slides - pages 44-48 of PDF)

 

RELATED LEAKS:  GCHQ Controls the Internet Using JTRIG Tools
                              Intelligence Agencies Using Social Media for Propaganda
                              GCHQ Online Covert Operations
                              GCHQ JTRIG Unit Uses "Dirty Tricks"

 

Analysis: Videos in the GCHQ SQUEAKYDOLPHIN Presentation

 

SQUEAKY DOLPHIN

NSA and GCHQ Collect Data from Phone Apps

January 27, 2014

NSA and GCHQ target 'leaky' phone apps like Angry Birds to scoop user data - Guardian

Spy Agencies Scour Phone Apps for Personal Data - New York Times

Spy Agencies Probe Angry Birds and Other Apps for Personal Data - ProPublica

DOCUMENT:  Converged Analysis of Smartphone Devices, NSA, May 2010

DOCUMENT:  Mobile Theme Briefing, GCHQ, May 2010

NSA slides on smart phone targeting
NSA slides: Converged Analysis of Smartphone Devices (14 slides)

 

GCHQ slides - mobile phones briefing
GCHQ slides: Mobile Theme Briefing (4 slides)

 

How GCHQ and NSA spies on Android and Apple iPhones
Two additional slides published by Guardian showing GCHQ capability for Android and iPhone

View a related slide from 2013 about phone spying at the G20 Summit in London

 

WARRIOR PRIDE; DREAMY SMURF; NOSEY SMURF; TRACKER SMURF; PARANOID SMURF; PORUS


Edward Snowden Interview with German NDR (English Version)

January 26, 2014



About this video

 

More:  Edward Snowden - Interviews, Statements, and Appearances

NSA Collects Millions of Text Messages Daily

January 16, 2014

NSA collects millions of text messages daily in 'untargeted' global sweep

DOCUMENT:  NSA Dishfire presentation on text message collection

NSA Dishfire slide presentation - June 2011
Content Extraction Enhancements for Target Analytics: SMS Text Messages: A Goldmine to Exploit (8 slides)

 

RELATED VIDEO:  Revealed: UK and US spied on text messages of Brits

GCHQ document about Dishfire dated May 2008 from Britain's Channel 4 news video
From Britain's Channel 4 News video: Excerpts from classified GCHQ document dated May 2008

 

DISHFIRE; PREFER; SPYDER; SEDB; FASTCOPE; MILKBONE

NSA Uses Radio Waves to Compromise Computers Not Connected to the Internet

January 14, 2014

NSA Devises Radio Pathway Into Computers

Diagram showing how NSA transmits data to NSA field station using covert radio waves and tranceivers planted in USB cable
New York Times graphic showing how the NSA uses radio frequencies to penetrate computers. NYT also reported having Snowden documents indicating "that the United States has set up two data centers in China — perhaps through front companies — from which it can insert malware into computers"

 

VIEW RELATED LEAK:  The NSA Toolbox:  ANT Product Catalog

 

QUANTUM

NSA Quantum Computing Research

January 2, 2014

NSA seeks to build quantum computer that could crack most types of encryption

DOCUMENT:  Penetrating Hard Targets - Project Description

DOCUMENT:  Classification Guide for NSA/CSS Quantum Computing Research

penetrating hard targets - black budget
Penetrating Hard Targets: from Black Budget, Volume 2, "Combined Cryptologic Program" (3 pages)

NSA Quantum computing guide
Classification Guide for NSA/CSS Quantum Computing Research (10 pages)