2013 LEAKS          2014 LEAKS          2015 LEAKS  
IC off the Record 2014 - Complete list of 2014 NSA leaks
IC OFF THE RECORD:

Direct access to leaked information related to the surveillance activities of the U.S. Intelligence Community and their partners.

 

INDEX OF LEAKS:

2014

2013   (View all)

2015   (View all)

 

EDWARD SNOWDEN:
View all  of his interviews, statements, testimony and appearances

 

RELATED CONTENT:

ANT Product Catalog
Black Budget
Boundless Informant
Petrobras Screenshots
PRISM slides
XKeyscore

About this website

 


Too much information? Visit the redacted IC ON THE RECORD website instead.

Your NSA dictionary:
NSA Nicknames and Codewords

NSA Files:  Decoded
What the revelations mean for you

Snowden Surveillance Archive
Searchable collection of Snowden documents

Five Eyes Documents
FVEYdocs:  Eyeing the Five


Open Letter to Intelligence Employees

 


PARTNERS:

Five Eyes (FVEY)
US:   NSA
UK:   GCHQ
CA:   CSEC
AU:   ASD
NZ:   GCSB

Nine Eyes (+4)
DK:   FE
FR:   DGSE
NL:   AIVD
NO:   NIS

Fourteen Eyes (+5)
BE:   GISS
DE:   BND
IT:   AISE
SP:   CNI
SE:   FRA

Targeted Killings in Afghanistan

December 28, 2014

Obama's Lists: A Dubious History of Targeted Killings in Afghanistan

DOCUMENTS:

NSA Taliban document
SIDToday: SIGINT Helps Hobble the Taliban by Cutting Off Their Livelihood (4 pages)

NSA Dynamic Target Storyboard: Objective - Doody (Mullah Niaz Muhammed)
Dynamic Target Storyboard - Objective: Doody - Mullah Niaz Muhammed (3 pages)

JPEL Targets (Joint Prioritized Effects List) - Secret Drone Kill List
JPEL Targets (Joint Prioritized Effects List)  (36 pages)

German Forces Launches Rare Takedown Operation - Afghanistan
SIDToday: To Nab Afghan Nemesis, German Forces Launches Rare Takedown Operation (3 pages)


NSA/GCHQ Attacks On Internet Security

December 28, 2014

Prying Eyes: Inside the NSA's War on Internet Security


ATTACKS AGAINST CRYPTO:

Guide for Analysts on how to use the PRISM Skype Collection
User's Guide for PRISM Skype Collection (9 pages)

GCHQ Briefing on the BULLRUN Program
GCHQ: BULLRUN CoI Briefing Sheet (4 pages)

GCHQ Presentation on the BULLRUN Programs Decryption Capabilities
GCHQ: BULLRUN (10 slides)

NSA LONGHAUL program for end-to-end attack orchestration and key recovery service
NSA WikiInfo: LONGHAUL (15 pages)

BLUESNORT program on Net Defense from Encrypted Communications
Net Defense From Encrypted Communications (16 pages)

Presentation from the SIGDEV Conference 2012 explaining which encryption protocols and techniques can be attacked and which not
SIGDEV Conference 2012: Technology Trending Challenges and Approaches (40 slides)

NSA program SCARLETFEVER explaining how attacks on encrypted connections are orchestrated
NSA WikiInfo: SCARLETFEVER (3 pages)

Description of VOIP Telephony Encryption methods and cryptanalytic and other ways to attack
GCHQ GCWiki: VoIP NSA Alias (5 pages)

 

 

CRYPTANALYTICS:

SIDTODAY - General Description how NSA handles encrypted traffic
SIDToday: SIGINT Strategy threads about how NSA handles encrypted traffic (3 pages)

Intercept with PGP encrypted message Intercept with OTR encrypted chat
PGP intercept (1 page)                    OTR encrypted chat intercept (2 pages)

Classification Guide for Cryptanalysis
Classification Guide for Cryptanalysis (3 pages)

Procedural GCHQ Document on how analysts are to handle encrypted traffic
GCHQ: Crypt Ops Data Store User Guide (4 pages)

NSA / GCHQ Crypt Discovery Joint Collaboration Activity
NSA/GCHQ: Crypt Discovery Joint Collaboration Activity (3 pages)

NSA Cryptographic Modernization (CryptoMod) Classification Guide
NSA Cryptographic Modernization (CryptoMod) Classification Guide (4 pages)

National Information Assurance Research Laboratory (NIARL) Newsletter, Keyword TUNDRA
National Information Assurance Research Laboratory (NIARL) Newsletter: The Edge (15 pages)

DISCOROUTE, BLACKPEARL, DARKSUNRISE, TOYGRIPPE slides
What Your Mother Never Told You About SIGDEV Analysis (87 slides)

 

 

DEANONYMIZING:

Explanation of a potential technique to deanonymise users of the Tor network
GCHQ: A Potential Technique to Deanonymise Users of the Tor Network (23 slides)

Analytics on security of Tor hidden services
Applied Research: Tor Hidden Services (26 slides)

Overview on Internet Anonymization Services on how they work
Internet Anonymity 2011 (51 slides)

Tor deanonymisation research
GCHQ GCWiki: Tor Deanonymisation Research (3 pages)

Tor Overview of Existing Techniques
GCHQ: Tor - Overview of Existing Techniques (5 slides)

How GCHQ breaks Tor
GCHQ: A Potential Technique to Deanonymise Users of the Tor Network (18 pages)

 

 

ATTACKS ON VPN:

NSA High Level Description on TURMOIL / APEX Programs on Attacking VPN
WikiInfo: TURMOIL/APEX High Level Description Document (12 pages)

Explanation of the GALLANTWAVE that decrypts VPN Traffic within LONGHAUL
GALLANTWAVE (5 slides)

Intro to the VPN Exploitation Process mentioning the protocols attacked (PPTP, IPSEC, SSL, SSH)
Intro to the VPN Exploitation Process (43 slides)

Analytic Challenges from Active-Passive Integration when NSA attacks IPSEC VPNs
Analytic Challenges from Active-Passive Integration (14 slides)

Overview of the capabilities of the VALIANTSURF program
VALIANTSURF (3 slides)

MALIBU Architecture Overview to exploit VPN Communication
MALIBU and TURMOIL/VALIANTSURF (4 slides)

POISENNUT Virtual Private Network Attack Orchestrator (VAO) Explanation of the POISENNUT Product and its role when attacking VPN
WikiInfo: POISONNUT (2 pages)                                 WikiInfo: POISONNUT Product (2 pages)

NSA Presentation on the development of Attacks on VPN
VPN SigDev Basics: OTTERCREEK (30 slides)

NSA Presentation on the Analysis and Contextualisation of data from VPN - FLYING PIG AND HUSH PUPPY
GCHQ: An Introduction to FLYING PIG and HUSH PUPPY (19 slides)

Description of existing projects on VPN decryption
SPIN 15 VPN Story (4 pages)

Explanation of the Transform Engine Emulator when attacking VPN Explanation of the TURMOIL GALLANTWAVE Program and its role when attacking VPN
WikiInfo: VPN Transform Engine Emulator (2 pages)    WikiInfo: TURMOIL GALLANTWAVE (2 pages)

Processing of data from exploited VPN in the TURMOIL program
TURMOIL VPN Processing (20 slides)

Decryption of VPN Connections within the VALIANTSURF program
WikiInfo: VALIANTSURF (13 pages)

Description on the processing of VPN data packets within the TURMOIL program
TURMOIL: IPSEC VPN Sessionization (18 pages)

Explanation on the SPIN9 program on end-to-end attacks on VPN
Fielded Capability: End-to-End VPN SPIN 9 Design Review (47 slides)

 

 

ATTACKS ON SSL/TLS:

NSA Experiment for massive SSL/TLS Decryption
NSA/GCHQ Experiment testing SSL/TLS Decryption - ISLANDTRANSPORT / LONGHAUL (8 pages)

Canadian Document from CES on TLS Trends
CSEC: TLS Trends - A rounddtable discussion on current usage and future directions (15 slides)

Details on how NSA uses the SCARLETFEVER program to attack Scure Sockets Layer (SSL)/Transport Layer Scurity (TLS)
Secure Sockets Layer (SSL) / Transport Layer Security (TLS) (42 slides)

Analysis from SSL/TLS Connections through GCHQ in the flying pig database
TLS Trends at GCHQ (11 slides)

 

Analysis:  Matthew Green: On the new Snowden documents

 

RELATED LEAKS:  How NSA Has Compromised Internet Encryption
                              How NSA Targets Tor

 

PRISM; BULLRUN; LONGHAUL; TURMOIL; BLUESNORT; GALLANTWAVE; TUTELAGE; XKEYSCORE; SCARLETFEVER; SAMESHEET; SPEERMINT; TUNDRA; DISCOROUTE; BLACKPEARL; TOYGRIPPE; DARKSUNRISE; HOMING TROLL; NEWTONS CRADLE; EPIC FAIL; TRIBAL CARNEM; QUICK ANT; GALLANTWAVE; BLEAKINQUIRY; VULCANDEATHGRIP; VULCANMINDMELD; CORALREEF; MAILORDER; SCISSORS; PINWALE; FOURSCORE; CADENCE; TURTLEPOWER; AGILITY; HAMMERMILL; BRAVENICKEL; HAMMERCHANT; HAMMERSTONE; HAMMERSTEIN; VALIANTSURF; POINSONNUT; MALIBU; OTTERCREEK; TREASUREMAP; TUNINGFORK; RENOIR; FLYING PIG; HUSH PUPPY; TURBULENCE; PRESSUREWAVE; TUBE; EXOPUMP; KEYCARD; ISLANDTRANSPORT; OLYMPIA; BROAD OAK


Intelligence Data Gathered Prior to Mumbai Attacks

December 21, 2014

In 2008 Mumbai Killings, Piles of Spy Data, but an Uncompleted Puzzle (New York Times)

In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted Puzzle (ProPublica)

Web of Terror (PBS Frontline)

NSA Mumbai terror planning document - Snowden
Analysis of intelligence gathered from Mumbai attack plotter Zarrar Shah’s online activities (Source)

Operation Socialist: Belgacom Hack

December 13, 2014

The Inside Story Of How British Spies Hacked Belgium’s Largest Telco (The Intercept)

Read how the British secret service GCHQ attacked Belgacom (NRC Handelsblad)

British secret service spied for years on Belgacom customers (De Standaard)

DOCUMENTS:

GCHQ – MAKING NETWORK SENSE OF THE ENCRYPTION PROBLEM (2011)
GCHQ – Making Network Sense Of The Encryption Problem - 2011 (11 slides)

GCHQ – MOBILE NETWORKS IN MY NOC WORLD
GCHQ – Mobile Networks In My NOC World - 2011 (22 slides)

GCHQ – AUTOMATED NOC DETECTION
GCHQ – Automated NOC Detection - 2011 (25 slides)

GCHQ – STARGATE CNE REQUIREMENTS
GCHQ – STARGATE CNE Requirements (2 pages)

GCHQ NAC documents
GCHQ NAC Reviews:
Hopscotch
HOPSCOTCH (1 excerpt)

GCHQ Belgacom Connections
GCHQ Belgacom Connections (1 slide)

 

VIEW RELATED LEAKS:
Related stories about the Regin malware found on Belgacom servers:

 

OPERATION SOCIALIST; NOCTURNAL SURGE; PENTAHO; HACIENDA; MUTANT BROTH; QUANTUM INSERT; LEGSPIN; HOPSCOTCH


Edward Snowden quote on Belgacom - A BREATHTAKING EXAMPLE OF THE STATE-SPONSORED HACKING PROBLEM

Edward Snowden on the Belgacom hack (Source)

AURORAGOLD: NSA Hacking Cellphone Networks Worldwide

December 4, 2014

Operation AURORAGOLD: How The NSA Hacks Cellphone Networks Worldwide

DOCUMENTS:

AURORAGOLD  Project Overview
AURORAGOLD Project Overview - 2011  (4 slides)

NSA - Auroragold-working-group
AURORAGOLD Working Group - 2012  (26 slides)

IR 21 - technology waning mechanism  - NSA slides
IR.21 - A Technology Warning Mechanism  (19 slides)

AURORAGOLD – Target Technology Trends
AURORAGOLD – Target Technology Trends Center support to WPMO - 2011  (6 slides)

AURORAGOLD Working Aid
AURORAGOLD Working Aid - 2012  (4 pages)

  • NSA First-Ever Collect of High-Interest 4G Cellular Signal  (1 page)
  • GCHQ WOLFRAMITE Encryption Attack  (1 page)
  • GCHQ OPULANT PUP Encryption Attack  (1 page)
  • NSA/GCHQ/CSEC Network Tradecraft Advancement Team  (1 page)

 

AURORAGOLD; RAINFALL; OPULENT PUP; WOLFRAMITE

British Telco Cable & Wireless Worked With GCHQ

November 25, 2014

Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts

DOCUMENTS:

NSA cable access documents - MTI Access Project Weekly Status Rpt - WINDSTOP
  • SSO Briefing slide (25 Apr 2013): WINDSTOP System Highlights (1 slide)
  • MTI Access Project Weekly Status Rpt: 27 June 08 (1 page)
  • MTI Access Project Weekly Status Rpt: 28 Nov 08 (1 page)
  • MTI Access Project Weekly Status Rpt: 6 Feb 09 (1 page)

NSA cable access documents - Endpoint, Flag EA, INCENSER - Vodaphone
  • CNE EndPoint Project Load - Notes Page (1 page)
  • Cable Master List: Flag EA (Reliance Globalcom / GERONTIC) (1 page)
  • PTC Glossary from GCWiki: INCENSER (1 page)

2009 Cable Master List:

NSA 2009 cable master list - Access Breakdown, Data, No Current Access, Partner Cables NSA 2009 cable master list - Regions, Where we are, Where we want to be

 

Related:   UK spy base GCHQ tapped Irish internet cables
                Snowden documents show Malta’s internet links tapped by UK GCHQ

Analysis:  INCENSER, or how NSA and GCHQ are tapping internet cables
                 Submarine Cable Taps Map

GCHQ NSA cable taps map
Interactive map showing which submarine cables are tapped and where, based on Snowden documents

 

November 20, 2014

Spy cable revealed: How telecoms firm worked with GCHQ - Channel 4 video

New Snowden documents show how Vodafone aided spying mission - Süddeutsche Zeitung

Vodafone - the long arm of British intelligence? - WDR video

The long arm of the secret service? - NDR

 

VIEW RELATED LEAK: GCHQ: TEMPORA Telecom Partners (BT, Verizon Business, Vodafone Cable, Global Crossing, Level 3, Viatel, Interoute)

 

GERONTIC; NIGELLA; WINDSTOP; INCENSER; MUSCULAR; TRANSIENT THURIBLE; GRASP; DRUDGE; FAINT; VISAGE; BULLROARER; REMEDY; PFENNING ALPHA


CITIZENFOUR Revelations

October 10, 2014

In addition to the documents released below under NSA Core Secrets, the following screenshots from the CITIZENFOUR movie contain new revelations:

NSA TUMULT slides
TUMULT slides from screenshots of CITIZENFOUR (View larger) - source

JCE-UK-legality-slides
Screenshots from a 24-slide Powerpoint presentation related to JCE UK Legality (View larger) - source

 



CITIZENFOUR official website

 

TUMULT

NSA Core Secrets: ECI Programs Including Undercover Agents in China, Germany, and South Korea

October 10, 2014

Core Secrets: NSA Saboteurs in China and Germany

DOCUMENTS:

NSA ECI list

  • Briefing: National Initiative Protection Program - Sentry Eagle (13 pages)
  • NSA Target Exploitation (TAREX) Classification Guide (7 pages)
  • Exceptionally Controlled Information (ECI) Listing (6 pages)
  • ECI WHIPGENIE Classification Guide (7 pages)
  • ECI Pawleys Classification Guide (4 pages)

 

NSA ECI documents
  • ECI Compartments - January 2013 (4 pages)
  • CNO Core Secrets Slide Slices (10 pages)
  • CNO Core Secrets Security Structure (3 pages)
  • Computer Network Exploitation (CNE)Classification Guide (8 pages)
  • CNO Core Secrets (7 pages)

 

Analysis:  NSA's ECI Compartments

 

ABEYANT; AMBULANT; APERIODIC; AUNTIE; BLACKANT; BLACKCLOUD; BLACKHOLE; BLACKJACK; BLACKTIE; BLACKVULTURE; BLACKWIDOW; BOATMEN; BOXWOOD; BULLET; CELESTIALGLOBE; CHIEFDOM; CHILLY; CLERIC; CLICKUMBER; CONDOR; CONQUERER; CRIMSONREGENT; CRIMSTONSTEAL; CRUMPET; DECKSTOP; DEVILFISH; DICHOTOMY; DILEMMA; DIXIESPRING; DOMINATE; ENSIGN; ESCAPEE; EVADEYIELD; FALCON; FASTIDIOUS; FIRESCREEN; FIRSTDOWN; FISSURESALUTE; FLEXURE; FLYLEAF; FORBIDDEN; FORBORNE; FOXHEAT; FREELUNCH; FROTHYTWOPACK; FURTIVERELIANCE; GOLDENCALF; GRAYSCALE; HAWK; HELLFIRE; HISTORY; HYSSOP; INVEIGH; INVENT; KESSELRUN; LIGHTNINGTHIEF; LITTLECROWN; LONGSERPANT; LYSERGIC; MAGICSTROKE; MERCURYTAO; MISCHIEF; MUSICBOX; NITEHAWK; OCELLUS; OPALESCE; OWL; PAINTEDEAGLE; PAWLEYS; PAWNSHOP; PENDLETON; PENDRAGON; PERKYAUTUMN; PHENYLDOUR; PICARESQUE; PICAROON; PIEDMONT; PITCHFORD; PLACEBO; POMPANO; PRESSURETWIN; RAGTIME; REDHARVEST; REEFPOINT; REFRACTOR; REVELRY; RIVERROAD; RUBIOUS; SAILWINDS; SCABBARD; SILVERCLOUD; SINKGOAL; STAIRWELL; STARCHART; STATEROOM; STEREO; STRESSFUL; SUITESWIVEL; TAXONOMY; TRICKSHOT; VISITOR; WASHBURN; WAXOFF; WHIPGENIE


GCSB: New Zealand's Mass Surveillance Project

September 15, 2014

New Zealand Launched Mass Surveillance Project While Publicly Denying It

SNOWDEN: New Zealand’s Prime Minister Isn't Telling the Truth About Mass Surveillance


DOCUMENTS:

GCSB - IRONSAND Project Speargun, New Zealand NSA meeting agenda New Zealand: Partner cable access program achieves Phase One Precis for a 2013 meeting between NSA and New Zealand
  • IRONSAND Mission slide about Project SPEARGUN (1 slide)
  • NSA slide - New Zealand: Partner cable access program achieves Phase One (1 slide)
  • Agenda for a 2013 meeting between the director of New Zealand Intelligence Coordination Group and NSA Director Keith Alexander (2 pages)

New Zealand GCSB SPEARGUN status
Excerpt from NSA planning document

 

NEW ZEALAND PRIME MINISTER JOHN KEY'S RESPONSE:   Key Releases GCSB Documents

 

SPEARGUN; IRONSAND

TREASUREMAP: Secret Access to German Satellite Companies

September 14, 2014

Treasure Map: The NSA Breach of Telekom and Other German Firms (Der Spiegel)

The NSA and GCHQ Campaign Against German Satellite Companies (The Intercept)


DOCUMENTS:

NSA TREASUREMAP slides
NSA TREASUREMAP presentation (38 slides)

 

GCHQ NAC BUDE Partnership - Satellite Teleport Knowledge report: Stellar PCS
Satellite Teleport Knowledge report: Stellar PCS (26 pages)

 

NSA TREASUREMAP announcement in SIDToday
SIDToday - TREASUREMAP Announces a New Release (4 pages)

 

Filmmakers Katy Scoggin and Laura Poitras follow reporter Marcel Rosenbach as he informs the staff of a German communications firm that they have been targeted for surveillance by British spies.

 

TREASUREMAP; PACKAGEDGOODS; BLACKPEARL; LEAKYFAUCET; HYDROCASTLE; MASTERSHAKE; S-TRICKLER; TOYGRIPPE; DISCOROUTE; VITALAIR2; IPGEOTRAP; JOLLYROGER; TUTELAGE; BYZANTINE HADES


U.S. Government's Plans to Spy For American Corporations

September 5, 2014

The U.S. Government's Secret Plans To Spy For American Corporations

DOCUMENT:  Quadrennial Intelligence Review Final Report, 2009

QUADRENNIAL INTELLIGENCE REVIEW FINAL REPORT, 2009
Quadrennial Intelligence Review Final Report - 2009 (32 pages)

Turkey: NSA's Partner and Target

August 31, 2014

How the NSA Helped Turkey Kill Kurdish Rebels (The Intercept)

A Two-Faced Friendship: Turkey Is 'Partner and Target' for the NSA (Der Spiegel)

DOCUMENTS:

NSA documents showing Turkey is a target
  • SIDToday: Collaboration in Overdrive: A CNE Success (2 pages)
  • Turkey and the PKK (3 pages)
  • SIDToday: NCRs with Foreign Relations Missions Become 'SUSLAs' (2 pages)
  • SINIO Seminar: Turkish Presidential and Parliamentary Elections (2 pages)
  • Information Paper: NSA Intelligence Relationship with Turkey (4 pages)

NSA documents on Turkey spying and targeting
  • NSAs Oldest Third Party SIGINT Partnership (2 pages)
  • May 2013 Meeting Agenda: Turkish Signal Intelligence Chief (2 pages)
  • SINIO Strategic Intelligence Issue Seminars- Turkey (2 pages)
  • SINIO Seminar: Turkey and the Kurds (1 page)

GCHQ Turkey spying documents
  • GCHQ Surveillance Summary  (Jordan-Belgium Gateways) (6 pages)
  • GCHQ Surveillance Summary  (Iraq-UK Gateways) (2 pages)
  • GCHQ Targeting: Turkey at the G20 Pre-Meeting in London 2009 (2 pages)
  • GCHQ Project: Turkey Energy Company Development (1 page)
  • GCHQ Document: Kurdistan Regional Government (3 pages)


ICREACH: NSA's Secret Surveillance Search Engine

August 25, 2014

The Surveillance Engine: How the NSA Built Its Own Secret Google

DOCUMENTS:

NSA ICREACH slides
ICREACH: Sharing Communications Metadata Across the U.S. Intelligence Community (36 slides)

 

NSA ICREACH memos and documents
  • CIA Colleagues Enthusiastically Welcome NSA Training (1 page)
  • CRISSCROSS/PROTON Point Paper (4 pages)
  • Decision Memorandum for the DNI on ICREACH (3 pages)
  • Metadata Sharing Memorandum (4 pages)
  • Sharing SIGINT metadata on ICREACH (2 pages)

 

NSA ICREACH memos and documents

 

ICREACH; CRISSCROSS; PROTON

HACIENDA Port Scanning Program Used by Five-Eyes

August 15, 2014

NSA/GCHQ: The HACIENDA Program for Internet Colonization


DOCUMENTS:  (View all slides)

GCHQ hacienda port scanning slides
GCHQ presentation describing the HACIENDA system (6 slides)

NSA hacking process slides
NSA SIGDEV presentation describing their hacking process (8 slides)

CSEC slides showing the LANDMARK tool - Olympia, ORBs, Hacienda
CSEC slides describing the LANDMARK tool (6 slides)

GCHQ mugshot systems - ORBs, Hacienda
GCHQ slides describing their MUGSHOT tool for compromising Operational Relay Boxes (ORBs) (4 slides)

 

AnalysisThe Landmark file: Inside Canadian cyber-security agency’s 'target the world' strategy

RELATED LEAK:  GCHQ Controls the Internet Using JTRIG Tools

 

HACIENDA, MAILORDER, LANDMARK, MUGSHOT, OLYMPIA, ORB

NSA Bot Can Wage Cyberwar Autonomously

August 13, 2014

Meet MonsterMind, the NSA Bot That Could Wage Cyberwar Autonomously


Related:  Wired Interview of Edward Snowden

 

MONSTERMIND

NSA Accidentally Caused Syria's 2012 Internet Blackout

August 13, 2014

Edward Snowden: The Untold Story - Chapter 5


Related:  Snowden: NSA accidentally caused Syria's internet blackout in 2012



National Counterterrorism Center Reports (NCTC)

August 5, 2014

Barack Obama’s Secret Terrorist-Tracking System, by the Numbers

NCTC DTI TIDE Strategic Accomplishments 2013
Directorate of Terrorist Identities (DTI) Strategic Accomplishments 2013 (12 pages)

 

July 23, 2014

The Secret Government Rulebook For Labeling You a Terrorist

terrorist watchlist guidance - March 2013
National Counterterrorism Center's March 2013 "Watchlisting Guidance (166 pages)

U.S. Support for Israel: Cash, Weapons and Surveillance

August 4, 2014

Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack


DOCUMENTS:


NSA Intelligence Relationship with Israel (3 pages)

 


Israel-US 1999 Agreement (16 pages)

 


Receipts for payments in cash to Israel Israeli receipt for NSA Israeli receipt for NSA - Snowden

 


Excerpt from July 2008 GCHQ document

 

gchq Israel - Snowden document
Excerpt from GCHQ planning document from 2008

NSA's Partnership with Saudi Ministry of Interior

July 25, 2014

The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police

DOCUMENT:  Saudi Arabia Information Paper


NSA Information Paper: NSA Intelligence Relationship with Saudi Arabia (4 pages)

SIGINT Authority Decision Tree - Executive Order 12333

July 23, 2014

Privacy watchdog’s next target: the least-known but biggest aspect of NSA surveillance

EO 12333 flowchart - SIGINT authority decision tree
NSA internal training materials graphic showing the various authorities for SIGINT collection

 

Related:  New Documents Shed Light on One of the NSA's Most Powerful Tools



How GCHQ Controls the Internet Using JTRIG Tools

July 14, 2014

Hacking Online Polls and Other Ways British Spies Seek to Control the Internet

DOCUMENT:  JTRIG Tools and Techniques

JTRIG Tools and Techniques - GCHQ online wiki
JTRIG Tools and Techniques (8 pages)  Text-searchable transcription

 

RELATED LEAKS:  Intelligence Agencies Using Social Media for Propaganda
                              GCHQ Online Covert Operations
                              GCHQ JTRIG Unit Uses "Dirty Tricks"
                              GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger

 



NSA and FBI Targeted Muslim-American Leaders

July 9, 2014

Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On

DOCUMENTS:

FISA Recap spreadsheet - NSA, FBI
A selection from the FISA Recap spreadsheet showing email addresses listed as monitored   (view larger)

NSA target Faisal Gill
Entries from the FISA Recap spreadsheet related to Faisal Gill

NSA target Asim Ghafoor
Entries from the FISA Recap spreadsheet related to Asim Ghafoor

NSA target Agha Saeed
Entries from the FISA Recap spreadsheet related to Agha Saeed

NSA target Nihad Awad
Entries from the FISA Recap spreadsheet related to Nihad Awad

NSA target Hooshang Amirahmadi
Entries from the FISA Recap spreadsheet related to Hooshang Amirahmadi

NSA Mohammed Raghead memo
Instructional document on how to properly format internal memos to justify FISA surveillance

FISA data flow
NSA document showing that Case Notation codes beginning with the prefix “XX.SQF” are assigned to all “FISA accounts” as a unique identifier


Related:  Civil Rights Groups Ask Admin to Explain NSA Surveillance of American Muslims
              White House: racial slurs in NSA intelligence material 'unacceptable'

Ordinary Web Users Are Caught in NSA's Surveillance Net

July 5, 2014

In NSA-intercepted data, those not targeted far outnumber the foreigners who are

A breakdown of the cache of NSA-intercepted communications

DOCUMENT:  Target package prepared by the NSA - Muhammad Tahir Shahzad

Follow-up story:  How 160,000 intercepted communications led to our latest NSA story

Target package prepared by the NSA prior to the capture of Muhammad Tahir Shahzad in January 2011

NSA intercepted image of women - FISA - Australia taliban
Composite image of two of the many private photos NSA collected from online accounts in the U.S.

XKeyscore Source Code Targets Tor and TAILS Users

July 3, 2014

NSA targets the privacy-conscious

Branded by the NSA as an extremist (Original German version)

SOURCE CODE:  XKeyscore rules


XKeyscore Rules
 XKeyscore source code

 

VIEW RELATED LEAK:  How NSA Targets Tor

More about XKeyscore

 

XKEYSCORE

Danish Partnership with NSA

June 19, 2014

Snowden documents reveal Danish partnership with NSA (Information.dk)

More countries involved in the NSA's global mass surveillance (Information.dk)

NSA 3rd party partners tap Internet backbone in global surveillance program (Information.dk)

How Secret Partners Expand NSA’s Surveillance Dragnet (The Intercept)


DOCUMENTS:  

Keith Alexander meeting notes with Denmark DDIS

Keith Alexander's speech notes for Danish DDIS (DENUSA conference)



Black Budget - foreign partner access

Excerpt from Black Budget: Foreign Partner Access



Rampart-A project overview slides

Rampart-A Project Overview October 2010 (23 slides)



Special Source Operations slides - Rampart-A

Special Source Operations slides (6 of 8 slides are new)



SSO slides - Rampart-A tasking

Special Source Operations slides (3 additional RAMPART-A slides)



Related Analysis: The German operation Eikonal as part of NSA's RAMPART-A program

View 2013 leak containing related SSO Slides: NSA Taps Into Google and Yahoo Data Centers



RAMPART-A; SMOKYSINK; AZUREPHOENIX; SPINNERET; TRANQUIL; MOONLIGHTPATH; FIREBIRD; FLASHMARK; FALCONSTRIKE; DULCIMER; REDHARVEST; CONDORSPEAK


NSA in Germany

June 18, 2014

New NSA Revelations: Inside Snowden's Germany File (Der Spiegel)

Spying Together: Germany's Deep Cooperation with the NSA (Der Spiegel)

The NSA in Germany: Snowden's Documents Available for Download (Der Spiegel)


Related stories:

How the NSA may be using games to encourage digital snooping (Washington Post)

The NSA's big problem, explained by the NSA (The Week)

Tell a lie, remove the gear: How the NSA covers up when cable taps are found (Ars Technica)


BND, BfV, and BSI Documents:

Germany BND Snowden documents
Snowden slides showing structure of the German BND
Snowden documents - BND, BSI, BfV, NSA

NSA/BND Joint SIGINT Activity (JSA):

Snowden documents - BND, NSA Joint Sigint Activity JSA documents

European Security Center(ESC), ESOC, and European Cryptologic Center(ECC):

European Security Center(ESC), ESOC, and European Cryptologic Center(ECC) documents

European Technical Center (ETC):

European Technical Center Snowden documents

NSA workers in Germany:


NSA guidelines and locations:

classification guidelines of NSA SIGINT details, NSA sites in Germany
Worldwide locations of the Cryptologic Services Groups and FORNSAT satellite
NSA/CIA unit Special Collection Service - Pacific SIGDEV conference slides

BoundlessInformant Documents:  (View all released to date)

NSA maps
Boundless informant 3rd party and foreign partners maps
Boundless Informant US and UK collection maps

PRISM slides:  (View all PRISM slides released to date)

PRISM slides - faa 702 utt dni - US-984xn per opi

XKeyscore-related documents: (View all XKeyscore slides released to date)

Xkeyscore documents - training ecc Dagger Complex - BfV

TEMPORA-related documents:

Tempora documents

Other miscellaneous documents:

Analytics for Europe and Africa - terrorism, xkeyscore fingeprints
NSA content extraction analytics slides - Center for Content Extraction
NSA searching for terror suspects, NYMROD database
NSA NYMROD mission slides - Alfred E. Neuman
NSA wharpdrive discovered
list of NSA German SIGADS

View full set of above documents in single PDF (source: Cryptome)


Follow-up:   German investigation of the cooperation between NSA and BND

 

XKEYSCORE; ACRIDMINI; LUTEUSICARUS; HEADMOVIES; APERTURESCIENCE; CROSSEYEDSLOTH; KOALAPUNCH; BALLOONKNOT; MAGNUMOPUS; WAXTITAN; WILDCOUGAR; MURPHYSLAW; DARKFIRE; CHOCOLATESHIP; SCREAMINGHARPY; WILDCHOCOBO; WHISTLINGDIXIE; CHAOSOVERLORD; SHAREDTAFFY; POTBED; DARKTHUNDER; JEEPFLEA; SHARPSHADOW; HIGHCASTLE; TROJAN CLASSIC XXI; CADENCE; PINWALE, BLACKPEARL; ROADBED; GODLIKELESION; BOTANICREALTY; LADYLOVE; UNCANNY; SALTYDOGS; TROPICPUMA; GRANDMASTER; WEALTHYCLUSTER; DISHFIRE; JUGGERNAUT; TURMOIL; BLACKNIGHT; CYBERTRANS; PAINTBALL; SYNAPSE; JOURNEYMAN; GOLDENRETRIEVER; SOCIOPATH; TEMPORA; GENESIS; NYMROD; ANCHORY; INTERQUAKE; PANOPLY; MIRROR; DARKQUEST; BIRDWATCHER; WHARPDRIVE


GCHQ:  Middle East Spy Hub in Oman

June 3, 2014

REVEALED: GCHQ's BEYOND TOP SECRET Middle Eastern INTERNET SPY BASE


VIEW RELATED LEAK:  GCHQ: TEMPORA Telecom Partners (BT, Verizon Business, Vodafone Cable, Global Crossing, Level 3, Viatel, Interoute)

 

CIRCUIT; TIMPANI; GUITAR; CLARINET; REMEDY; GERONTIC

NSA Collects Web Images for Facial Recognition Programs

May 31, 2014

N.S.A. Collecting Millions of Faces From Web Images

DOCUMENT:  Identity Intelligence: Image is Everything

NSA facial recognition slides - Identity Intelligence
Identity Intelligence: Image Is Everything (4 slides)

View the Identity Intelligence slide #4 full-size

 

TUNDRAFREEZE; WELLSPRING; PISCES; PINWALE

Official statement from the government of the Bahamas - NSA surveillance is a moral failing

The Government of The Bahamas in response to the NSA spying revelation (Source)

No Place to Hide by Glenn Greenwald (official website)

May 13, 2014

Download the complete set of documents contained in the book


New Boundless Informant documents:   (click each to enlarge)
  • Boundless Informant - Poland

    Boundless Informant - Poland

  • Boundless Informant - Fairview

    Boundless Informant - FAIRVIEW

  • Boundless Informant - SSO

    Boundless Informant - SSO


View all Boundless Informant documents released to date

 

New XKEYSCORE documents:   (click each to enlarge)
  • XKEYSCORE plugins

     

  • XKEYSCORE email address queries

     

  • XKEYSCORE why interested in http

     

  • XKEYSCORE activity search

     

  • XKEYSCORE http search example

     

  • XKEYSCORE user activity query

     

  • XKEYSCORE osn intelligence target

     


View all Xkeyscore documents released to date

 

New PRISM slides and related documents:   (click each to enlarge)
  • PRISM slide - unique selectors

     

  • PRISM slide - week in the life of PRISM

     

  • PRISM slide - week in the life of PRISM

    NSA message board - 6 PRISM msgs


View all PRISM documents released to date

 

SSO slides and documents:   (click each to enlarge)
  • SSO - Corporate Partner Access

     

  • SSO - Relationships and authorities

     

  • SSO - unique aspects

     

  • SSO - US-990 FAIRVIEW

     

  • SSO - FAIRVIEW; ORANGECRUSH; SILVERZEPHYR

    FAIRVIEW; ORANGECRUSH; SILVERZEPHYR

  • SSO - STORMBREW

     

  • SSO - BLARNEY

     

  • SSO - BLARNEY - US-984

     

  • SSO - BLARNEY - Operational highlight

     

  • SSO - BLARNEY Facebook collection

    BLARNEY expanded Facebook collection

 

Collect it all:   (click each to enlarge)
  • NSA slide - Collect it all, sniff it all, know it all, process it all, exploit it all, partner it all

     

  • NSA slide - why TARMAC

     

  • WORDGOPHER

    One step closer to collecting it all

  • GCHQ Guiding Light

     

  • SHELLTRUMPET - one trillion metadata records

    SHELLTRUMPET - one trillion metadata records

 

Spying:   (click each to enlarge)
  • NSA close access sigads list

    Close access SIGADS - Sept 2010

  • Australia DSD letter to NSA about spying on citizens

    2011 Australia DSD letter to NSA requesting data

  • NSA relationship with Israel - spying

    Relationship with Israel

  • NSA ISA economic and trade espionage

    2006 NSA ISI memo re NSA's economic and trade espionage

  • NSA interdict routers for TAO implants

    NSA intercepts routers for TAO implants

  • NSA memo about problems with intercepted Cisco routers

    April 2013 memo about Cisco

  • NSA - Aeroflot, SWIFT, Petrobras, Gazprom, Warid Telecom, French MFA

     

 

Partners:   (click each to enlarge)
  • NSA Tier A and Tier B countries - partnerships

     

  • NSA sigint partners - second parties, third parties, coalitions, muli-lats

     

  • NSA funding of partners

     

  • NSA strategic partnerships with Quest, EDS, HP, ATT, Microsoft, Intel, Verizon, Qualcomm, Oracle, IBM, Cisco, Motorola

     

 

GCHQ Global Telecommunications Exploitation (GTE) presentation to 2011 Five Eyes conference: (click each to enlarge)
  • GCHQ GTE slide - exploiting Facebook

     

  • GCHQ GTE slide - why OSNs

     

  • GCHQ GTE slide - passive environment

     

  • GCHQ GTE slide - Facebook's use of Akamai CDN

     

  • GCHQ GTE slide - exploting Facebook CDN

     

  • GCHQ GTE slide - obtaining profile and album images

     

  • GCHQ GTE slide - THIEVING MAGPIE

     

  • GCHQ GTE slide - airlines onboard GSM services

     

  • GCHQ GTE slide - SOUTHWINDS

     

  • GCHQ GTE slide - Blackberry phones in flight

     

  • GCHQ GTE slide - airplane travel tracking and surveillance

     

 

Other new documents published:   (click each to enlarge)
  • NSA slide - The threat today

    From an NSA overview briefing

  • NSA customers list

     

  • Communications metadata fields in ICREACH

    ICREACH slide - May 2007

  • NSA chart showing yearly growth of metadata collected and shared

    ICREACH slide - May 2007

  • NSA PROTON call events

    ICREACH slide - May 2007

  • NSA collection challenge - too much data

    From Five Eyes SIGDEV conference

  • NSA analytic driver

    2012 Five Eyes presentation

  • NSA HOMING PIEGEON FASTSCOPE

    2012 Five Eyes presentation

  • NSA ego

     

  • NSA threat

     

 

Analysis:  NSA's largest cable tapping program: DANCINGOASIS

 

Related Stories:

Snowden docs: GCSB links to US spying programmes - New Zealand Herald

Canada actively spies for NSA, Glenn Greenwald claims in new book - Toronto Star

Australia asked Americans for more help to spy on Australian citizens - The Guardian

NSA Docs Detail Efforts To Collect Data From Microsoft’s Skype, SkyDrive, Outlook - TechCrunch

Microsoft colluded with FBI to bypass Outlook encryption - The Daily Dot

Book Reveals Wider Net of U.S. Spying on Envoys - New York Times

NSA’s sweeping efforts to ‘Know it All’ - The Washington Post

From M.L. King to Anonymous, the state targets dissenters not just "bad guys" - The Guardian

How the NSA tampers with US-made internet routers - The Guardian

NSA and GCHQ seek ways of monitoring airplane passenger communication - NY Daily News

 

ASPHALT; ARTIFICE; BLARNEY; BOUNDLESSINFORMANT; DANCINGOASIS; FAIRVIEW; HOMINGPIGEON; ICREACH; ORANGECRUSH; PRISM; SHELLTRUMPET; SILVERZEPHYR; SOUTHWINDS; STORMBREW; TARMAC; THIEVINGMAGPIE; WOLFPOINT; WORDGOPHER; XKEYSCORE


NSA Targets Revealed: ICTP, Honduran Resort, Telecoms & More

May 8, 2014

Revelations about NSA's underwater cable spying

Related:  NSA spied on research center in Trieste but the silence of the government continues



GCHQ Sought Unsupervised Access to NSA Data

April 30, 2014

British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools

DOCUMENT:  Lobban NSA Visit Précis

DOCUMENT:  GHOSTMACHINE: Identifier Lead Triage with ECHOBASE

DOCUMENT:  PRISM Olympic Option

NSA memo about GCHQ director Sir Iain Lobban's visit with NSA Director Keith Alexander
NSA briefing memo about GCHQ Director Sir Iain Lobban's visit to NSA on April 30, 2013 (4 pages)

 

NSA ECHOBASE slides showing Identifier Scoreboard, SIGINT Analytics, GHOSTMACHINE - Data sharing with GCHQ - Identifier Lead Triage with ECHOBASE
NSA SIGDEV slides: Identifier Lead Triage with ECHOBASE (14 slides)

Analysis:  The Triage Document

More about GHOSTMACHINE:  GHOSTMACHINE: The NSA's cloud analytics platform


PRISM Operations Highlight - Olympic Support for GCHQ
PRISM Operations Highlight - Olympics Support - GCHQ Using PRISM Access (1 slide)

 

ECHOBASE; GHOSTMACHINE; IDENTIFIER SCOREBOARD; SIGINT ANALYTICS; WAVELEGAL


Norway's NIS Acquires Supercomputer for Surveillance Data

April 26, 2014

NIS acquires supercomputer


Excerpts from NSA Information Paper: NSA Intelligence Relationship with Norway (4/17/2013)

 

VIEW RELATED LEAK:  NIS: Norway Spying for NSA

 

STEELWINTER; WINDSORBLUE

Snowden quote on Pulitzers

Edward Snowden in his statement on The Guardian and The Washington Post winning the Pulitzer Prize for public service (Source)

Keith Alexander quote on Pulitzers

General Keith Alexander in his interview with The Australian Financial Review on The Guardian and The Washington Post winning the Pulitzer Prize for public service (Source)

Intelligence Agencies Using Social Media for Propaganda

April 4, 2014

The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket

DOCUMENT:  Full-Spectrum Cyber Effects

DOCUMENT:  2009 SigDev Conference: "Best Yet and Continuing to Improve'

GCHQ Full Spectrum Cyber Effect slides - full set
GCHQ Full-Spectrum Cyber Effects (previously released here and here; Slides #14, #16, #19 are new)

NSA 2009 SIGDEV conference
2009 SigDev Conference: "Best Yet and Continuing to Improve' (2 pages)

 

RELATED LEAKS:  GCHQ Controls the Internet Using JTRIG Tools
                              GCHQ Online Covert Operations
                              GCHQ JTRIG Unit Uses "Dirty Tricks"
                              GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger

NSA/GCHQ Targeted World Leaders; Private German Companies

March 29, 2014

GCHQ and NSA Targeted Private German Companies  (Der Spiegel)

Der Spiegel: NSA Put Merkel on List of 122 Targeted Leaders  (The Intercept)

NSA Machine vs Manual Chief-of-State Citations - world leaders spying list NSA SSO FISA court orders for monitoring Germany, Jordan, and Morocco - 2013
Leaders listed in NSA Target Knowledge Base;   SSO report citing FISA authorization to monitor Germany

 

RELATED:  Additional names of world leaders listed in the NSA Target Knowledge Base

 

NYMROD

NSA Targets Chinese Government and Networking Firm Huawei

March 23, 2014

Additional slides published in Der Spiegel magazine

NSA Social Network Analysis of Huawei CEO Ren Zhengfei and Chairwoman Sun Yafang - NSA slide showing Chinese Exfiltrate Sensitive Military Technology
Related slides appearing in the print edition of Der Spiegel magazine (Source)

 

March 22, 2014

N.S.A. Breached Chinese Servers Seen as Security Threat  (New York Times)

Targeting Huawei: NSA Spied on Chinese Government and Networking Firm  (Der Spiegel)

DOCUMENT:  Slides Describe Mission Involving Huawei

NSA SHOTGIANT slide about hacking Huawei servers in China and notes about the objectives of the SHOTGIANT program - CNE Huawei routers in China allowing SIGINT collection
NSA slide from 2010 about Huawei products and notes about the objectives of the SHOTGIANT program

 

Analysis:  We may have witnessed a NSA "Shotgiant" TAO-like action

RELATED:  ANT Products for Huawei:  HALLUXWATER;   HEADWATER  (Source)

 

SHOTGIANT

CSEC Attributes Email Spying Program to France

March 21, 2014

France suspected of cyber espionage (English translation)

When Canadians go hunting for "Babar" (English translation)

DOCUMENT:  SNOWGLOBE: From Discovery to Attribution

CSEC SNOWGLOBE
CSEC slide presentation from 2011 describing the SNOWGLOBE spyware (7 slides)

Note: The full set of the above slides was released in 2015

 

Analysis: Canadian SIGINT Summaries

RELATED STORIS:

 

SNOWGLOBE; BABAR

How NSA Hacks System Administrators

March 20, 2014

Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators

DOCUMENT:  I Hunt Sys Admins

NSA discussion board about hacking sys admins to access routers
Multiple posts published in 2012 on an internal NSA discussion board (View all 6 pages)

Orange (France Telecom) Shares Data With France's DGSE

March 20, 2014

Spying: How Orange and intelligence services cooperate  (English translation)



NSA Can Record All of a Foreign Country's Phone Calls

March 18, 2014

NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls

DOCUMENT:  NSA symbolizes data-collection program with wizard

DOCUMENT:  Description of data collection by NSA under MYSTIC

DOCUMENT:  Adding a country to MYSTIC efforts mentioned


MYSTIC slide;  Excerpt from a weekly briefing memo from NSA's Special Source Operations team

 

NSA MYSTIC description
Excerpt from the FY13 Congressional Budget Justification for the National Intelligence Program

 

MYSTIC; RETRO; SCALAWAG; DOUBLEARROW; NUCLEON

NSA Malware Plans

March 15, 2014 - Follow-up story responding to NSA's malware denial

Compare the NSA’s Facebook Malware Denial to its Own Secret Documents

NSA Public Affairs Office: Statement in Response to Press Allegations


NSA Facebook server impersonation using QUANTUMHAND and FOXACID
Excerpt from classified NSA document dated April 2011 explaining how NSA uses QUANTUMHAND to deploy its surveillance implants on target computers

 


Animation: How the NSA Secretly Masqueraded as Facebook to Hack Computers for Surveillance

 

 

March 12, 2014

How the NSA Plans to Infect ‘Millions’ of Computers with Malware

DOCUMENTS:


- Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail
- Five Eyes Hacking Large Routers

 


- NSA Technology Directorate Analysis of Converged Data
- Selector Types
- There Is More Than One Way to Quantum

 


NSA Phishing Tactics and Man in the Middle Attacks

 


Quantum Insert Diagrams (5 slides total)

 


The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics (11 slides total)

 


TURBINE and TURMOIL

 


VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN

 


Industrial-Scale Exploitation                             Thousands of Implants

 

NSA TURBINE command and control documents
Excerpts from NSA documents related to TURBINE (View larger)

 

Analysis:  Unraveling NSA's TURBULENCE Programs

 

TURBINE; UNITEDRAKE; CAPTIVATEDAUDIENCE; GUMFISH; FOGGYBOTTOM; GROK; SALVAGERABBIT; HAMMERCHANT; HAMMERSTEIN; WILLOWVIXEN; SECONDDATE; FOXACID; VALIDATOR; TURMOIL; TUTELAGE; INSENSER; QUANTUMTHEORY; XKEYSCORE; DEEPDIVE; DRAGGABLEKITTEN; QUANTUMINSERT; QUANTUMBOT; QUANTUMBISCUIT; QUANTUMDNS; QUANTUMHAND; QUANTUMPHANTOM; QUANTUMSKY; QUANTUMCOPPER; QUANTUMSMACKDOWN; QUANTUMMUSH; QUANTUMSPIM; QUANTUMSQUEEL; QUANTUMSQUIRREL; QUANTUMDEFENSE; ISLANDTRANSPORT; SURPLUSHANGER; STRAIGHTBIZARRE; DAREDEVIL; SMOKEYSINK; SARATOGA; TOYGRIPPE; POISON NUT; APEX; KEYCARD; PRESSUREWAVE; FASCIA; FASHIONCLEFT; METROTUBE; CORALREEF; CONVEYANCE; NUCLEON


NSA Third Party Relationships

March 13, 2014

Foreign Officials In the Dark About Their Own Spy Agencies’ Cooperation with NSA

DOCUMENT:  Third Party Relationships

NSA Third Party relationships
Internal NSA interview with a SIGINT official in NSA’s Foreign Affairs Directorate about third party relationships (View larger)

Dutch Intelligence Shares Somali Phone Intercepts with NSA

March 8, 2014

The secret role of the Dutch in the American war on terror

NSA success stories about Dutch MIVD intercepting Somali pirate phone data from the Rotterdam - NATO OCEANSHIELD
NSA Foreign Affairs Division (FAD) Success Stories (Source)

Yahoo quote on GCHQ webcam spying -  a whole new level of violation of our users' privacy

Yahoo's reaction to news about GCHQ's bulk webcam interception (Source)

GCHQ Collected Yahoo Webcam Images in Bulk

February 27, 2014

Yahoo webcam images from millions of users intercepted by GCHQ

GCHQ Optic Nerve document showing spying on Yahoo webcam chats
Excerpts from documents related to GCHQ OPTIC NERVE (View larger)

 

OPTIC NERVE

GCHQ: Online Covert Operations

February 24, 2014

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

DOCUMENT:  The Art of Deception: Training for Online Covert Operations

GCHQ slides - The Art of Deception: Training for Online Covert Operations
GCHQ: The Art of Deception: Training for a New Generation of Online Covert Operations" (50 slides)

 

RELATED LEAKS:  GCHQ Controls the Internet Using JTRIG Tools
                              Intelligence Agencies Using Social Media for Propaganda
                              GCHQ JTRIG Unit Uses "Dirty Tricks"
                              GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger

NSA and GCHQ Spied on WikiLeaks

February 18, 2014

Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters

DOCUMENT:  Psychology - A New Kind of SIGDEV

DOCUMENT:  Discovery SIGINT Targeting Scenarios and Compliance

gchq anticrisi girl slides
ANTICRISIS GIRL slides from GCHQ's "Psychology - A New Kind of SIGDEV" (View all 44 slides)

 

NSA Wikilieaks manhunting timeline

NSA asking countries to file criminal charges against Wikileaks Julian Assange
Excerpt from Intelligence Community's Manhunting Timeline document showing how the U.S. urged other nations to file criminal charges against Julian Assange (Source)

 

NSA internal wiki
SIGINT targeting scenarios and compliance (View full document)

 

WikiLeaks Response:  NSA and GCHQ spying on WikiLeaks

 

ANTICRISIS GIRL

ASD Monitored U.S. Law Firm Representing Indonesia in Trade Talks With the United States

February 15, 2014

Spying by N.S.A. Ally Entangled U.S. Law Firm

DOCUMENT:  SUSLOC Facilitates Sensitive DSD Reporting on Trade Talks

SUSLOC DSD memo about spying on US law firm communications with Indesia about trade talks - NSA
Excerpt from February 2013 bulletin of SUSLOC, the NSA's liaison with ASD (Source)

Drone Program Identifies Targets Based on NSA Metadata Analysis and Cell Phone Tracking Technology

February 10, 2014

The NSA’s Secret Role in the U.S. Assassination Program

NSA VICTORYDANCE, GILGAMESH, DISTANTFOCUS, Anwar Nasser Aulaqi drone documents
Excerpts from NSA documents (source) - View larger

 

VIEW RELATED LEAK:  NSA's Role in the CIA's Drone Program (October 2013)

 

GEO CELL; GILGAMESH; SHENANIGANS; VICTORYDANCE; DISTANTFOCUS

GCHQ JTRIG Unit Uses "Dirty Tricks"

February 7, 2014

Snowden Docs: British Spies Used Sex and 'Dirty Tricks'

DOCUMENT:  Cyber Integration: The Art of the Possible

DOCUMENT:  Full Spectrum Cyber Effects: SIGINT Development as an Enabler for GCHQ's EFFECTS Mission

GCHQ JTRIG dirty tricks slide showing Ambassadors Reception
GCHQ slides from JTRIG presentation: Cyber Integration - The Art of the Possible (13 slides)

 

Full Spectrum Cyber Effects: SIGINT Development as an Enabler for GCHQ's EFFECTS Mission
Full Spectrum Cyber Effects: SIGINT Development as an Enabler for GCHQ's EFFECTS Mission (11 slides) Additional slides here

 

RELATED LEAKS:  GCHQ Controls the Internet Using JTRIG Tools
                              Intelligence Agencies Using Social Media for Propaganda
                              GCHQ Online Covert Operations
                              GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger

 

EFFECTS; AMBASSADORS RECEPTION; ROYAL CONCIERGE

GCHQ Targeted Hackers and DDoS'd IRC Chat Rooms

February 4, 2014

War on Anonymous: British Spies Attacked Hackers, Snowden Docs Show

DOCUMENT:  Hacktivism: Online Covert Action

GCHQ slides - DDOS anonymous irc hackers
GCHQ: Hacktivism: Online Covert Action (14 slides)

 

ROLLING THUNDER

NSA Spying at 2009 Climate Summit

January 30, 2014

NSA spied against UN climate negotiations

Snowden Docs: U.S. Spied On Negotiators At 2009 Climate Summit

DOCUMENT:  UN Climate Change Conference in Copenhagen

UN Climate Change Conference in Copenhagen -- Will the Developed and Developing World Agree on Climate Change
Document posted on an internal NSA website about NSA monitoring the 2009 Copenhagen Climate Change Conference (2 pages)

GCHQ:  Monitoring YouTube, Facebook, Twitter, Blogger

January 27, 2014

Snowden docs reveal British spies snooped on YouTube and Facebook

DOCUMENT:  Psychology - A New Kind of SIGDEV (GCHQ)

GCHQ slides - Psychology - A new kind of SIGDEV - youtube, facebook, twitter, blogger
Psychology - A New Kind of SIGDEV (42 slides - pages 2-43 of PDF)

 

GCHQ spying on Twitter - slides from 2010
Information Operations: The Social Web (5 slides - pages 44-48 of PDF)

 

RELATED LEAKS:  GCHQ Controls the Internet Using JTRIG Tools
                              Intelligence Agencies Using Social Media for Propaganda
                              GCHQ Online Covert Operations
                              GCHQ JTRIG Unit Uses "Dirty Tricks"

 

Analysis: Videos in the GCHQ SQUEAKYDOLPHIN Presentation

 

SQUEAKY DOLPHIN

NSA and GCHQ Collect Data from Phone Apps

January 27, 2014

NSA and GCHQ target 'leaky' phone apps like Angry Birds to scoop user data - Guardian

Spy Agencies Scour Phone Apps for Personal Data - New York Times

Spy Agencies Probe Angry Birds and Other Apps for Personal Data - ProPublica

DOCUMENT:  Converged Analysis of Smartphone Devices, NSA, May 2010

DOCUMENT:  Mobile Theme Briefing, GCHQ, May 2010

NSA slides on smart phone targeting
NSA slides: Converged Analysis of Smartphone Devices (14 slides)

 

GCHQ slides - mobile phones briefing
GCHQ slides: Mobile Theme Briefing (4 slides)

 

How GCHQ and NSA spies on Android and Apple iPhones
Two additional slides published by Guardian showing GCHQ capability for Android and iPhone

View a related slide from 2013 about phone spying at the G20 Summit in London



RELATED LEAK:  BADASS: Spying on Smart Phone Users

 

WARRIOR PRIDE; DREAMY SMURF; NOSEY SMURF; TRACKER SMURF; PARANOID SMURF; PORUS


NSA Collects Millions of Text Messages Daily

January 16, 2014

NSA collects millions of text messages daily in 'untargeted' global sweep

DOCUMENT:  NSA Dishfire presentation on text message collection

NSA Dishfire slide presentation - June 2011
Content Extraction Enhancements for Target Analytics: SMS Text Messages: A Goldmine to Exploit (8 slides)

 

RELATED VIDEO:  Revealed: UK and US spied on text messages of Brits

GCHQ document about Dishfire dated May 2008 from Britain's Channel 4 news video
From Britain's Channel 4 News video: Excerpts from classified GCHQ document dated May 2008

 

DISHFIRE; PREFER; SPYDER; SEDB; FASTCOPE; MILKBONE

NSA Uses Radio Waves to Compromise Computers Not Connected to the Internet

January 14, 2014

NSA Devises Radio Pathway Into Computers

Diagram showing how NSA transmits data to NSA field station using covert radio waves and tranceivers planted in USB cable
New York Times graphic showing how the NSA uses radio frequencies to penetrate computers. NYT also reported having Snowden documents indicating "that the United States has set up two data centers in China — perhaps through front companies — from which it can insert malware into computers"

 

VIEW RELATED LEAK:  The NSA Toolbox:  ANT Product Catalog

 

QUANTUM

NSA Quantum Computing Research

January 2, 2014

NSA seeks to build quantum computer that could crack most types of encryption

DOCUMENT:  Penetrating Hard Targets - Project Description

DOCUMENT:  Classification Guide for NSA/CSS Quantum Computing Research

penetrating hard targets - black budget
Penetrating Hard Targets: from Black Budget, Volume 2, "Combined Cryptologic Program" (3 pages)

NSA Quantum computing guide
Classification Guide for NSA/CSS Quantum Computing Research (10 pages)