2013 LEAKS          2014 LEAKS          2015 LEAKS          2016 LEAKS         2017 LEAKS  
IC off the Record 2015 - Complete list of 2015 NSA leaks
IC OFF THE RECORD:

Direct access to leaked information related to the surveillance activities of the U.S. Intelligence Community and their partners.

 

2016 INDEX:

 

OTHER YEARS:

2017   (View all)

2015   (View all)

2014   (View all)

2013   (View all)

 

EDWARD SNOWDEN:
View all  of his interviews, statements, testimony and appearances in 2013, 2014, 2015

 

RELATED CONTENT:

ANT Product Catalog
Black Budget
Boundless Informant
Petrobras Screenshots
PRISM slides
XKeyscore

About this website

 


Too much information? Visit the redacted IC ON THE RECORD website instead.

Your NSA dictionary:
NSA Nicknames and Codewords

NSA Files:  Decoded
What the revelations mean for you

Snowden Documents:
Snowden document search

Five Eyes Documents:
FVEYdocs:  Eyeing the Five


Open Letter to Intelligence Employees

 


PARTNERS:

Five Eyes (FVEY)
US:   NSA
UK:   GCHQ
CA:   CSE
AU:   ASD
NZ:   GCSB

Nine Eyes (+4)
DK:   FE
FR:   DGSE
NL:   AIVD
NO:   NIS

Fourteen Eyes (+5)
BE:   GISS
DE:   BND
IT:   AISE
SP:   CNI
SE:   FRA

What NSA Knew About Previous Russian Email Hacking

December 29, 2016

Top-Secret Snowden Document Reveals What the NSA Knew About Previous Russian Hacking

Intellipedia article about Russia hacking emails
Intellipedia: Anna Politkovskaya (3 pages)

 



In-Flight Mobile Phone Use Targeted by NSA and GCHQ

December 7, 2016

American and British Spy Agencies Targeted In-Flight Mobile Phone Use - The Intercept

US and Britain refine ability to tap into airline passenger’s mobile phones - Le Monde

NSA In-flight GSM slides
In-Flight GSM (20 slides)

 

GCHQ THIEVING MAGPIE slides
THIEVING MAGPIE (15 slides)

 

HOMING PIGEON
HOMING PIGEON (4 slides)

 

NSA SIDToday - In-flight GSM
SIDToday: In-Flight GSM is No Joke (2 pages)

 

SOUTHWINDS; THIEVING MAGPIE; HOMING PIGEON

   NSA's SIDtoday - 2004 Collection (Part 1)

December 7, 2016

The Snowden Archive - SIDtoday Files - The Intercept

Reagan Administration “Cavalierly” Leaked NSA Signals Intelligence - The Intercept

 

Download a zip file containing the 262 SIDToday articles



NSA's AT&T Spy Hub in New York City

November 16, 2016

TITANPOINTE: The NSA’s Spy Hub in New York, Hidden in Plain Sight - The Intercept

NSA Blarney handbook
BLARNEY Program TDY Handbook (5 pages)

 

NSA Fairview handbook
FAIRVIEW TDY Handbook (11 pages)

 

NSA FAIRVIEW Dataflow Diagrams
FAIRVIEW Dataflow Diagrams - April 2012 (20 slides)

 

NSA SSO Corporate Partner Access
Special Source Operations: Corporate Partner Access (7 slides)

 

NSA BLARNEY Report
BLARNEY Report - April 2013 (7 pages)

 

NSA SKIDROWE
SKIDROWE: Low Speed DNI Processing Solution (8 slides)

 

NSA BLARNEY overview
BLARNEY Program Overview (1 slide)

 

TITANPOINTE; LITHIUM; RIMROCK; SKIDROWE; FAIRVIEW; BLARNEY

Inside Menwith Hill Station

September 6, 2016

The NSA’s British Base at the Heart of U.S. Targeted Killing - The Intercept

GCHQ slides - Elegant Chaos: collect it all, exploit it all
Elegant Chaos: collect it all, exploit it all (23 slides) (23 slides with notes)

 

GCHQ slides - Menwith initiatives maximizing our access
Menwith initiatives maximizing our access (11 slides)

 

GCHQ slides - Menwith classification guide
Menwith Hill satellite classification guide (3 pages)

 

GCHQ Menwith Hall document about Yemen cafe spying
New technique geolocates targets active at Yemeni cafes (3 pages)
GCHQ Menwith Hall document about Ghosthunter
Ghosthunter goes global (1 page)
GCHQ Menwith Hall document about geolocation
Ghosthunter and the geolocating of internet cafes (1 page)

 

GCHQ Menwith Hall document about Ghosthunter tasking process
Ghosthunter tasking process (3 pages)
GCHQ Menwith Hall document about Apparition/Ghosthunter tasking info
Apparition/Ghosthunter tasking info (3 page)
GCHQ Menwith Hall document about APPARITION
APPARITION becomes a reality (2 pages)

 

GCHQ Menwith Hall document about Ghosthunter
Ghosthunter: only capability of its kind (1 page)
GCHQ Menwith Hall document about Ghosthunter future
Ghosthunter future capabilities (2008) (1 page)
GCHQ Menwith Hall document about GSM tower geolocation
GSM tower geolocation (1 page)

 

Menwith collection assets
NSA SIDToday: Two New Collection Assets to Greatly Expand MHS Target Coverage (2 pages)
GSM tower mapping
NSA SIDToday: GSM Tower Mapping Made Easier (2 pages)
GCHQ Menwith Hall document about muli-agency spying
New tool combines multi agency databases (2 pages)

 

Menwith Hill newsletter
Too much of a good thing? (2 pages)
GCHQ Menwith Hall document about counterterrorism survey along Af-Pak border
Menwith continues successful counterterrorism survey along Af-Pak border (2 pages)
GCHQ Menwith Hall document about SIGINT target package
SIGINT target package leads to USMC capture of al Qaeda weapons procurer (2 pages)

 

New ops building at Menwith
New ops building at Menwith completed, fit up begins (2 pages)
GCHQ Menwith Hall document about Menwith Hill Station's new operations building
Work is progressing on Menwith Hill Station's new operations building (2 pages)
GCHQ Menwith Hall document about Traffic series: is your collection surveyed or sustained
Traffic series: is your collection surveyed or sustained (4 pages)

 

UK special forces Reaper drone
UK special forces Reaper drone (1 page)
GCHQ Menwith Hall document about Afghanistan 30 enemy killed
Afghanistan 30 enemy killed (1 page)
GCHQ Menwith Hall document about Project Sandstorm wifi geolocation
Project Sandstorm wifi geolocation (1 page)

 

Yemen backhaul comms collected (Jan 2011)
Yemen backhaul comms collected (Jan 2011) (1 page)
GCHQ Menwith Hall document about Menwith databases as of Aug 2008
Menwith databases as of Aug 2008 (1 page)

 

SANDSTORM; GHOSTHUNTER; APPARITION; ELEGANTCHAOS; DRINKYBIRD; ASPHALT; VENUSAFFECT; FOGHORN; MATCHMAKER; ROADBED; MOONPENNY; WINDCHASER; SPARKLEPONY; MARINA; COUNTRYSTORE; DARKSIDE; HERETIC; SPOTBEAM; BROOMSTICK; CULTWEAVE II; PUZZLECUBE


NSA Hacking Tools (Shadow Brokers)

August 19, 2016

The NSA Leak Is Real, Snowden Documents Confirm - The Intercept

NSA FOXACID slides
NSA Remote Operations Center: FOXACID Briefing (23 slides)

 

NSA FOXACID manual
FOXACID SOP for Operational Management of FOXACID Infrastructure (31 pages)

 

Wireless LAN / CNE Tool Training
Wireless LAN / CNE Tool Training (9 slides)
Introduction to WLAN / 802.11 Active CNE Operations
Introduction to WLAN / 802.11 Active CNE Operations (16 slides)
Introduction to BADDECISION
Introduction to BADDECISION (31 slides)

 

Expeditionary Access Operations
Expeditionary Access Operations: NSA's Close Access Network Exploitation Program (15 slides)

 

SIGINT Development Support II Program Management Review
SIGINT Development Support II Program Management Review (4 slides)

 

RELATED:

 

FOXACID; SECONDDATE; BADDECISION; NIGHTSTAND; MAGIC SQUIRREL; MAGICBEAN; BLINDDATE


NSA Targeted Pro-Democracy Activist

August 14, 2016

In Bungled Spying Operation, NSA Targeted Pro-Democracy Campaigner - The Intercept

Inside one of the SIS's biggest anti-terrorism operations - TV New Zealand

NSA PRISM - FAA collection files - Facebook, credit card statement
NSA surveillance files: Facebook photocar,  credit card statement

 

NSA PRISM - FAA collection files - gmail, bank statement
NSA surveillance files: Gmail2nd Gmail,  bank statement

NSA Medical Intelligence

August 10, 2016

How the U.S. Spies on Medical Nonprofits and Health Defenses Worldwide - The Intercept

NSA Iram Prism data
SSO Weekly Briefing: PRISM Reporting Highlight (3 slides)

 

NSA Black Budget - Countering WMD
Black Budget, Volume 1, "Counter WMD Proliferation" (11 pages)

 

NSA Black Budget - GDIP - medical intelligence
Black Budget, Volume 3, "General Defense Intelligence Program: Medical Analysis Project" (13 pages)

   NSA's SIDtoday - The Rest of the 2003 Collection

August 10, 2016

The Snowden Archive - SIDtoday Files - The Intercept

Iraqi Insurgents Stymied the NSA and Other Highlights from 263 Internal Agency Reports

 

Download a zip file containing the 263 SIDToday articles



Interview with an NSA Hacker

June 28, 2016

He Was a Hacker for the NSA and He Was Willing to Talk - The Intercept


Anchorfree and TOR - NSA hacking
Tracking Targets Through Proxies & Anonymizers (25 slides)

 

NSA spying on Yemen
Network Shaping 101 (81 slides)

 

NSA shaping diagram
Shaping Diagram (1 slide)

 

Related Leak:  How NSA Hacks System Administrators

GCHQ: UK Domestic Surveillance Programs

June 7, 2016

Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure - The Intercept

GCHQ Digint Narrative
The DIGINT Programme (8 pages)

 

GCHQ Digint Imbalance
DIGINT Imbalance   (2 pages)
GCHQ - Milkwhite
MILKWHITE Enrichment Service (MES) Programme (2 pages)

 

GCHQ Preston Study
Preston Study (6 slides)

 

GCHQ Preston Business Processes
Preston Business Processes (24 pages)

 

GCHQ Preston Architecture
Preston Architecture (47 pages)

 

GCHQ NTAC Overview
NTAC Programme Manager (11 slides)

 

GCHQ Communications Capabilities Development Programme
GCWiki: Communications Capabilities Development Programme (3 pages)

 

GCHQ Mobile Apps Checkpoint Meeting Archives
GCWiki: Mobile Apps - Checkpoint Meeting Archives (20 pages)

 

Related:

The Troubling Metadata Sharing Program That Was Just Revealed in the UK - Motherboard

Exclusive: Edward Snowden leaks reveal secret Scottish spy system - CommonSpace

The Little-Known Company That Enables Worldwide Mass Surveillance - The Intercept

 

MILKWHITE; PRESTON; ARTEMIS; ZAMENSIS; REMEDY; GEORGELET; GERONTIC; NIGH; NORWALK; PECTASE; LABORO; NTAC; CATSUP; CONDONE


   NSA's SIDtoday - 2003 Collection

May 16, 2016

The Snowden Archive - SIDtoday Files - The Intercept

The Most Intriguing Spy Stories From 166 Internal NSA Reports - The Intercept

NSA Closely Involved in Guantánamo Interrogations, Documents Show - The Intercept

 

MARCH 2003


Announcement of beta test of a new desktop dashboard for analysts.

Introduction to the new SIDtoday website on March 31, 2003.


APRIL 2003


Deputy Director Quirk asks SID analysts to consider volunteering for deployment to military support operations in Iraq.

A humorous post on the history of April Fools’ Day.

A reminder about training sessions for the QUICKMASK system for emergency planning and preparedness.

SIGINT director announces the availability of a new SIGINT strategy document and encourages the whole team to read it.

Invitation to a session for recently hired employees to talk about what’s on their minds.

The Geospatial Exploitation Office, on 24/7 watch for the Iraq War, assisted in the mapping of geolocation communications data in near real time for high-value targets and threat activity.

SIGINT director announces her appointment as the FBI’s director of intelligence.

Schedule of classes offered for software tools, most taught by contractors.

Quotations from foreign press about the NSA.

Introduction to the series on Communications and Support Operations.

Call for applications for the Intelligence Community Assignment Program rotational assignments for civilian employees.

U.N. Ambassadors Negroponte (U.S.) and Greenstock (U.K.) congratulate NSA for the quality of SIGINT in the lead-up to the Iraq War.

Information about SID’s 2003 promotion cycle, including more money for top performers.

Description of SID Registry, which routes correspondence and monitors responses.

Based on NSA SIGINT, the State Department confronted North Korean officials with evidence they were developing a uranium enrichment capability.

Overview of SIGINT Support Services, which keeps records and provides travel services.

Announcement of new positions for Quirk and Meals, effective April 21, 2003.

Request from Records Management for records relating to NSA contributions to Iraq campaign.

Upcoming training announcements.

Planning underway for post-war changes and challenges in April 2003.

Proposals sought for fresh ideas and innovative analytic approaches.

SIGINT Legislative Affairs coordinates actions related to congressional oversight, language for funding, and briefings and notifications for intelligence committees.

SIGINT supported the rescue of POW Jessica Lynch in Iraq.

Director Baginski and departing leadership invite staff to a farewell open house.

Introduction to SID’s Customer Relationships Directorate series and summary of future articles.

Announcement of HR feedback session for longtime employees.

The SIGINT Policy office creates, maintains, and communicates policy documents.

When the Iraq War started, the Customer Relationships Directorate managed to avoid the chaos of information requests that follwed 9/11 because it had many months to plan and put everything in place before the start of the campaign.

President Bush signed a directive on Feb. 24, 2003, that created a new intelligence priority process. This article announces a briefing on the new National Intelligence Priorities Framework.

On her last day as SIGINT director, Baginski bids farewell and thanks the staff.

Overview of how the NSA handles leaks.

New Director Quirk greets the staff.

Announcement of various leadership changes.


After 9/11, SID suddenly got an influx of requests from previously minor customers (like the departments of Interior and Agriculture), acquired many new customers, and had to interact differently with law enforcement. In response, CRD designed new products to be more flexible with secret documents (allowing them to be accessed outside of SCIFs, on mobile devices, etc.).

Open house hellos and goodbyes.

The intelligence SID gave to the U.S. United Nations team (USUN) during the wind-up to the Iraq War “played a critical role” in the adoption of U.N. Security Council resolutions. The work with that customer was a resounding success.

President Bush signed a directive on Feb. 24, 2003, that created a new intelligence priority process. This article announces a briefing on the new National Intelligence Priorities Framework.

President Bush signed a directive on Feb. 24, 2003, that created a new intelligence priority process. This article recaps a briefing on the new National Intelligence Priorities Framework.

Conclusion of the series on customer relationships and summary of the Customer Service Steering Group structure.

The People Office wants to know what’s on the mind of the SID military workforce.

Introduction to the Learned Organizations series.

The new director and deputy director met with the staff and discussed SID’s goals and staffing.

Copies of NSA’s vital records are stored in Sugar Grove, West Virginia, in case of disaster affecting Fort Meade.

A reminder to read the earlier town meeting recap.

Congress gave SID 500 new hires; the People Office reminds hiring managers to continue moving full steam ahead.

The People Office wants a friendly welcome for new hires and points supervisors to a website developed to assist with the assimilation process.


MAY 2003


NSA created MINUTEMAN PROMETHEUS for Special Forces to collect data from High Power Cordless Phones in Afghanistan.

Reminder about the meeting for the military workforce.

SID is changing classification markings used in reports.

Report from the new leaders of SID on their first weeks on the job.

The State Department tasked NSA with getting information about an alleged Russian gangster.

SID leadership has new offices and phones.

The Terrorist Threat Integration Center opens at the CIA, and NSA’s information-sharing role is described.

A feedback session for shift workers is scheduled.

Introduction of a new content management system, JOURNEYMAN, for authoring and distributing SIGINT information.

Announcement of a cross-agency analyst forum on SARS (severe acute respiratory syndrome), including impact of the virus on China’s military.

Reminder about the feedback meeting for experienced SID employees.

This describes CATAPULT, a prototype of a data portal for sharing SIGINT product between NSA and second-party partners, based on a Canadian project that uses an XML-based standard format.

Announcing the first SIGINT Enterprise Annual Report, for 2002.

The KRYPTOS Society was established in 1981 to “promote interest in cryptoanalysis” and “excellence in the cryptologic community.” It had 250 members in 2003, has local chapters in second-party spy agencies like GCHQ, and organizes competitions, monthly lectures, etc.

Six NSA personnel returned from tour at CENTCOM headquarters in Tampa where they provided support to Operation Iraqi Freedom (including researching possible locations of stockpiled WMD material).

The SID Mailbag for questions and comments is open again.

After 9/11, SID used SIGINT against terrorist targets in the Horn of Africa. This describes lessons learned from that experience and strategies for signals intelligence elsewhere on the continent.

Reminder about the What’s on Your Mind feedback meeting for shift workers.

Reminder about the What’s on Your Mind meeting for shift workers.

SID’s chief of staff writes about the employee promotion and awards system and the importance of productive feedback.

The What’s on Your Mind meeting for new hires is scheduled.

National Intelligence Priorities Framework is released to the intelligence community.

How NSA was able to safely use the latest Arabic language translation software produced by a foreign firm without a costly and time-consuming code review process.

The 2002 SID property inventory showed more than $27 million worth of SID equipment was “unaccounted for.” New processes and accountability needed for the 2003 property inventory.

The Crypto-Linguistic Association was established in 1965 to “support the continuing development and advancement of agency language analysts.” It had 200 members in 2003. Events included lectures, award ceremonies, and a luncheon with the “director of the Klingon Institute.”

Three people from SIGINT Communications ran in a 5K race.

Repeat: The 2002 SID property inventory showed more than $27 million worth of SID equipment was “unaccounted for.” New processes and accountability needed for the 2003 property inventory.

Announcement for a SIGINT conference in June, including classes on “internet research.”

Repeat: Announcement of cross-agency analyst forum on SARS (severe acute respiratory syndrome), including impact of the virus on China’s military.

The Korean Issue Management Team identifies North Korean SIGINT gaps, prioritizes them, and challenges the enterprise to respond with solutions.

SID leadership held an offsite at the University of Maryland’s Institute for Defense Analysis.

WARGODDESS is a system that fuses multiple sources of signal data to help characterize targets and threats and produce estimates about targets and their intentions.

The Collection Association was established in 1977 to provide “community-wide recognition and unique opportunities for professional growth in collection and related disciplines.” Historically, collectors were people who sat with an antenna and spied on the radio spectrum, but the role has expanded to spying using satellites and even gathering information from the internet.

Operation SIGINT is recruiting new detailees to work with the Korean Issue Management Team.

SEARCHLIGHT, the NSA internal directory, is adding middle names to link to identification systems, specifically to help the PKI (Public Key Infrastructure) system work.

Dr. Zachary Abuza, a terrorism expert, will give an address to NSA workforce.

SID senior enlisted advisor writes a tribute to Memorial Day.

Recap of a conference on cross-border criminal activities, including trafficking in drugs, people, and weapons, as well as money laundering. Experts from academia, intelligence, and law enforcement communities provided briefings.

At leadership offsite, SID director says he believes in magic of the workforce.

Dr. Zachary Abuza, a terrorism expert, will give an address to NSA workforce.

Part 1 of the Congress series explains the budget process and SID’s part in putting together the Congressional Budget Justification Book.

Civilian and military employees hired in the past two years are invited to a feedback session.

SIGINT director posts job for his civilian executive assistant.

Part 2 of the Congress series explains budget jargon, describes the focus of the current budget, and names congressional staffers.

Repost: SEARCHLIGHT, the NSA internal directory, is adding middle names to link to identification systems.

Part 3 of the Congress series provides the number of queries from congressional staff and briefings per month. It also describes “Congressional Notifications,” where NSA alerts Congress to reports of “bad news” and other items of interest.


JUNE 2003


SID leadership held its second offsite.

Reminder of an upcoming speech by Brig. Gen. Zahner about the Iraq War.

Description of a plan for the modernization of collection and processing of international communications from foreign communications satellites.

Teaser for an upcoming SID Around the World series.

Language award winners are announced.

Language award winners are announced.

Reminder about Brig. Gen. Zahner’s speech about the Iraq War.

A continuing theme at the SID leadership offsite was decentralizing decision-making.

A linguist describes his experiences supporting NSA offices in the Balkans theater.

Description of Brig. Gen. Zahner’s speech, which covered the role of intelligence in Operation Iraqi Freedom and the importance of taking risks.

Junior Officer Cryptologic Career Program offers a 36-month program to develop military SIGINT officers.

Introduction of a new form for customer feedback. Only 5 percent of product has documented feedback; analysts encouraged to enter feedback into the database.

An office manager describes the work, which includes helping keep morale high and being a manager’s eyes and ears. Sometimes the capabilities of office managers aren’t appreciated.

Announcement of a new list of web links to support employees facing potentially stressful situations, like deployment to a war zone.

Instructions about the performance review process and a note to managers about adding an objective related to property accountability.

Awards announced for military performers of the quarter.

Announcement of a seminar on negative fallout from the Iraq War for Turkey and Turkey-U.S. relations.

The PATENTHAMMER system was developed for SOCOM for advanced signal collection with remote, reach-back capability and deployed to Kosovo, Georgia, Afghanistan, Saudi Arabia, Bahrain, and the Philippines.

NSA is finally getting better internet access on a new network; this is part of the multibillion-dollar Eagle Alliance outsourced contract. Staffers need internet training.

An article describes the mission and recent activities of SIGINT Development, an expanding mission of NSA.

The Crypto-Mathematics Institute is NSA’s oldest Learned Organization, founded in 1957 to “promote those aspects of mathematics which pertain to cryptology.” The organization hosts events and seminars, sponsors an essay contest, publishes a newsletter, and puts on a “classified mathematics conference called MATHFEST.”

The assistant deputy director for customer relationships will be traveling to Europe headquarters and London.

Promo for a series on the new SID leadership team.

Annual conference on COMBAT SENT, an airborne collection system for information on potentially hostile radar systems.

Cryptologic workforce will be required to populate an intelligence community database (Analytic Resources Catalog) with information on expertise.

Announcement of a seminar on Latin America analyzing potential developments in the Andean region and Brazil over the next five years.

The NSA director’s “final WARgram” on Operation Iraqi Freedom states, “Although major combat is over, Iraq is still a troubled environment and much work needs to be done.”

Deputy director for analysis and production describes his leadership style.

First Annual Analysis Conference invitation to all NSA civilian and military affiliates, second-party colleagues, and contractors with clearances. The conference, “Charting the Course to the Future,” will include seminars on analytic tradecraft.

The senior technical leader for analysis and production writes that his primary concern is Digital Network Intelligence and the problems with access and cultural proclivities that affect reporting.

NSA’s Japan representative describes the American military base. The front end for the majority of signals collected for exploitation at Kunia in Hawaii is on Okinawa.

The International Affairs Institute was founded in 1971. It presents “distinguished speakers from the fields of business, politics, the military, and academia” and encourages members to write and publish papers. The IAI hosts events (including a trivia contest) and recruits heavily from interns.

Key points from NSA Director Hayden’s paper “The Extended Enterprise: Where To From Here?” and its impact on the organization.

A North Korea “rock drill” featuring experts from across the cryptologic community was held to prepare the cryptologic system to better support policymakers and war fighters.

Announcement of a “Terrorism in Southeast Asia” seminar about Jemaah Islamiyah and terrorist groups in the Philippines.

How to make SIDtoday your home page in Netscape and Explorer.

Description of SID’s contribution to the capture of the “king of diamonds” from CENTCOM’s deck of cards representing its list of most wanted Iraqis.

Explanation of beaver tails, a Canadian pastry.

Example of dangerous incidents in Iraq from one day in June 2003. The war has entered the reconstruction phase, and SIGINT support has shifted to force protection.

Announcement of forthcoming promotion list; congratulations to promotees and award recipients.

The SIGINT director went with the NSA director to the Palliser Conference, an annual meeting of the five-eyes SIGINT and HUMINT agencies.

Short book review of Neal Stephenson’s Cryptonomicon.

Photo display of MG Quirk’s November 2002 trip to Baghdad, including a visit to Abu Ghraib prison; no photos are included, only the captions.

In Belgium, SID has representatives at NATO in Brussels and Mons, where they work in an underground bunker.

The assistant deputy director for customer relationships describes his first month on the job.

List of SID HR personnel and their roles following a reorganization.

SIGINT played a very prominent role in the capture of the “ace of diamonds” from CENTCOM’s card deck representing its list of most wanted Iraqis.

Brig. Gen. Zahner’s speech to NSA on Operation Iraqi Freedom will be rebroadcast multiple times each day for a week on an internal video channel.

Wrap-up of the 2003 SIGDEV conference; the theme was “Creating Opportunities Through Collaboration.”


JULY 2003


An employee of the Cryptologic Applications Directorate writes about tours in Europe.

A staff member at the Cryptologic Support Group writes about working at the Pentagon.

The executive assistant to SIGINT Director Quirk describes a “daily roller coaster ride.”

How NSA deals with electronic records, including tips on records management and transfer to the Records Center or Archives.


AUGUST 2003


A typical day as a policy wonk at the NSA.

The deputy director for customer relationships describes the business model of the Customer Relationships Directorate and the role of leadership.

Explanation of the process of downgrading information’s classification level and who at NSA performs the downgrading task.

Quotations from foreign press about the NSA

Special U.S. Liaison Offices are representatives to the second-party countries (the U.K., Canada, Australia, and New Zealand) for cryptologic collaboration. The Foreign Affairs Directorate has officers overseeing second-party matters at Fort Meade, and each second party maintains a senior liaison at NSA.

Data flow managers understand data and the processing that ensures that the collected signal is converted to data and intelligence and delivered to customers.


SEPTEMBER 2003


A mission planner in the Denver field station writes about life and recreation in the Rockies.

A mathematician describes work in the field of “diagnosis,” doing cryptanalysis on new types of encryption. Projects include working as part of a close-knit team looking for weaknesses in new cryptosystems, using a variety of tools to find patterns in ciphertext, and programming new tools that don’t yet exist.

An NSA couple worked at locations in Germany’s Rheinland and enjoyed local cuisine and European travel.

A Spanish linguist describes the steps in language analysis of intercept. On a typical day, a linguist can scan hundreds of items. Most of the time, the intercept is unproductive, but when actionable intelligence information is found, the value of a linguist becomes evident.

The Action Team provides services to the director, chief of staff, and deputy directors.


OCTOBER 2003


In part 1, a computer scientist compares tours in Misawa, Japan, and Menwith Hill in the U.K.

In part 2, the computer scientist describes lifestyle differences between Japan and the U.K. Menwith Hill is four hours from a Taco Bell.


NOVEMBER 2003


A senior operations officer in the National Security Operations Center represents the NSA director on watch in the round-the-clock critical mission center.


DECEMBER 2003


Anecdote from a Gordon Regional Security Operations Center analyst who was asked to provide immediate intelligence on a specific flight from Iran to Syria, at the end of the workday. “Working as an analyst at GRSOC gives you the opportunity to fully experience the SIGINT process — GET IT, KNOW IT, USE IT.”

A handy guide to military rank abbreviations.

In the early days at Guantánamo, this NSA liaison officer worked in the Joint Interrogation Group. NSA liaison officers provided intelligence to support interrogations, observed or participated in interrogations, and relayed information back to NSA for SIGINT.

Quotations from foreign press about the NSA.

 

CATAPULT; FIRSTFRUIT; JOURNEYMAN; MINUTEMAN PROMETHEUS; MUSKETEER; OUTPARKS; PATENTHAMMER; QUICKMASK; SEARCHLIGHT; WARGODDESS


NSA Diary of an Abu Ghraib Interrogator

May 11, 2016

The Secret NSA Diary of an Abu Ghraib Interrogator - The Intercept

SIDToday From SIGINT to HUMINT to SIGINT Through HUMINT Part 1
SID Today: From SIGINT to HUMINT to SIGINT (Through HUMINT) - Part 1   (2 pages)
6SIDToday From SIGINT to HUMINT to SIGINT Through HUMINT Part 2
SID Today: From SIGINT to HUMINT to SIGINT (Through HUMINT) - Conclusion (2 pages)


NSA Intercepts: United Nations, European Union, Italy

February 23, 2016

NSA Targets World Leaders for US Geopolitical Interests - WikiLeaks


Related Stories:

WikiLeaks: NSA Spied on Israel’s Attempts to Repair Relations With U.S. - The Intercept

WikiLeaks reveals the NSA spied on Berlusconi and his closest advisors - L'Espresso

Irish citizen working for the UN Refugee Agency was targeted by the NSA - Medium



UNITED NATIONS: (Source)

NSA United Nations phone targets - top secret
NSA database extract of significant United Nations political telephone interception targets (View larger)

 

 Global SIGINT Highlights:
NSA intercept - Japan at G8
Japan Seeks Long-Term Pact With Specific Figures on Climate Change at G-8 (larger)
NSA intecept - UNSYG climate change at G8
UNSYG Stresses Importance of EU Leadership Role in Climate Change (larger)


EUROPEAN UNION: (Source)

NSA EU phone targets - top secret
NSA database extract of significant European Union political telephone interception targets (View larger)

 

 Global SIGINT Highlights:
NSA intercept - Japan at G8
EU, Japan Study Ways to Respond to U.S. Tactics in Doha Round Talks (larger)

 



ITALY: (Source)

NSA Italian phone targets - top secret
NSA database extract of significant Italian political telephone interception targets (View larger)

 

 Global SIGINT Highlights:
NSA intercept - Italy and Israel
Italy Would Help Israel Mend Relations With U.S. (larger)
NSA intecept - European Leaders Hold Berlusconi Accountable - Merkel NSA intercept
European Leaders Hold Berlusconi Accountable on Italian Financial Situation (larger)

 

View More NSA Targets / Intercepts:

GCHQ Malware Checklist and Data Mining Research Report

February 2, 2016

Exclusive: Snowden intelligence docs reveal UK spooks' malware checklist - Boing Boing

GCHQ Malware checklist
GCHQ March 2010: What's the worst that could happen? (3 pages)

 

GCHQ Data Mining
HIMR Data Mining Research Problem Book (96 pages)

 

Analysis:  A technical reading of the “HIMR Data Mining Research Problem Book”


GCHQ and NSA Hacked Israeli Drone Video Feeds

January 28, 2016

Israeli Drone Feeds Hacked By British and American Intelligence - The Intercept

Hacked Images from Israel’s Drone Fleet - The Intercept

SID Today Israeli drones
SID Today: MHS FISINT Successfully Collects Israeli F-16 Heads-Up Display   (2 pages)
6 month overview - Israeli drones - NSA
Significant TRF TROODOS Stories over past 6 months (2 slides)

 

S455N - Israeli UAV Digital Video
S455N - Israeli UAV Digital Video (7 pages)

 

GCHQ Drone Anarchist Training Manual
ANARCHIST Training Manual: ISUAV Video Descrambling (3 pages)

 

Analysis:  Cryptanalysis of intercepted Israeli drone feeds

Related:   Laura Poitras Prepares ‘Astro Noise’ for the Whitney Museum - New York Times

 

ANARCHIST