LEAKED NSA Documents
Targeted Killings in Afghanistan
December 28, 2014
DOCUMENTS:

SIDToday: SIGINT Helps Hobble the Taliban by Cutting Off Their Livelihood (4 pages)

Dynamic Target Storyboard - Objective: Doody - Mullah Niaz Muhammed (3 pages)

JPEL Targets (Joint Prioritized Effects List) (36 pages)

SIDToday: To Nab Afghan Nemesis, German Forces Launches Rare Takedown Operation (3 pages)



NSA/GCHQ Attacks On Internet Security
December 28, 2014
ATTACKS AGAINST CRYPTO:

User's Guide for PRISM Skype Collection (9 pages)

GCHQ: BULLRUN CoI Briefing Sheet (4 pages)

GCHQ: BULLRUN (10 slides)

NSA WikiInfo: LONGHAUL (15 pages)

Net Defense From Encrypted Communications (16 pages)

SIGDEV Conference 2012: Technology Trending Challenges and Approaches (40 slides)

NSA WikiInfo: SCARLETFEVER (3 pages)

GCHQ GCWiki: VoIP NSA Alias (5 pages)

SIDToday: SIGINT Strategy threads about how NSA handles encrypted traffic (3 pages)

PGP intercept (1 page) OTR encrypted chat intercept (2 pages)

Classification Guide for Cryptanalysis (3 pages)

GCHQ: Crypt Ops Data Store User Guide (4 pages)

NSA/GCHQ: Crypt Discovery Joint Collaboration Activity (3 pages)

NSA Cryptographic Modernization (CryptoMod) Classification Guide (4 pages)

National Information Assurance Research Laboratory (NIARL) Newsletter: The Edge (15 pages)

What Your Mother Never Told You About SIGDEV Analysis (87 slides)

GCHQ: A Potential Technique to Deanonymise Users of the Tor Network (23 slides)

Applied Research: Tor Hidden Services (26 slides)

Internet Anonymity 2011 (51 slides)

GCHQ GCWiki: Tor Deanonymisation Research (3 pages)

GCHQ: Tor - Overview of Existing Techniques (5 slides)

GCHQ: A Potential Technique to Deanonymise Users of the Tor Network (18 pages)

WikiInfo: TURMOIL/APEX High Level Description Document (12 pages)

GALLANTWAVE (5 slides)

Intro to the VPN Exploitation Process (43 slides)

Analytic Challenges from Active-Passive Integration (14 slides)

VALIANTSURF (3 slides)

MALIBU and TURMOIL/VALIANTSURF (4 slides)

WikiInfo: POISONNUT (2 pages) WikiInfo: POISONNUT Product (2 pages)

VPN SigDev Basics: OTTERCREEK (30 slides)

GCHQ: An Introduction to FLYING PIG and HUSH PUPPY (19 slides)

SPIN 15 VPN Story (4 pages)

WikiInfo: VPN Transform Engine Emulator (2 pages) WikiInfo: TURMOIL GALLANTWAVE (2 pages)

TURMOIL VPN Processing (20 slides)

WikiInfo: VALIANTSURF (13 pages)

TURMOIL: IPSEC VPN Sessionization (18 pages)

Fielded Capability: End-to-End VPN SPIN 9 Design Review (47 slides)

NSA/GCHQ Experiment testing SSL/TLS Decryption - ISLANDTRANSPORT / LONGHAUL (8 pages)

CSEC: TLS Trends - A rounddtable discussion on current usage and future directions (15 slides)

Secure Sockets Layer (SSL) / Transport Layer Security (TLS) (42 slides)

TLS Trends at GCHQ (11 slides)
How NSA Targets Tor
PRISM; BULLRUN; LONGHAUL; TURMOIL; BLUESNORT; GALLANTWAVE; TUTELAGE; XKEYSCORE; SCARLETFEVER; SAMESHEET; SPEERMINT; TUNDRA; DISCOROUTE; BLACKPEARL; TOYGRIPPE; DARKSUNRISE; HOMING TROLL; NEWTONS CRADLE; EPIC FAIL; TRIBAL CARNEM; QUICK ANT; GALLANTWAVE; BLEAKINQUIRY; VULCANDEATHGRIP; VULCANMINDMELD; CORALREEF; MAILORDER; SCISSORS; PINWALE; FOURSCORE; CADENCE; TURTLEPOWER; AGILITY; HAMMERMILL; BRAVENICKEL; HAMMERCHANT; HAMMERSTONE; HAMMERSTEIN; VALIANTSURF; POINSONNUT; MALIBU; OTTERCREEK; TREASUREMAP; TUNINGFORK; RENOIR; FLYING PIG; HUSH PUPPY; TURBULENCE; PRESSUREWAVE; TUBE; EXOPUMP; KEYCARD; ISLANDTRANSPORT; OLYMPIA; BROAD OAK



Intelligence Data Gathered Prior to Mumbai Attacks
December 21, 2014
Web of Terror (PBS Frontline)

Analysis of intelligence gathered from Mumbai attack plotter Zarrar Shah’s online activities (Source)



Operation Socialist: Belgacom Hack
December 13, 2014
Read how the British secret service GCHQ attacked Belgacom (NRC Handelsblad)
British secret service spied for years on Belgacom customers (De Standaard)
DOCUMENTS:

GCHQ – Making Network Sense Of The Encryption Problem - 2011 (11 slides)

GCHQ – Mobile Networks In My NOC World - 2011 (22 slides)

GCHQ – Automated NOC Detection - 2011 (25 slides)

GCHQ – STARGATE CNE Requirements (2 pages)

GCHQ NAC Reviews:
- October to December 2011
- January to March 2011
- April to June 2011
- July to September 2011
- January to March 2012

HOPSCOTCH (1 excerpt)

GCHQ Belgacom Connections (1 slide)
Related stories about the Regin malware found on Belgacom servers:
- Secret Malware In European Union Attack Linked To U.S. And British Intelligence
- Comparing the Regin module 50251 and the "Qwerty" keylogger
OPERATION SOCIALIST; NOCTURNAL SURGE; PENTAHO; HACIENDA; MUTANT BROTH; QUANTUM INSERT; LEGSPIN; HOPSCOTCH



AURORAGOLD: NSA Hacking Cellphone Networks Worldwide
December 4, 2014
DOCUMENTS:

AURORAGOLD Project Overview - 2011 (4 slides)

AURORAGOLD Working Group - 2012 (26 slides)

IR.21 - A Technology Warning Mechanism (19 slides)

AURORAGOLD – Target Technology Trends Center support to WPMO - 2011 (6 slides)

AURORAGOLD Working Aid - 2012 (4 pages)


AURORAGOLD Project Overview - 2011 (4 slides)

AURORAGOLD Working Group - 2012 (26 slides)

IR.21 - A Technology Warning Mechanism (19 slides)

AURORAGOLD – Target Technology Trends Center support to WPMO - 2011 (6 slides)

AURORAGOLD Working Aid - 2012 (4 pages)

- NSA First-Ever Collect of High-Interest 4G Cellular Signal (1 page)
- GCHQ WOLFRAMITE Encryption Attack (1 page)
- GCHQ OPULANT PUP Encryption Attack (1 page)
- NSA/GCHQ/CSEC Network Tradecraft Advancement Team (1 page)



British Telco Cable & Wireless Worked With GCHQ
November 25, 2014
DOCUMENTS:
- SSO Briefing slide (25 Apr 2013): WINDSTOP System Highlights (1 slide)
- MTI Access Project Weekly Status Rpt: 27 June 08 (1 page)
- MTI Access Project Weekly Status Rpt: 28 Nov 08 (1 page)
- MTI Access Project Weekly Status Rpt: 6 Feb 09 (1 page)

- CNE EndPoint Project Load - Notes Page (1 page)
- Cable Master List: Flag EA (Reliance Globalcom / GERONTIC) (1 page)
- PTC Glossary from GCWiki: INCENSER (1 page)
2009 Cable Master List:

- Access Breakdown (1 page)
- Cable Master List Data (58 pages)
- No Current Access (2 pages)
- Partner Cables (1 page)

Snowden documents show Malta’s internet links tapped by UK GCHQ
Analysis: INCENSER, or how NSA and GCHQ are tapping internet cables
Submarine Cable Taps Map

Interactive map showing which submarine cables are tapped and where, based on Snowden documents
November 20, 2014
Spy cable revealed: How telecoms firm worked with GCHQ - Channel 4 video
New Snowden documents show how Vodafone aided spying mission - Süddeutsche Zeitung
Vodafone - the long arm of British intelligence? - WDR video
GERONTIC; NIGELLA; WINDSTOP; INCENSER; MUSCULAR; TRANSIENT THURIBLE; GRASP; DRUDGE; FAINT; VISAGE; BULLROARER; REMEDY; PFENNING ALPHA



GCHQ Spied on UN Climate Negotiations
November 1, 2014

GCHQ slides: Supporting HMG's Climate Change Ambitions (23 slides)



CITIZENFOUR Revelations
October 10, 2014
In addition to the documents released below under NSA Core Secrets, the following screenshots from the CITIZENFOUR movie contain new revelations:
TUMULT slides from screenshots of CITIZENFOUR (View larger) - source

Screenshots from a 24-slide Powerpoint presentation related to JCE UK Legality (View larger) - source



NSA Core Secrets: ECI Programs Including Undercover Agents in China, Germany, and South Korea
October 10, 2014
DOCUMENTS:


- Briefing: National Initiative Protection Program - Sentry Eagle (13 pages)
- NSA Target Exploitation (TAREX) Classification Guide (7 pages)
- Exceptionally Controlled Information (ECI) Listing (6 pages)
- ECI WHIPGENIE Classification Guide (7 pages)
- ECI Pawleys Classification Guide (4 pages)

- ECI Compartments - January 2013 (4 pages)
- CNO Core Secrets Slide Slices (10 pages)
- CNO Core Secrets Security Structure (3 pages)
- Computer Network Exploitation (CNE)Classification Guide (8 pages)
- CNO Core Secrets (7 pages)
ABEYANT; AMBULANT; APERIODIC; AUNTIE; BLACKANT; BLACKCLOUD; BLACKHOLE; BLACKJACK; BLACKTIE; BLACKVULTURE; BLACKWIDOW; BOATMEN; BOXWOOD; BULLET; CELESTIALGLOBE; CHIEFDOM; CHILLY; CLERIC; CLICKUMBER; CONDOR; CONQUERER; CRIMSONREGENT; CRIMSTONSTEAL; CRUMPET; DECKSTOP; DEVILFISH; DICHOTOMY; DILEMMA; DIXIESPRING; DOMINATE; ENSIGN; ESCAPEE; EVADEYIELD; FALCON; FASTIDIOUS; FIRESCREEN; FIRSTDOWN; FISSURESALUTE; FLEXURE; FLYLEAF; FORBIDDEN; FORBORNE; FOXHEAT; FREELUNCH; FROTHYTWOPACK; FURTIVERELIANCE; GOLDENCALF; GRAYSCALE; HAWK; HELLFIRE; HISTORY; HYSSOP; INVEIGH; INVENT; KESSELRUN; LIGHTNINGTHIEF; LITTLECROWN; LONGSERPANT; LYSERGIC; MAGICSTROKE; MERCURYTAO; MISCHIEF; MUSICBOX; NITEHAWK; OCELLUS; OPALESCE; OWL; PAINTEDEAGLE; PAWLEYS; PAWNSHOP; PENDLETON; PENDRAGON; PERKYAUTUMN; PHENYLDOUR; PICARESQUE; PICAROON; PIEDMONT; PITCHFORD; PLACEBO; POMPANO; PRESSURETWIN; RAGTIME; REDHARVEST; REEFPOINT; REFRACTOR; REVELRY; RIVERROAD; RUBIOUS; SAILWINDS; SCABBARD; SILVERCLOUD; SINKGOAL; STAIRWELL; STARCHART; STATEROOM; STEREO; STRESSFUL; SUITESWIVEL; TAXONOMY; TRICKSHOT; VISITOR; WASHBURN; WAXOFF; WHIPGENIE



GCSB: New Zealand's Mass Surveillance Project
September 15, 2014
DOCUMENTS:

- IRONSAND Mission slide about Project SPEARGUN (1 slide)
- NSA slide - New Zealand: Partner cable access program achieves Phase One (1 slide)
- Agenda for a 2013 meeting between the director of New Zealand Intelligence Coordination Group and NSA Director Keith Alexander (2 pages)

Excerpt from NSA planning document



TREASUREMAP: Secret Access to German Satellite Companies
September 14, 2014
The NSA and GCHQ Campaign Against German Satellite Companies (The Intercept)
DOCUMENTS:

NSA TREASUREMAP presentation (38 slides)

Satellite Teleport Knowledge report: Stellar PCS (26 pages)

SIDToday - TREASUREMAP Announces a New Release (4 pages)
Filmmakers Katy Scoggin and Laura Poitras follow reporter Marcel Rosenbach as he informs the staff of a German communications firm that they have been targeted for surveillance by British spies.
TREASUREMAP; PACKAGEDGOODS; BLACKPEARL; LEAKYFAUCET; HYDROCASTLE; MASTERSHAKE; S-TRICKLER; TOYGRIPPE; DISCOROUTE; VITALAIR2; IPGEOTRAP; JOLLYROGER; TUTELAGE; BYZANTINE HADES



U.S. Government's Plans to Spy For American Corporations
September 5, 2014

Quadrennial Intelligence Review Final Report - 2009 (32 pages)



Turkey: NSA's Partner and Target
August 31, 2014
How the NSA Helped Turkey Kill Kurdish Rebels (The Intercept)
DOCUMENTS:

- SIDToday: Collaboration in Overdrive: A CNE Success (2 pages)
- Turkey and the PKK (3 pages)
- SIDToday: NCRs with Foreign Relations Missions Become 'SUSLAs' (2 pages)
- SINIO Seminar: Turkish Presidential and Parliamentary Elections (2 pages)
- Information Paper: NSA Intelligence Relationship with Turkey (4 pages)

- NSAs Oldest Third Party SIGINT Partnership (2 pages)
- May 2013 Meeting Agenda: Turkish Signal Intelligence Chief (2 pages)
- SINIO Strategic Intelligence Issue Seminars- Turkey (2 pages)
- SINIO Seminar: Turkey and the Kurds (1 page)

- GCHQ Surveillance Summary (Jordan-Belgium Gateways) (6 pages)
- GCHQ Surveillance Summary (Iraq-UK Gateways) (2 pages)
- GCHQ Targeting: Turkey at the G20 Pre-Meeting in London 2009 (2 pages)
- GCHQ Project: Turkey Energy Company Development (1 page)
- GCHQ Document: Kurdistan Regional Government (3 pages)



ICREACH: NSA's Secret Surveillance Search Engine
August 25, 2014
The Surveillance Engine: How the NSA Built Its Own Secret Google - The Intercept
DOCUMENTS:

ICREACH: Sharing Communications Metadata Across the U.S. Intelligence Community (36 slides)

- CIA Colleagues Enthusiastically Welcome NSA Training (1 page)
- CRISSCROSS/PROTON Point Paper (4 pages)
- Decision Memorandum for the DNI on ICREACH (3 pages)
- Metadata Sharing Memorandum (4 pages)
- Sharing SIGINT metadata on ICREACH (2 pages)

- Metadata Policy Conference (2 pages)
- ICREACH Wholesale Sharing (1 page)
- Black Budget Extracts (2 pages) (View more from the Black Budget)



HACIENDA Port Scanning Program Used by Five-Eyes
August 15, 2014
DOCUMENTS: (View all slides)

GCHQ presentation describing the HACIENDA system (6 slides)

NSA SIGDEV presentation describing their hacking process (8 slides)

CSEC slides describing the LANDMARK tool (6 slides)

GCHQ slides describing their MUGSHOT tool for compromising Operational Relay Boxes (ORBs) (4 slides)
RELATED LEAK: GCHQ Controls the Internet Using JTRIG Tools



NSA Bot Can Wage Cyberwar Autonomously
August 13, 2014
Related: Wired Interview of Edward Snowden



National Counterterrorism Center Reports (NCTC)
August 5, 2014
Barack Obama’s Secret Terrorist-Tracking System, by the Numbers - The Intercept

Directorate of Terrorist Identities (DTI) Strategic Accomplishments 2013 (12 pages)
July 23, 2014
The Secret Government Rulebook For Labeling You a Terrorist - The Intercept

National Counterterrorism Center's March 2013 "Watchlisting Guidance (166 pages)



U.S. Support for Israel: Cash, Weapons and Surveillance
August 4, 2014
DOCUMENTS:

NSA Intelligence Relationship with Israel (3 pages)

Israel-US 1999 Agreement (16 pages)

Receipts for payments in cash to Israel

Excerpt from July 2008 GCHQ document

Excerpt from GCHQ planning document from 2008



NSA's Partnership with Saudi Ministry of Interior
July 25, 2014

NSA Information Paper: NSA Intelligence Relationship with Saudi Arabia (4 pages)



SIGINT Authority Decision Tree - Executive Order 12333
July 23, 2014

NSA internal training materials graphic showing the various authorities for SIGINT collection



How GCHQ Controls the Internet Using JTRIG Tools
July 14, 2014

JTRIG Tools and Techniques (8 pages) Text-searchable transcription
GCHQ Online Covert Operations
GCHQ JTRIG Unit Uses "Dirty Tricks"
GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger
DEADPOOL UNDERPASS BADGER WARPATH SILVERLORD MINIATURE HERO SPRING BISHOP ANGRY PIRATE GATEWAY SLIPSTREAM GESTATOR PREDATORS FACE ROLLING THUNDER IMPERIAL BARGE ELATE HACIENDA CHANGELING (View more)



NSA and FBI Targeted Muslim-American Leaders
July 9, 2014
DOCUMENTS:

A selection from the FISA Recap spreadsheet showing email addresses listed as monitored (view larger)

Entries from the FISA Recap spreadsheet related to Faisal Gill

Entries from the FISA Recap spreadsheet related to Asim Ghafoor

Entries from the FISA Recap spreadsheet related to Agha Saeed

Entries from the FISA Recap spreadsheet related to Nihad Awad

Entries from the FISA Recap spreadsheet related to Hooshang Amirahmadi

Instructional document on how to properly format internal memos to justify FISA surveillance

NSA document showing that Case Notation codes beginning with the prefix “XX.SQF” are assigned to all “FISA accounts” as a unique identifier


Ordinary Web Users Are Caught in NSA's Surveillance Net
July 5, 2014
Follow-up story: How 160,000 intercepted communications led to our latest NSA story

Composite image of two of the many private photos NSA collected from online accounts in the U.S.



XKeyscore Source Code Targets Tor and TAILS Users
July 3, 2014
Branded by the NSA as an extremist (Original German version)
XKeyscore Rules



NSA Surveillance Authorized for 193 Countries
June 30, 2014
DOCUMENTS:

- NSA document on targeting Five Eyes countries and territories
- FISA judge's order authorizing surveillance of foreign governments and organizations
- List of foreign governments and organizations authorized for surveillance
- FISA judge's order authorizing surveillance of foreign governments and organizations
- List of foreign governments and organizations authorized for surveillance

- DNI, attorney general certify surveillance targets 'reasonably believed' to be outside U.S.
- FISA Amendments Act of 2008 Section 702 summary document
- NSA director's affidavit on foreign surveillance
- FISA Amendments Act of 2008 Section 702 summary document
- NSA director's affidavit on foreign surveillance



Danish Partnership with NSA
June 19, 2014
Snowden documents reveal Danish partnership with NSA (Information.dk)
More countries involved in the NSA's global mass surveillance (Information.dk)
How Secret Partners Expand NSA’s Surveillance Dragnet (The Intercept)
DOCUMENTS:



Rampart-A Project Overview October 2010 (23 slides)

Special Source Operations slides (6 of 8 slides are new)

Special Source Operations slides (3 additional RAMPART-A slides)
Related Analysis: The German operation Eikonal as part of NSA's RAMPART-A program
View 2013 leak containing related SSO Slides: NSA Taps Into Google and Yahoo Data Centers
RAMPART-A; SMOKYSINK; AZUREPHOENIX; SPINNERET; TRANQUIL; MOONLIGHTPATH; FIREBIRD; FLASHMARK; FALCONSTRIKE; DULCIMER; REDHARVEST; CONDORSPEAK



NSA in Germany
June 18, 2014
New NSA Revelations: Inside Snowden's Germany File (Der Spiegel)
Spying Together: Germany's Deep Cooperation with the NSA (Der Spiegel)
Related stories:
How the NSA may be using games to encourage digital snooping (Washington Post)
The NSA's big problem, explained by the NSA (The Week)
BND, BfV, and BSI Documents:

- Cooperation between the NSA, BND and BfV in the fight against terrorism
- Preliminary agenda of a meeting between high-ranking NSA and BND officials
- Briefing on the visit to the NSA of a high-ranking BND official
- Final agenda of a meeting between high-ranking NSA and BND officials


- Internal NSA discussion guidelines relating to cooperation with the BND and BfV
- Internal NSA discussion guidelines in preparation for a meeting with high-ranking BND officials
- History and current state of cooperation between the NSA and BND
- Agenda for the visit of BSI Vice President Andreas Könen to the NSA
- Guidelines for the classification of SUSLAG details and the NSA-BND cooperation
NSA/BND Joint SIGINT Activity (JSA):

- Logo of NSA-BND cooperation
- Report on the NSA-BND cooperation known as Joint SIGINT Activity (JSA)
- Report on the surveillance of African countries by JSA
- Restrictions on the technical surveillance performed by JSA
- Report on data exchange between the NSA and BND within the JSA framework
- NSA visit to the BND site in Schöningen and on data transfer from the BND to the NSA
European Security Center(ESC), ESOC, and European Cryptologic Center(ECC):

- Report on the beginnings of the European Security Center (ESC) in the Dagger Complex
- Report on changing name of ESC to European Security Operations Center (ESOC)
- ESOC: Report on the experiences of one NSA worker
- Changing name of ESOC to European Cryptologic Center(ECC) including details on missions
European Technical Center (ETC):

- Report on an unexploded ordnance alarm at the European Technical Center in Wiesbaden
- Report on the technical expansion of the European Technical Center in Wiesbaden
- European Technical Center: Report on the experiences of one NSA
- Report on an NSA SIGDEV training course for allied countries
NSA workers in Germany:
- Nostalgic recollections from NSA workers formerly stationed in Bad Aibling
- One-year anniversary of the NSA liaison unit SUSLAG in the Mangfall Kaserne in Bad Aibling
- NSA/CSS Europe: Report on the experiences of one NSA worker
NSA guidelines and locations:

- Guidelines for the classification of NSA SIGINT details (1945-1967)
- US sites with NSA personnel in Germany

- Slide: Worldwide locations of the Cryptologic Services Groups
- Slide: Worldwide locations of NSA/CSS satellite surveillance

BoundlessInformant Documents: (View all released to date)

- Boundless Informant overview (global)
- Overview of the use of Boundless Informant (world map)
- World map from the Boundless Informant program

- Boundless Informant statistics for so-called Third Parties, which includes Germany
- Boundless Informant statistics on data from "Foreign Partners"

- Zoom of a Boundless Informant document, with project names
- Boundless Informant statistics on Great Britain
- FAQs on the Boundless Informant program (previously published)
- Boundless Informant statistics on Germany (previously published)
PRISM slides: (View all PRISM slides released to date)

XKeyscore-related documents: (View all XKeyscore slides released to date)

- Details on XKeyscore from an internal GCHQ website
- Report on an XKeyscore training session at the ECC / Dagger Complex
- Sharing of XKeyscore with the Federal Office for the Protection of the Constitution (BfV)
TEMPORA-related documents:

Other miscellaneous documents:



- Report on the work of NSA/CSS Europe, including the capture or killing of 40 terror suspects
- NYMROD system for searching for people and places in databases and documents



View full set of above documents in single PDF (source: Cryptome)
Follow-up: German investigation of the cooperation between NSA and BND
XKEYSCORE; ACRIDMINI; LUTEUSICARUS; HEADMOVIES; APERTURESCIENCE; CROSSEYEDSLOTH; KOALAPUNCH; BALLOONKNOT; MAGNUMOPUS; WAXTITAN; WILDCOUGAR; MURPHYSLAW; DARKFIRE; CHOCOLATESHIP; SCREAMINGHARPY; WILDCHOCOBO; WHISTLINGDIXIE; CHAOSOVERLORD; SHAREDTAFFY; POTBED; DARKTHUNDER; JEEPFLEA; SHARPSHADOW; HIGHCASTLE; TROJAN CLASSIC XXI; CADENCE; PINWALE, BLACKPEARL; ROADBED; GODLIKELESION; BOTANICREALTY; LADYLOVE; UNCANNY; SALTYDOGS; TROPICPUMA; GRANDMASTER; WEALTHYCLUSTER; DISHFIRE; JUGGERNAUT; TURMOIL; BLACKNIGHT; CYBERTRANS; PAINTBALL; SYNAPSE; JOURNEYMAN; GOLDENRETRIEVER; SOCIOPATH; TEMPORA; GENESIS; NYMROD; ANCHORY; INTERQUAKE; PANOPLY; MIRROR; DARKQUEST; BIRDWATCHER; WHARPDRIVE



GCHQ: Middle East Spy Hub in Oman
June 3, 2014
VIEW RELATED LEAK: GCHQ: TEMPORA Telecom Partners (BT, Verizon Business, Vodafone Cable, Global Crossing, Level 3, Viatel, Interoute)



NSA Collects Web Images for Facial Recognition Programs
May 31, 2014

Identity Intelligence: Image Is Everything (4 slides)



NSA is Recording all Cell Phone Calls in the Bahamas
May 19, 2014
The NSA Is Recording Every Cell Phone Call in the Bahamas - The Intercept
Documents:

- MYSTIC Reporting in Philippines, Mexico, Kenya, and the Bahamas (Jan-Apr 2012)
- MYSTIC Reporting in Kenya and the Bahamas (Dec '12 - Mar '13)
- MYSTIC Reporting in Mexico, Kenya, and the Bahamas (Feb-Apr 2013)

- SSO memo describing the MYSTIC program
- Definitions from an NSA glossary related to MYSTIC
- 2013 budget justification pertaining to the MYSTIC program

- NSA memo describing unique advantages of the SOMALGET collection systems
- Memo describing the close working relationship between NSA and DEA
- SSO slide revealing plot to ship marijuana to the U.S.
SOMALGET; MYSTIC; VENATOR; EVENINGEASEL; DUSKPALLET; BASECOAT; RANCIDRINSE; PERMANENTPRESS; OILYRAG; LOLLYGAG; ETCHINGSPIN; SCALAWAG; ACIDWASH



No Place to Hide by Glenn Greenwald (official website)
May 13, 2014
Download the complete set of documents contained in the book
New Boundless Informant documents: (click each to enlarge)
View all Boundless Informant documents released to date
View all Xkeyscore documents released to date
View all PRISM documents released to date
Related Stories:
Snowden docs: GCSB links to US spying programmes - New Zealand Herald
Microsoft colluded with FBI to bypass Outlook encryption - The Daily Dot
Book Reveals Wider Net of U.S. Spying on Envoys - New York Times
NSA’s sweeping efforts to ‘Know it All’ - The Washington Post
How the NSA tampers with US-made internet routers - The Guardian
ASPHALT; ARTIFICE; BLARNEY; BOUNDLESSINFORMANT; DANCINGOASIS; FAIRVIEW; HOMINGPIGEON; ICREACH; ORANGECRUSH; PRISM; SHELLTRUMPET; SILVERZEPHYR; SOUTHWINDS; STORMBREW; TARMAC; THIEVINGMAGPIE; WOLFPOINT; WORDGOPHER; XKEYSCORE



GCHQ Sought Unsupervised Access to NSA Data
April 30, 2014
British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools - The Intercept

NSA briefing memo about GCHQ Director Sir Iain Lobban's visit to NSA on April 30, 2013 (4 pages)

NSA SIGDEV slides: Identifier Lead Triage with ECHOBASE (14 slides)
Analysis: The Triage Document
More about GHOSTMACHINE: GHOSTMACHINE: The NSA's cloud analytics platform

PRISM Operations Highlight - Olympics Support - GCHQ Using PRISM Access (1 slide)
ECHOBASE; GHOSTMACHINE; IDENTIFIER SCOREBOARD; SIGINT ANALYTICS; WAVELEGAL



Norway's NIS Acquires Supercomputer for Surveillance Data
April 26, 2014

Excerpts from NSA Information Paper: NSA Intelligence Relationship with Norway (4/17/2013)




Edward Snowden in his statement on The Guardian and The Washington Post winning the Pulitzer Prize for public service (Source)



General Keith Alexander in his interview with The Australian Financial Review on The Guardian and The Washington Post winning the Pulitzer Prize for public service (Source)


Edward Snowden's Testimony at the Parliamentary Assembly of the Council of Europe
April 8, 2014


Intelligence Agencies Using Social Media for Propaganda
April 4, 2014

GCHQ Full-Spectrum Cyber Effects (previously released here and here; Slides #14, #16, #19 are new)

2009 SigDev Conference: "Best Yet and Continuing to Improve' (2 pages)
GCHQ Online Covert Operations
GCHQ JTRIG Unit Uses "Dirty Tricks"
GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger



NSA/GCHQ Targeted World Leaders; Private German Companies
March 29, 2014
GCHQ and NSA Targeted Private German Companies (Der Spiegel)
Der Spiegel: NSA Put Merkel on List of 122 Targeted Leaders (The Intercept)

Leaders listed in NSA Target Knowledge Base; SSO report citing FISA authorization to monitor Germany



NSA Targets Chinese Government and Networking Firm Huawei
March 23, 2014
Additional slides published in Der Spiegel magazine
Additional slides published in Der Spiegel magazine

Related slides appearing in the print edition of Der Spiegel magazine (Source)
March 22, 2014
N.S.A. Breached Chinese Servers Seen as Security Threat (New York Times)

NSA slide from 2010 about Huawei products and notes about the objectives of the SHOTGIANT program



CSEC Attributes Email Spying Program to France
March 21, 2014

CSEC slide presentation from 2011 describing the SNOWGLOBE spyware (7 slides)
Note: The full set of the above slides was released in 2015
Analysis: Canadian SIGINT Summaries
RELATED STORIS:
- French spy software targeted Canada
- Babar: espionage software finally found and put under the microscope (Feb 18, 2015)
- Babar: Suspected Nation State Spyware In The Spotlight (Feb 18, 2015)



How NSA Hacks System Administrators
March 20, 2014

Multiple posts published in 2012 on an internal NSA discussion board (View all 6 pages)
Related Leak: Interview with an NSA Hacker



NSA Can Record All of a Foreign Country's Phone Calls
March 18, 2014

MYSTIC slide; Excerpt from a weekly briefing memo from NSA's Special Source Operations team

Excerpt from the FY13 Congressional Budget Justification for the National Intelligence Program



NSA Malware Plans
March 15, 2014 - Follow-up story responding to NSA's malware denial
NSA Public Affairs Office: Statement in Response to Press Allegations

Excerpt from classified NSA document dated April 2011 explaining how NSA uses QUANTUMHAND to deploy its surveillance implants on target computers
Animation: How the NSA Secretly Masqueraded as Facebook to Hack Computers for Surveillance
March 12, 2014
How the NSA Plans to Infect ‘Millions’ of Computers with Malware - The Intercept
DOCUMENTS:

- Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail
- Five Eyes Hacking Large Routers

- NSA Technology Directorate Analysis of Converged Data
- Selector Types
- There Is More Than One Way to Quantum

NSA Phishing Tactics and Man in the Middle Attacks

Quantum Insert Diagrams (5 slides total)

The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics (11 slides total)

TURBINE and TURMOIL

VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN

Industrial-Scale Exploitation Thousands of Implants

Excerpts from NSA documents related to TURBINE (View larger)
TURBINE; UNITEDRAKE; CAPTIVATEDAUDIENCE; GUMFISH; FOGGYBOTTOM; GROK; SALVAGERABBIT; HAMMERCHANT; HAMMERSTEIN; WILLOWVIXEN; SECONDDATE; FOXACID; VALIDATOR; TURMOIL; TUTELAGE; INSENSER; QUANTUMTHEORY; XKEYSCORE; DEEPDIVE; DRAGGABLEKITTEN; QUANTUMINSERT; QUANTUMBOT; QUANTUMBISCUIT; QUANTUMDNS; QUANTUMHAND; QUANTUMPHANTOM; QUANTUMSKY; QUANTUMCOPPER; QUANTUMSMACKDOWN; QUANTUMMUSH; QUANTUMSPIM; QUANTUMSQUEEL; QUANTUMSQUIRREL; QUANTUMDEFENSE; ISLANDTRANSPORT; SURPLUSHANGER; STRAIGHTBIZARRE; DAREDEVIL; SMOKEYSINK; SARATOGA; TOYGRIPPE; POISON NUT; APEX; KEYCARD; PRESSUREWAVE; FASCIA; FASHIONCLEFT; METROTUBE; CORALREEF; CONVEYANCE; NUCLEON



NSA Third Party Relationships
March 13, 2014

Internal NSA interview with a SIGINT official in NSA’s Foreign Affairs Directorate about third party relationships (View larger)



FISA 'Raw Take' and 'Large Content' Orders
March 11, 2014




Dutch Intelligence Shares Somali Phone Intercepts with NSA
March 8, 2014

NSA Foreign Affairs Division (FAD) Success Stories (Source)



Edward Snowden: Written testimony submitted to the European Parliament on the Electronic Mass Surveillance of EU Citizens


NSA Advice Column: Ask Zelda
March 7, 2014
The NSA Has An Advice Columnist. Seriously. - The Intercept

NSA advice columns: Ask Zelda - Silenced in SID; Interview; Guilty; Bane on NSA



GCHQ Collected Yahoo Webcam Images in Bulk
February 27, 2014

Excerpts from documents related to GCHQ OPTIC NERVE (View larger)



GCHQ: Online Covert Operations
February 24, 2014
How Covert Agents Infiltrate the Internet - The Intercept

GCHQ: The Art of Deception: Training for a New Generation of Online Covert Operations" (50 slides)
Intelligence Agencies Using Social Media for Propaganda
GCHQ JTRIG Unit Uses "Dirty Tricks"
GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger



NSA and GCHQ Spied on WikiLeaks
February 18, 2014

ANTICRISIS GIRL slides from GCHQ's "Psychology - A New Kind of SIGDEV" (View all 44 slides)


Excerpt from Intelligence Community's Manhunting Timeline document showing how the U.S. urged other nations to file criminal charges against Julian Assange (Source)

SIGINT targeting scenarios and compliance (View full document)



ASD Monitored U.S. Law Firm Representing Indonesia in Trade Talks With the United States
February 15, 2014

Excerpt from February 2013 bulletin of SUSLOC, the NSA's liaison with ASD (Source)



Drone Program Identifies Targets Based on NSA Metadata Analysis and Cell Phone Tracking Technology
February 10, 2014
The NSA’s Secret Role in the U.S. Assassination Program - The Intercept

Excerpts from NSA documents (source) - View larger



GCHQ JTRIG Unit Uses "Dirty Tricks"
February 7, 2014

GCHQ slides from JTRIG presentation: Cyber Integration - The Art of the Possible (13 slides)

Full Spectrum Cyber Effects: SIGINT Development as an Enabler for GCHQ's EFFECTS Mission (11 slides) Additional slides here
Intelligence Agencies Using Social Media for Propaganda
GCHQ Online Covert Operations
GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger



GCHQ Targeted Hackers and DDoS'd IRC Chat Rooms
February 4, 2014

GCHQ: Hacktivism: Online Covert Action (14 slides)



CSEC Tracked Canadian Travelers Using Airport Wifi
January 30, 2014

Three slides shown in the CBC News video (View full set of 27 slides)

CBC News Video: Airport Wi-Fi used to track Canadians



NSA Spying at 2009 Climate Summit
January 30, 2014

Document posted on an internal NSA website about NSA monitoring the 2009 Copenhagen Climate Change Conference (2 pages)



GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger
January 27, 2014

Psychology - A New Kind of SIGDEV (42 slides - pages 2-43 of PDF)

Information Operations: The Social Web (5 slides - pages 44-48 of PDF)
Intelligence Agencies Using Social Media for Propaganda
GCHQ Online Covert Operations
GCHQ JTRIG Unit Uses "Dirty Tricks"



NSA and GCHQ Collect Data from Phone Apps
January 27, 2014
Spy Agencies Scour Phone Apps for Personal Data - New York Times

NSA slides: Converged Analysis of Smartphone Devices (14 slides)

GCHQ slides: Mobile Theme Briefing (4 slides)

Two additional slides published by Guardian showing GCHQ capability for Android and iPhone
View a related slide from 2013 about phone spying at the G20 Summit in London
RELATED LEAK: BADASS: Spying on Smart Phone Users
WARRIOR PRIDE; DREAMY SMURF; NOSEY SMURF; TRACKER SMURF; PARANOID SMURF; PORUS



NSA Collects Millions of Text Messages Daily
January 16, 2014

Content Extraction Enhancements for Target Analytics: SMS Text Messages: A Goldmine to Exploit (8 slides)
RELATED VIDEO: Revealed: UK and US spied on text messages of Brits

From Britain's Channel 4 News video: Excerpts from classified GCHQ document dated May 2008



NSA Uses Radio Waves to Compromise Computers Not Connected to the Internet
January 14, 2014

New York Times graphic showing how the NSA uses radio frequencies to penetrate computers. NYT also reported having Snowden documents indicating "that the United States has set up two data centers in China — perhaps through front companies — from which it can insert malware into computers"



Visit My other Sites: