IC OFF THE RECORD:
Direct access to leaked information related to the surveillance activities of the U.S. Intelligence Community and their partners. 2014 INDEX: OTHER YEARS: 2020+ (View all) 2019 (View all) 2018 (View all) 2017 (View all) 2016 (View all) 2015 (View all) 2013 (View all)
EDWARD SNOWDEN: RELATED CONTENT: ANT Product Catalog Black Budget Boundless Informant Petrobras Screenshots PRISM slides XKeyscore About this website
Too much information? Visit the redacted IC ON THE RECORD website instead.
Your NSA dictionary: NSA Files: Decoded Snowden Documents:
PARTNERS: Five Eyes (FVEY) US: NSA UK: GCHQ CA: CSEC AU: ASD NZ: GCSB Nine Eyes (+4) DK: FE FR: DGSE NL: AIVD NO: NIS Fourteen Eyes (+5) BE: GISS DE: BND IT: AISE SP: CNI SE: FRA |
![]() ![]() ![]() Targeted Killings in Afghanistan December 28, 2014 Obama's Lists: A Dubious History of Targeted Killings in Afghanistan DOCUMENTS: ![]() SIDToday: SIGINT Helps Hobble the Taliban by Cutting Off Their Livelihood (4 pages) ![]() Dynamic Target Storyboard - Objective: Doody - Mullah Niaz Muhammed (3 pages) ![]() JPEL Targets (Joint Prioritized Effects List) (36 pages) ![]() SIDToday: To Nab Afghan Nemesis, German Forces Launches Rare Takedown Operation (3 pages) ![]() ![]() ![]() NSA/GCHQ Attacks On Internet Security December 28, 2014 Prying Eyes: Inside the NSA's War on Internet Security ATTACKS AGAINST CRYPTO: ![]() User's Guide for PRISM Skype Collection (9 pages) ![]() GCHQ: BULLRUN CoI Briefing Sheet (4 pages) ![]() GCHQ: BULLRUN (10 slides) ![]() NSA WikiInfo: LONGHAUL (15 pages) ![]() Net Defense From Encrypted Communications (16 pages) ![]() SIGDEV Conference 2012: Technology Trending Challenges and Approaches (40 slides) ![]() NSA WikiInfo: SCARLETFEVER (3 pages) ![]() GCHQ GCWiki: VoIP NSA Alias (5 pages)
CRYPTANALYTICS: ![]() SIDToday: SIGINT Strategy threads about how NSA handles encrypted traffic (3 pages) ![]() PGP intercept (1 page) OTR encrypted chat intercept (2 pages) ![]() Classification Guide for Cryptanalysis (3 pages) ![]() GCHQ: Crypt Ops Data Store User Guide (4 pages) ![]() NSA/GCHQ: Crypt Discovery Joint Collaboration Activity (3 pages) ![]() NSA Cryptographic Modernization (CryptoMod) Classification Guide (4 pages) ![]() National Information Assurance Research Laboratory (NIARL) Newsletter: The Edge (15 pages) ![]() What Your Mother Never Told You About SIGDEV Analysis (87 slides)
DEANONYMIZING: ![]() GCHQ: A Potential Technique to Deanonymise Users of the Tor Network (23 slides) ![]() Applied Research: Tor Hidden Services (26 slides) ![]() Internet Anonymity 2011 (51 slides) ![]() GCHQ GCWiki: Tor Deanonymisation Research (3 pages) ![]() GCHQ: Tor - Overview of Existing Techniques (5 slides) ![]() GCHQ: A Potential Technique to Deanonymise Users of the Tor Network (18 pages)
ATTACKS ON VPN: ![]() WikiInfo: TURMOIL/APEX High Level Description Document (12 pages) ![]() GALLANTWAVE (5 slides) ![]() Intro to the VPN Exploitation Process (43 slides) ![]() Analytic Challenges from Active-Passive Integration (14 slides) ![]() VALIANTSURF (3 slides) ![]() MALIBU and TURMOIL/VALIANTSURF (4 slides) ![]() WikiInfo: POISONNUT (2 pages) WikiInfo: POISONNUT Product (2 pages) ![]() VPN SigDev Basics: OTTERCREEK (30 slides) ![]() GCHQ: An Introduction to FLYING PIG and HUSH PUPPY (19 slides) ![]() SPIN 15 VPN Story (4 pages) ![]() WikiInfo: VPN Transform Engine Emulator (2 pages) WikiInfo: TURMOIL GALLANTWAVE (2 pages) ![]() TURMOIL VPN Processing (20 slides) ![]() WikiInfo: VALIANTSURF (13 pages) ![]() TURMOIL: IPSEC VPN Sessionization (18 pages) ![]() Fielded Capability: End-to-End VPN SPIN 9 Design Review (47 slides)
ATTACKS ON SSL/TLS: ![]() NSA/GCHQ Experiment testing SSL/TLS Decryption - ISLANDTRANSPORT / LONGHAUL (8 pages) ![]() CSEC: TLS Trends - A rounddtable discussion on current usage and future directions (15 slides) ![]() Secure Sockets Layer (SSL) / Transport Layer Security (TLS) (42 slides) ![]() TLS Trends at GCHQ (11 slides) Analysis: Matthew Green: On the new Snowden documents RELATED LEAKS: How NSA Has Compromised Internet Encryption How NSA Targets Tor
PRISM; BULLRUN; LONGHAUL; TURMOIL; BLUESNORT; GALLANTWAVE; TUTELAGE; XKEYSCORE; SCARLETFEVER; SAMESHEET; SPEERMINT; TUNDRA; DISCOROUTE; BLACKPEARL; TOYGRIPPE; DARKSUNRISE;
HOMING TROLL; NEWTONS CRADLE; EPIC FAIL; TRIBAL CARNEM; QUICK ANT; GALLANTWAVE; BLEAKINQUIRY; VULCANDEATHGRIP; VULCANMINDMELD; CORALREEF; MAILORDER; SCISSORS; PINWALE; FOURSCORE; CADENCE; TURTLEPOWER; AGILITY;
HAMMERMILL; BRAVENICKEL; HAMMERCHANT; HAMMERSTONE; HAMMERSTEIN; VALIANTSURF; POINSONNUT; MALIBU; OTTERCREEK; TREASUREMAP; TUNINGFORK; RENOIR; FLYING PIG; HUSH PUPPY; TURBULENCE; PRESSUREWAVE; TUBE; EXOPUMP; KEYCARD;
ISLANDTRANSPORT; OLYMPIA; BROAD OAK
![]() ![]() ![]() Intelligence Data Gathered Prior to Mumbai Attacks December 21, 2014 In 2008 Mumbai Killings, Piles of Spy Data, but an Uncompleted Puzzle (New York Times) In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted Puzzle (ProPublica) Web of Terror (PBS Frontline) ![]() Analysis of intelligence gathered from Mumbai attack plotter Zarrar Shah’s online activities (Source) ![]() ![]() ![]() Operation Socialist: Belgacom Hack December 13, 2014 The Inside Story Of How British Spies Hacked Belgium’s Largest Telco (The Intercept) Read how the British secret service GCHQ attacked Belgacom (NRC Handelsblad) British secret service spied for years on Belgacom customers (De Standaard) DOCUMENTS: ![]() GCHQ – Making Network Sense Of The Encryption Problem - 2011 (11 slides) ![]() GCHQ – Mobile Networks In My NOC World - 2011 (22 slides) ![]() GCHQ – Automated NOC Detection - 2011 (25 slides) ![]() GCHQ – STARGATE CNE Requirements (2 pages) ![]() GCHQ NAC Reviews:
![]() HOPSCOTCH (1 excerpt) ![]() GCHQ Belgacom Connections (1 slide) VIEW RELATED LEAKS: Related stories about the Regin malware found on Belgacom servers:
OPERATION SOCIALIST; NOCTURNAL SURGE; PENTAHO; HACIENDA; MUTANT BROTH; QUANTUM INSERT; LEGSPIN; HOPSCOTCH
![]() ![]() ![]() AURORAGOLD: NSA Hacking Cellphone Networks Worldwide December 4, 2014 Operation AURORAGOLD: How The NSA Hacks Cellphone Networks Worldwide DOCUMENTS:
AURORAGOLD; RAINFALL; OPULENT PUP; WOLFRAMITE ![]() ![]() ![]() British Telco Cable & Wireless Worked With GCHQ November 25, 2014 Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ’s Spying Efforts DOCUMENTS:![]()
![]()
2009 Cable Master List: ![]()
![]() Related: UK spy base GCHQ tapped Irish internet cables Snowden documents show Malta’s internet links tapped by UK GCHQ Analysis: INCENSER, or how NSA and GCHQ are tapping internet cables Submarine Cable Taps Map ![]() Interactive map showing which submarine cables are tapped and where, based on Snowden documents
November 20, 2014 Spy cable revealed: How telecoms firm worked with GCHQ - Channel 4 video New Snowden documents show how Vodafone aided spying mission - Süddeutsche Zeitung Vodafone - the long arm of British intelligence? - WDR video The long arm of the secret service? - NDR VIEW RELATED LEAK: GCHQ: TEMPORA Telecom Partners (BT, Verizon Business, Vodafone Cable, Global Crossing, Level 3, Viatel, Interoute)
GERONTIC; NIGELLA; WINDSTOP; INCENSER; MUSCULAR; TRANSIENT THURIBLE; GRASP; DRUDGE; FAINT; VISAGE; BULLROARER; REMEDY; PFENNING ALPHA
![]() ![]() ![]() GCHQ Spied on UN Climate Negotiations November 1, 2014 Snowden documents reveal British climate espionage – Copenhagen climate summit targeted In Disguise as Climate Negotiators DOCUMENT: Supporting HMG's Climate Change Ambitions (or "A GCO's tales from Cancun) ![]() GCHQ slides: Supporting HMG's Climate Change Ambitions (23 slides) ![]() ![]() ![]() CITIZENFOUR Revelations October 10, 2014 In addition to the documents released below under NSA Core Secrets, the following screenshots from the CITIZENFOUR movie contain new revelations:![]() TUMULT slides from screenshots of CITIZENFOUR (View larger) - source ![]() Screenshots from a 24-slide Powerpoint presentation related to JCE UK Legality (View larger) - source
TUMULT ![]() ![]() ![]() NSA Core Secrets: ECI Programs Including Undercover Agents in China, Germany, and South Korea October 10, 2014 Core Secrets: NSA Saboteurs in China and Germany DOCUMENTS:
![]()
Analysis: NSA's ECI Compartments
ABEYANT; AMBULANT; APERIODIC; AUNTIE; BLACKANT; BLACKCLOUD; BLACKHOLE; BLACKJACK; BLACKTIE; BLACKVULTURE; BLACKWIDOW; BOATMEN; BOXWOOD; BULLET; CELESTIALGLOBE; CHIEFDOM; CHILLY; CLERIC; CLICKUMBER; CONDOR; CONQUERER; CRIMSONREGENT;
CRIMSTONSTEAL; CRUMPET; DECKSTOP; DEVILFISH; DICHOTOMY; DILEMMA; DIXIESPRING; DOMINATE; ENSIGN; ESCAPEE; EVADEYIELD; FALCON; FASTIDIOUS; FIRESCREEN; FIRSTDOWN; FISSURESALUTE; FLEXURE; FLYLEAF; FORBIDDEN;
FORBORNE; FOXHEAT; FREELUNCH; FROTHYTWOPACK; FURTIVERELIANCE; GOLDENCALF; GRAYSCALE; HAWK; HELLFIRE; HISTORY; HYSSOP; INVEIGH; INVENT; KESSELRUN; LIGHTNINGTHIEF; LITTLECROWN; LONGSERPANT; LYSERGIC; MAGICSTROKE; MERCURYTAO; MISCHIEF; MUSICBOX; NITEHAWK; OCELLUS; OPALESCE; OWL; PAINTEDEAGLE; PAWLEYS; PAWNSHOP; PENDLETON; PENDRAGON; PERKYAUTUMN; PHENYLDOUR; PICARESQUE; PICAROON; PIEDMONT;
PITCHFORD; PLACEBO; POMPANO; PRESSURETWIN; RAGTIME; REDHARVEST; REEFPOINT; REFRACTOR; REVELRY; RIVERROAD; RUBIOUS; SAILWINDS; SCABBARD; SILVERCLOUD; SINKGOAL; STAIRWELL; STARCHART; STATEROOM; STEREO; STRESSFUL; SUITESWIVEL; TAXONOMY; TRICKSHOT; VISITOR; WASHBURN; WAXOFF; WHIPGENIE
![]() ![]() ![]() GCSB: New Zealand's Mass Surveillance Project September 15, 2014 New Zealand Launched Mass Surveillance Project While Publicly Denying It SNOWDEN: New Zealand’s Prime Minister Isn't Telling the Truth About Mass Surveillance DOCUMENTS: ![]()
![]() Excerpt from NSA planning document NEW ZEALAND PRIME MINISTER JOHN KEY'S RESPONSE: Key Releases GCSB Documents SPEARGUN; IRONSAND ![]() ![]() ![]() TREASUREMAP: Secret Access to German Satellite Companies September 14, 2014 Treasure Map: The NSA Breach of Telekom and Other German Firms (Der Spiegel) The NSA and GCHQ Campaign Against German Satellite Companies (The Intercept) DOCUMENTS: ![]() NSA TREASUREMAP presentation (38 slides)
![]() Satellite Teleport Knowledge report: Stellar PCS (26 pages)
![]() SIDToday - TREASUREMAP Announces a New Release (4 pages)
Filmmakers Katy Scoggin and Laura Poitras follow reporter Marcel Rosenbach as he informs the staff of a German communications firm that they have been targeted for surveillance by British spies.
TREASUREMAP; PACKAGEDGOODS; BLACKPEARL; LEAKYFAUCET; HYDROCASTLE; MASTERSHAKE; S-TRICKLER; TOYGRIPPE; DISCOROUTE; VITALAIR2; IPGEOTRAP; JOLLYROGER; TUTELAGE; BYZANTINE HADES
![]() ![]() ![]() U.S. Government's Plans to Spy For American Corporations September 5, 2014 The U.S. Government's Secret Plans To Spy For American Corporations DOCUMENT: Quadrennial Intelligence Review Final Report, 2009 ![]() Quadrennial Intelligence Review Final Report - 2009 (32 pages) ![]() ![]() ![]() Turkey: NSA's Partner and Target August 31, 2014 How the NSA Helped Turkey Kill Kurdish Rebels (The Intercept) A Two-Faced Friendship: Turkey Is 'Partner and Target' for the NSA (Der Spiegel) DOCUMENTS: ![]()
![]()
![]()
![]() ![]() ![]() ICREACH: NSA's Secret Surveillance Search Engine August 25, 2014 The Surveillance Engine: How the NSA Built Its Own Secret Google - The Intercept DOCUMENTS: ![]() ICREACH: Sharing Communications Metadata Across the U.S. Intelligence Community (36 slides)
![]()
![]()
ICREACH; CRISSCROSS; PROTON ![]() ![]() ![]() HACIENDA Port Scanning Program Used by Five-Eyes August 15, 2014 NSA/GCHQ: The HACIENDA Program for Internet Colonization DOCUMENTS: (View all slides) ![]() GCHQ presentation describing the HACIENDA system (6 slides) ![]() NSA SIGDEV presentation describing their hacking process (8 slides) ![]() CSEC slides describing the LANDMARK tool (6 slides) ![]() GCHQ slides describing their MUGSHOT tool for compromising Operational Relay Boxes (ORBs) (4 slides) Analysis: The Landmark file: Inside Canadian cyber-security agency’s 'target the world' strategy RELATED LEAK: GCHQ Controls the Internet Using JTRIG Tools HACIENDA, MAILORDER, LANDMARK, MUGSHOT, OLYMPIA, ORB ![]() ![]() ![]() NSA Bot Can Wage Cyberwar Autonomously August 13, 2014 Meet MonsterMind, the NSA Bot That Could Wage Cyberwar Autonomously Related: Wired Interview of Edward Snowden MONSTERMIND ![]() ![]() ![]() NSA Accidentally Caused Syria's 2012 Internet Blackout August 13, 2014 Edward Snowden: The Untold Story - Chapter 5 Related: Snowden: NSA accidentally caused Syria's internet blackout in 2012 ![]() ![]() ![]() GCHQ Covert Mobile Phones Policy August 12, 2014 NPR Is Laundering CIA Talking Points to Make You Scared of NSA Reporting DOCUMENT: GCHQ Covert Mobile Phones Policy ![]() GCHQ Covert Mobile Phones Policy (6 pages) ![]() ![]() ![]() National Counterterrorism Center Reports (NCTC) August 5, 2014 Barack Obama’s Secret Terrorist-Tracking System, by the Numbers - The Intercept ![]() Directorate of Terrorist Identities (DTI) Strategic Accomplishments 2013 (12 pages)
July 23, 2014 The Secret Government Rulebook For Labeling You a Terrorist - The Intercept ![]() National Counterterrorism Center's March 2013 "Watchlisting Guidance (166 pages) ![]() ![]() ![]() U.S. Support for Israel: Cash, Weapons and Surveillance August 4, 2014 Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack DOCUMENTS: ![]() NSA Intelligence Relationship with Israel (3 pages)
![]() Israel-US 1999 Agreement (16 pages)
![]() Receipts for payments in cash to Israel
![]() Excerpt from July 2008 GCHQ document
![]() Excerpt from GCHQ planning document from 2008 ![]() ![]() ![]() NSA's Partnership with Saudi Ministry of Interior July 25, 2014 The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police DOCUMENT: Saudi Arabia Information Paper ![]() NSA Information Paper: NSA Intelligence Relationship with Saudi Arabia (4 pages) ![]() ![]() ![]() SIGINT Authority Decision Tree - Executive Order 12333 July 23, 2014 Privacy watchdog’s next target: the least-known but biggest aspect of NSA surveillance ![]() NSA internal training materials graphic showing the various authorities for SIGINT collection
Related: New Documents Shed Light on One of the NSA's Most Powerful Tools ![]() ![]() ![]() How GCHQ Controls the Internet Using JTRIG Tools July 14, 2014 Hacking Online Polls and Other Ways British Spies Seek to Control the Internet DOCUMENT: JTRIG Tools and Techniques ![]() JTRIG Tools and Techniques (8 pages) Text-searchable transcription 2016 UPDATE: British Spies Used a URL Shortener to Honeypot Arab Spring Dissidents - Motherboard RELATED LEAKS: Intelligence Agencies Using Social Media for Propaganda GCHQ Online Covert Operations GCHQ JTRIG Unit Uses "Dirty Tricks" GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger
DEADPOOL
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() NSA and FBI Targeted Muslim-American Leaders July 9, 2014 Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On - The Intercept DOCUMENTS: ![]() A selection from the FISA Recap spreadsheet showing email addresses listed as monitored (view larger) ![]() Entries from the FISA Recap spreadsheet related to Faisal Gill ![]() Entries from the FISA Recap spreadsheet related to Asim Ghafoor ![]() Entries from the FISA Recap spreadsheet related to Agha Saeed ![]() Entries from the FISA Recap spreadsheet related to Nihad Awad ![]() Entries from the FISA Recap spreadsheet related to Hooshang Amirahmadi ![]() Instructional document on how to properly format internal memos to justify FISA surveillance ![]() NSA document showing that Case Notation codes beginning with the prefix “XX.SQF” are assigned to all “FISA accounts” as a unique identifier Related: Civil Rights Groups Ask Admin to Explain NSA Surveillance of American Muslims
![]() ![]() Ordinary Web Users Are Caught in NSA's Surveillance Net July 5, 2014 In NSA-intercepted data, those not targeted far outnumber the foreigners who are A breakdown of the cache of NSA-intercepted communications DOCUMENT: Target package prepared by the NSA - Muhammad Tahir Shahzad Follow-up story: How 160,000 intercepted communications led to our latest NSA story![]() ![]() Composite image of two of the many private photos NSA collected from online accounts in the U.S. ![]() ![]() ![]() XKeyscore Source Code Targets Tor and TAILS Users July 3, 2014 NSA targets the privacy-conscious Branded by the NSA as an extremist (Original German version) XKeyscore Rules
VIEW RELATED LEAK: How NSA Targets Tor
XKEYSCORE ![]() ![]() ![]() NSA Surveillance Authorized for 193 Countries June 30, 2014 Court gave NSA broad leeway in surveillance, documents show DOCUMENTS: ![]() - NSA document on targeting Five Eyes countries and territories
![]() - DNI, attorney general certify surveillance targets 'reasonably believed' to be outside U.S.
VIEW RELATED LEAK: FISA Documents Governing NSA Surveillance of Americans ![]() ![]() ![]() Danish Partnership with NSA June 19, 2014 Snowden documents reveal Danish partnership with NSA (Information.dk) More countries involved in the NSA's global mass surveillance (Information.dk) NSA 3rd party partners tap Internet backbone in global surveillance program (Information.dk) How Secret Partners Expand NSA’s Surveillance Dragnet (The Intercept) DOCUMENTS: ![]() Keith Alexander's speech notes for Danish DDIS (DENUSA conference) ![]() Excerpt from Black Budget: Foreign Partner Access ![]() Rampart-A Project Overview October 2010 (23 slides) ![]() Special Source Operations slides (6 of 8 slides are new) ![]() Special Source Operations slides (3 additional RAMPART-A slides) Related Analysis: The German operation Eikonal as part of NSA's RAMPART-A program View 2013 leak containing related SSO Slides: NSA Taps Into Google and Yahoo Data Centers RAMPART-A; SMOKYSINK; AZUREPHOENIX; SPINNERET; TRANQUIL; MOONLIGHTPATH; FIREBIRD; FLASHMARK; FALCONSTRIKE; DULCIMER; REDHARVEST; CONDORSPEAK
![]() ![]() ![]() NSA in Germany June 18, 2014 New NSA Revelations: Inside Snowden's Germany File (Der Spiegel) Spying Together: Germany's Deep Cooperation with the NSA (Der Spiegel) The NSA in Germany: Snowden's Documents Available for Download (Der Spiegel) Related stories: How the NSA may be using games to encourage digital snooping (Washington Post) The NSA's big problem, explained by the NSA (The Week) Tell a lie, remove the gear: How the NSA covers up when cable taps are found (Ars Technica) BND, BfV, and BSI Documents: ![]()
![]() ![]()
NSA/BND Joint SIGINT Activity (JSA): ![]()
European Security Center(ESC), ESOC, and European Cryptologic Center(ECC): ![]()
European Technical Center (ETC): ![]()
NSA workers in Germany: ![]()
NSA guidelines and locations: ![]()
![]()
![]() BoundlessInformant Documents: (View all released to date) ![]()
![]()
![]()
PRISM slides: (View all PRISM slides released to date) ![]() XKeyscore-related documents: (View all XKeyscore slides released to date) ![]()
TEMPORA-related documents: ![]() Other miscellaneous documents: ![]() ![]() ![]()
![]() ![]() ![]() View full set of above documents in single PDF (source: Cryptome) Follow-up: German investigation of the cooperation between NSA and BND
XKEYSCORE; ACRIDMINI; LUTEUSICARUS; HEADMOVIES; APERTURESCIENCE; CROSSEYEDSLOTH; KOALAPUNCH; BALLOONKNOT; MAGNUMOPUS; WAXTITAN; WILDCOUGAR; MURPHYSLAW; DARKFIRE;
CHOCOLATESHIP; SCREAMINGHARPY; WILDCHOCOBO; WHISTLINGDIXIE; CHAOSOVERLORD; SHAREDTAFFY; POTBED; DARKTHUNDER; JEEPFLEA; SHARPSHADOW; HIGHCASTLE; TROJAN CLASSIC XXI;
CADENCE; PINWALE, BLACKPEARL; ROADBED; GODLIKELESION; BOTANICREALTY; LADYLOVE; UNCANNY; SALTYDOGS; TROPICPUMA; GRANDMASTER; WEALTHYCLUSTER; DISHFIRE; JUGGERNAUT;
TURMOIL; BLACKNIGHT; CYBERTRANS; PAINTBALL; SYNAPSE; JOURNEYMAN; GOLDENRETRIEVER; SOCIOPATH; TEMPORA; GENESIS; NYMROD; ANCHORY; INTERQUAKE; PANOPLY; MIRROR; DARKQUEST; BIRDWATCHER;
WHARPDRIVE
![]() ![]() ![]() GCHQ: Middle East Spy Hub in Oman June 3, 2014 REVEALED: GCHQ's BEYOND TOP SECRET Middle Eastern INTERNET SPY BASE VIEW RELATED LEAK: GCHQ: TEMPORA Telecom Partners (BT, Verizon Business, Vodafone Cable, Global Crossing, Level 3, Viatel, Interoute) CIRCUIT; TIMPANI; GUITAR; CLARINET; REMEDY; GERONTIC ![]() ![]() ![]() NSA Collects Web Images for Facial Recognition Programs May 31, 2014 N.S.A. Collecting Millions of Faces From Web Images DOCUMENT: Identity Intelligence: Image is Everything ![]() Identity Intelligence: Image Is Everything (4 slides) View the Identity Intelligence slide #4 full-size TUNDRAFREEZE; WELLSPRING; PISCES; PINWALE ![]() ![]() ![]() NSA is Recording all Cell Phone Calls in the Bahamas May 19, 2014 The NSA Is Recording Every Cell Phone Call in the Bahamas - The Intercept Documents: ![]() - MYSTIC Reporting in Philippines, Mexico, Kenya, and the Bahamas (Jan-Apr 2012) - MYSTIC Reporting in Kenya and the Bahamas (Dec '12 - Mar '13) - MYSTIC Reporting in Mexico, Kenya, and the Bahamas (Feb-Apr 2013)
![]() - SSO memo describing the MYSTIC program - Definitions from an NSA glossary related to MYSTIC - 2013 budget justification pertaining to the MYSTIC program
![]() - NSA memo describing unique advantages of the SOMALGET collection systems - Memo describing the close working relationship between NSA and DEA - SSO slide revealing plot to ship marijuana to the U.S.
Analysis: Toward the identity of “Country X” in MYSTIC Related: WikiLeaks statement on the mass recording of Afghan telephone calls by the NSA VIEW RELATED LEAK: NSA Can Record All of a Foreign Country's Phone Calls
SOMALGET; MYSTIC; VENATOR; EVENINGEASEL; DUSKPALLET; BASECOAT; RANCIDRINSE; PERMANENTPRESS; OILYRAG; LOLLYGAG; ETCHINGSPIN; SCALAWAG; ACIDWASH
![]() ![]() ![]() No Place to Hide by Glenn Greenwald (official website) May 13, 2014 Download the complete set of documents contained in the book New Boundless Informant documents: (click each to enlarge) View all Boundless Informant documents released to date New XKEYSCORE documents: (click each to enlarge) View all Xkeyscore documents released to date New PRISM slides and related documents: (click each to enlarge) View all PRISM documents released to date SSO slides and documents: (click each to enlarge) Collect it all: (click each to enlarge) Spying: (click each to enlarge) Partners: (click each to enlarge) GCHQ Global Telecommunications Exploitation (GTE) presentation to 2011 Five Eyes conference: (click each to enlarge) Other new documents published: (click each to enlarge)
Analysis: NSA's largest cable tapping program: DANCINGOASIS
Related Stories: Snowden docs: GCSB links to US spying programmes - New Zealand Herald Canada actively spies for NSA, Glenn Greenwald claims in new book - Toronto Star Australia asked Americans for more help to spy on Australian citizens - The Guardian NSA Docs Detail Efforts To Collect Data From Microsoft’s Skype, SkyDrive, Outlook - TechCrunch Microsoft colluded with FBI to bypass Outlook encryption - The Daily Dot Book Reveals Wider Net of U.S. Spying on Envoys - New York Times NSA’s sweeping efforts to ‘Know it All’ - The Washington Post From M.L. King to Anonymous, the state targets dissenters not just "bad guys" - The Guardian How the NSA tampers with US-made internet routers - The Guardian NSA and GCHQ seek ways of monitoring airplane passenger communication - NY Daily News
ASPHALT; ARTIFICE; BLARNEY; BOUNDLESSINFORMANT; DANCINGOASIS; FAIRVIEW; HOMINGPIGEON; ICREACH; ORANGECRUSH; PRISM; SHELLTRUMPET; SILVERZEPHYR; SOUTHWINDS; STORMBREW; TARMAC; THIEVINGMAGPIE; WOLFPOINT; WORDGOPHER; XKEYSCORE
![]() ![]() ![]() NSA Targets Revealed: ICTP, Honduran Resort, Telecoms & More May 8, 2014 Revelations about NSA's underwater cable spying Related: NSA spied on research center in Trieste but the silence of the government continues ![]() ![]() ![]() GCHQ Sought Unsupervised Access to NSA Data April 30, 2014 British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools - The Intercept DOCUMENT: Lobban NSA Visit Précis DOCUMENT: GHOSTMACHINE: Identifier Lead Triage with ECHOBASE DOCUMENT: PRISM Olympic Option ![]() NSA briefing memo about GCHQ Director Sir Iain Lobban's visit to NSA on April 30, 2013 (4 pages)
![]() NSA SIGDEV slides: Identifier Lead Triage with ECHOBASE (14 slides) Analysis: The Triage Document More about GHOSTMACHINE: GHOSTMACHINE: The NSA's cloud analytics platform ![]() PRISM Operations Highlight - Olympics Support - GCHQ Using PRISM Access (1 slide)
ECHOBASE; GHOSTMACHINE; IDENTIFIER SCOREBOARD; SIGINT ANALYTICS; WAVELEGAL
![]() ![]() ![]() Norway's NIS Acquires Supercomputer for Surveillance Data April 26, 2014 ![]() Excerpts from NSA Information Paper: NSA Intelligence Relationship with Norway (4/17/2013) VIEW RELATED LEAK: NIS: Norway Spying for NSA STEELWINTER; WINDSORBLUE ![]() ![]() ![]() ![]() Edward Snowden in his statement on The Guardian and The Washington Post winning the Pulitzer Prize for public service (Source) ![]() ![]() ![]() General Keith Alexander in his interview with The Australian Financial Review on The Guardian and The Washington Post winning the Pulitzer Prize for public service (Source) ![]() ![]() Edward Snowden's Testimony at the Parliamentary Assembly of the Council of Europe April 8, 2014 Edward Snowden testifies by video-link at hearing on ‘mass surveillance’ Transcript of Snowden's testimony to Council of Europe
More: Edward Snowden - Interviews, Statements, and Appearances
![]() ![]() Intelligence Agencies Using Social Media for Propaganda April 4, 2014 The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket DOCUMENT: Full-Spectrum Cyber Effects DOCUMENT: 2009 SigDev Conference: "Best Yet and Continuing to Improve' ![]() GCHQ Full-Spectrum Cyber Effects (previously released here and here; Slides #14, #16, #19 are new) ![]() 2009 SigDev Conference: "Best Yet and Continuing to Improve' (2 pages) RELATED LEAKS: GCHQ Controls the Internet Using JTRIG Tools GCHQ Online Covert Operations GCHQ JTRIG Unit Uses "Dirty Tricks" GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger ![]() ![]() ![]() NSA/GCHQ Targeted World Leaders; Private German Companies March 29, 2014 GCHQ and NSA Targeted Private German Companies (Der Spiegel) Der Spiegel: NSA Put Merkel on List of 122 Targeted Leaders (The Intercept) ![]() Leaders listed in NSA Target Knowledge Base; SSO report citing FISA authorization to monitor Germany RELATED: Additional names of world leaders listed in the NSA Target Knowledge Base NYMROD ![]() ![]() ![]() NSA Targets Chinese Government and Networking Firm Huawei March 23, 2014 ![]() Related slides appearing in the print edition of Der Spiegel magazine (Source)
March 22, 2014 N.S.A. Breached Chinese Servers Seen as Security Threat (New York Times) Targeting Huawei: NSA Spied on Chinese Government and Networking Firm (Der Spiegel) DOCUMENT: Slides Describe Mission Involving Huawei ![]() NSA slide from 2010 about Huawei products and notes about the objectives of the SHOTGIANT program
Analysis: We may have witnessed a NSA "Shotgiant" TAO-like action RELATED: ANT Products for Huawei: HALLUXWATER; HEADWATER (Source) SHOTGIANT ![]() ![]() ![]() CSEC Attributes Email Spying Program to France March 21, 2014 France suspected of cyber espionage (English translation) When Canadians go hunting for "Babar" (English translation) DOCUMENT: SNOWGLOBE: From Discovery to Attribution ![]() CSEC slide presentation from 2011 describing the SNOWGLOBE spyware (7 slides) Note: The full set of the above slides was released in 2015
Analysis: Canadian SIGINT Summaries RELATED STORIS:
SNOWGLOBE; BABAR ![]() ![]() ![]() How NSA Hacks System Administrators March 20, 2014 Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators - The Intercept ![]() Multiple posts published in 2012 on an internal NSA discussion board (View all 6 pages)
Related Leak: Interview with an NSA Hacker ![]() ![]() ![]() Orange (France Telecom) Shares Data With France's DGSE March 20, 2014 Spying: How Orange and intelligence services cooperate (English translation) ![]() ![]() ![]() NSA Can Record All of a Foreign Country's Phone Calls March 18, 2014 NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls DOCUMENT: NSA symbolizes data-collection program with wizard DOCUMENT: Description of data collection by NSA under MYSTIC DOCUMENT: Adding a country to MYSTIC efforts mentioned ![]() MYSTIC slide; Excerpt from a weekly briefing memo from NSA's Special Source Operations team
![]() Excerpt from the FY13 Congressional Budget Justification for the National Intelligence Program MYSTIC; RETRO; SCALAWAG; DOUBLEARROW; NUCLEON ![]() ![]() ![]() NSA Malware Plans March 15, 2014 - Follow-up story responding to NSA's malware denial Compare the NSA’s Facebook Malware Denial to its Own Secret Documents - The Intercept NSA Public Affairs Office: Statement in Response to Press Allegations ![]() Excerpt from classified NSA document dated April 2011 explaining how NSA uses QUANTUMHAND to deploy its surveillance implants on target computers
Animation: How the NSA Secretly Masqueraded as Facebook to Hack Computers for Surveillance
March 12, 2014 How the NSA Plans to Infect ‘Millions’ of Computers with Malware - The Intercept DOCUMENTS: ![]() - Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail - Five Eyes Hacking Large Routers
![]() - NSA Technology Directorate Analysis of Converged Data - Selector Types - There Is More Than One Way to Quantum
![]() NSA Phishing Tactics and Man in the Middle Attacks
![]() Quantum Insert Diagrams (5 slides total)
![]() The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics (11 slides total)
![]() TURBINE and TURMOIL
![]() VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN
![]() Industrial-Scale Exploitation Thousands of Implants
![]() Excerpts from NSA documents related to TURBINE (View larger)
Analysis: Unraveling NSA's TURBULENCE Programs
TURBINE; UNITEDRAKE; CAPTIVATEDAUDIENCE; GUMFISH; FOGGYBOTTOM; GROK; SALVAGERABBIT; HAMMERCHANT; HAMMERSTEIN; WILLOWVIXEN; SECONDDATE; FOXACID; VALIDATOR; TURMOIL; TUTELAGE;
INSENSER; QUANTUMTHEORY; XKEYSCORE; DEEPDIVE; DRAGGABLEKITTEN; QUANTUMINSERT; QUANTUMBOT; QUANTUMBISCUIT; QUANTUMDNS; QUANTUMHAND; QUANTUMPHANTOM; QUANTUMSKY; QUANTUMCOPPER; QUANTUMSMACKDOWN;
QUANTUMMUSH; QUANTUMSPIM; QUANTUMSQUEEL; QUANTUMSQUIRREL; QUANTUMDEFENSE; ISLANDTRANSPORT; SURPLUSHANGER; STRAIGHTBIZARRE; DAREDEVIL; SMOKEYSINK; SARATOGA; TOYGRIPPE; POISON NUT; APEX;
KEYCARD; PRESSUREWAVE; FASCIA; FASHIONCLEFT; METROTUBE; CORALREEF; CONVEYANCE; NUCLEON
![]() ![]() ![]() NSA Third Party Relationships March 13, 2014 Foreign Officials In the Dark About Their Own Spy Agencies’ Cooperation with NSA - The Intercept DOCUMENT: Third Party Relationships ![]() Internal NSA interview with a SIGINT official in NSA’s Foreign Affairs Directorate about third party relationships (View larger) ![]() ![]() ![]() FISA 'Raw Take' and 'Large Content' Orders March 11, 2014 How a Court Secretly Evolved, Extending U.S. Spies’ Reach DOCUMENT: NSA Timeline of Surveillance Law Developments DOCUMENT: Classification Guide for Stellarwind Program DOCUMENT: Ashcroft Memo on Intelligence Sharing Procedures DOCUMENT: Classification Guide for FISA, Protect America Act and the FISA Amendments Act DOCUMENT: NSA Memo Expands Access to FISA Information ![]() VIEW RELATED LEAK: NSA Bulk Collection of U.S. Email and Internet Data STELLARWIND ![]() ![]() ![]() Dutch Intelligence Shares Somali Phone Intercepts with NSA March 8, 2014 The secret role of the Dutch in the American war on terror ![]() NSA Foreign Affairs Division (FAD) Success Stories (Source) ![]() ![]() ![]() Edward Snowden: Written testimony submitted to the European Parliament on the Electronic Mass Surveillance of EU Citizens
More: Edward Snowden - Interviews, Statements, and Appearances
![]() ![]() NSA Advice Column: Ask Zelda March 7, 2014 The NSA Has An Advice Columnist. Seriously. - The Intercept DOCUMENT: An Interview with Zelda DOCUMENT: Guilty Until Proven Innocent DOCUMENT: Is Bain De Soleil a Bane on NSA? ![]() NSA advice columns: Ask Zelda - Silenced in SID; Interview; Guilty; Bane on NSA ![]() ![]() ![]() GCHQ Collected Yahoo Webcam Images in Bulk February 27, 2014 Yahoo webcam images from millions of users intercepted by GCHQ ![]() Excerpts from documents related to GCHQ OPTIC NERVE (View larger) OPTIC NERVE ![]() ![]() ![]() GCHQ: Online Covert Operations February 24, 2014 How Covert Agents Infiltrate the Internet - The Intercept DOCUMENT: The Art of Deception: Training for Online Covert Operations ![]() GCHQ: The Art of Deception: Training for a New Generation of Online Covert Operations" (50 slides) RELATED LEAKS: GCHQ Controls the Internet Using JTRIG Tools Intelligence Agencies Using Social Media for Propaganda GCHQ JTRIG Unit Uses "Dirty Tricks" GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger ![]() ![]() ![]() NSA and GCHQ Spied on WikiLeaks February 18, 2014 Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters - The Intercept DOCUMENT: Psychology - A New Kind of SIGDEV DOCUMENT: Discovery SIGINT Targeting Scenarios and Compliance ![]() ANTICRISIS GIRL slides from GCHQ's "Psychology - A New Kind of SIGDEV" (View all 44 slides)
![]() ![]() Excerpt from Intelligence Community's Manhunting Timeline document showing how the U.S. urged other nations to file criminal charges against Julian Assange (Source)
![]() SIGINT targeting scenarios and compliance (View full document) WikiLeaks Response: NSA and GCHQ spying on WikiLeaks ANTICRISIS GIRL ![]() ![]() ![]() ASD Monitored U.S. Law Firm Representing Indonesia in Trade Talks With the United States February 15, 2014 Spying by N.S.A. Ally Entangled U.S. Law Firm DOCUMENT: SUSLOC Facilitates Sensitive DSD Reporting on Trade Talks ![]() Excerpt from February 2013 bulletin of SUSLOC, the NSA's liaison with ASD (Source) ![]() ![]() ![]() Drone Program Identifies Targets Based on NSA Metadata Analysis and Cell Phone Tracking Technology February 10, 2014 The NSA’s Secret Role in the U.S. Assassination Program - The Intercept ![]() Excerpts from NSA documents (source) - View larger VIEW RELATED LEAK: NSA's Role in the CIA's Drone Program (October 2013) GEO CELL; GILGAMESH; SHENANIGANS; VICTORYDANCE; DISTANTFOCUS ![]() ![]() ![]() GCHQ JTRIG Unit Uses "Dirty Tricks" February 7, 2014 Snowden Docs: British Spies Used Sex and 'Dirty Tricks' DOCUMENT: Cyber Integration: The Art of the Possible DOCUMENT: Full Spectrum Cyber Effects: SIGINT Development as an Enabler for GCHQ's EFFECTS Mission ![]() GCHQ slides from JTRIG presentation: Cyber Integration - The Art of the Possible (13 slides)
![]() Full Spectrum Cyber Effects: SIGINT Development as an Enabler for GCHQ's EFFECTS Mission (11 slides) Additional slides here RELATED LEAKS: GCHQ Controls the Internet Using JTRIG Tools Intelligence Agencies Using Social Media for Propaganda GCHQ Online Covert Operations GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger EFFECTS; AMBASSADORS RECEPTION; ROYAL CONCIERGE ![]() ![]() ![]() GCHQ Targeted Hackers and DDoS'd IRC Chat Rooms February 4, 2014 War on Anonymous: British Spies Attacked Hackers, Snowden Docs Show DOCUMENT: Hacktivism: Online Covert Action ![]() GCHQ: Hacktivism: Online Covert Action (14 slides) ROLLING THUNDER ![]() ![]() ![]() CSEC Tracked Canadian Travelers Using Airport Wifi January 30, 2014 CSEC used airport Wi-Fi to track Canadian travelers: Edward Snowden documents DOCUMENT: CSEC: IP Profiling Analytics & Mission Impacts ![]() Three slides shown in the CBC News video (View full set of 27 slides)
![]() CBC News Video: Airport Wi-Fi used to track Canadians
Analysis: Did CSEC really track Canadian airport travelers? ![]() ![]() ![]() NSA Spying at 2009 Climate Summit January 30, 2014 NSA spied against UN climate negotiations Snowden Docs: U.S. Spied On Negotiators At 2009 Climate Summit DOCUMENT: UN Climate Change Conference in Copenhagen ![]() Document posted on an internal NSA website about NSA monitoring the 2009 Copenhagen Climate Change Conference (2 pages) ![]() ![]() ![]() GCHQ: Monitoring YouTube, Facebook, Twitter, Blogger January 27, 2014 Snowden docs reveal British spies snooped on YouTube and Facebook DOCUMENT: Psychology - A New Kind of SIGDEV (GCHQ) ![]() Psychology - A New Kind of SIGDEV (42 slides - pages 2-43 of PDF)
![]() Information Operations: The Social Web (5 slides - pages 44-48 of PDF) RELATED LEAKS: GCHQ Controls the Internet Using JTRIG Tools Intelligence Agencies Using Social Media for Propaganda GCHQ Online Covert Operations GCHQ JTRIG Unit Uses "Dirty Tricks"
Analysis: Videos in the GCHQ SQUEAKYDOLPHIN Presentation SQUEAKY DOLPHIN ![]() ![]() ![]() NSA and GCHQ Collect Data from Phone Apps January 27, 2014 NSA and GCHQ target 'leaky' phone apps like Angry Birds to scoop user data - Guardian Spy Agencies Scour Phone Apps for Personal Data - New York Times Spy Agencies Probe Angry Birds and Other Apps for Personal Data - ProPublica DOCUMENT: Converged Analysis of Smartphone Devices, NSA, May 2010 DOCUMENT: Mobile Theme Briefing, GCHQ, May 2010 ![]() NSA slides: Converged Analysis of Smartphone Devices (14 slides)
![]() GCHQ slides: Mobile Theme Briefing (4 slides)
![]() Two additional slides published by Guardian showing GCHQ capability for Android and iPhone View a related slide from 2013 about phone spying at the G20 Summit in London RELATED LEAK: BADASS: Spying on Smart Phone Users
WARRIOR PRIDE; DREAMY SMURF; NOSEY SMURF; TRACKER SMURF; PARANOID SMURF; PORUS
![]() ![]() ![]() NSA Collects Millions of Text Messages Daily January 16, 2014 NSA collects millions of text messages daily in 'untargeted' global sweep DOCUMENT: NSA Dishfire presentation on text message collection ![]() Content Extraction Enhancements for Target Analytics: SMS Text Messages: A Goldmine to Exploit (8 slides)
RELATED VIDEO: Revealed: UK and US spied on text messages of Brits ![]() From Britain's Channel 4 News video: Excerpts from classified GCHQ document dated May 2008 DISHFIRE; PREFER; SPYDER; SEDB; FASTCOPE; MILKBONE ![]() ![]() ![]() NSA Uses Radio Waves to Compromise Computers Not Connected to the Internet January 14, 2014 NSA Devises Radio Pathway Into Computers ![]() New York Times graphic showing how the NSA uses radio frequencies to penetrate computers. NYT also reported having Snowden documents indicating "that the United States has set up two data centers in China — perhaps through front companies — from which it can insert malware into computers" VIEW RELATED LEAK: The NSA Toolbox: ANT Product Catalog QUANTUM ![]() ![]() ![]() NSA Quantum Computing Research January 2, 2014 NSA seeks to build quantum computer that could crack most types of encryption DOCUMENT: Penetrating Hard Targets - Project Description DOCUMENT: Classification Guide for NSA/CSS Quantum Computing Research ![]() Penetrating Hard Targets: from Black Budget, Volume 2, "Combined Cryptologic Program" (3 pages) ![]() Classification Guide for NSA/CSS Quantum Computing Research (10 pages) ![]() ![]() |