Levitation and the FFU Hypothesis
OLYMPIA
This document is a presentation prepared by CSEC. It describes the LEVITATION program, an effort to monitor file sharing sites in order to locate extremist training and propoganda materials. This program is capable of monitoring 10-15 million interactions with file sharing sites such as Megaupload, Rapidshare and Sendspace.<br> Christopher Parsons has written a more detailed analysis of this document. It is available <a href="https://www.christopher-parsons.com/writings/cse-summaries/#levitation-and" target="_blank">here</a>.
Communications Security Establishment Canada
20150128-intercept-cse_presentation_on_the_levitation_project.pdf
CBC
Snowden
PDF
en
HASH6aa16765feb336ae1c0edd
Introduction to BADDECISION
Man in the Middle
This document is a slide deck used during a "Close Access" NSA training course to introduce students to computer network exploitation (CNE) tool, BADDECISION.
National Security Agency - Close Access
07-Introduction-to-BADDECISION-Redacted.pdf
The Intercept
Snowden
PDF
en
HASH011af20d2ab587aa102568b6
Capability - iPhone
Address books
This document is an extract from an internal GCHQ presentation. It describes the existing tools used by GCHQ to intercept communications from iPhones. Programs include: WARRIOR PRIDE, DREAMY SMURF, NOSEY SMURF. TRACKER SMURF, PORUS and PARANOID SMURF.
Government Communications Headquarters (GCHQ)
20150310-Intercept-Smurf Capability Iphone.pdf
The Intercept
Snowden
PDF
en
HASH011a8754d53e35fd6816d215
CHALKFUN Foreignness Determination
TAPERLAY
This document is an excerpt from an NSA training tool explaining how to determine whether a targeted device is being used outside the United States. It illustrates a hypothetical example involving a query to CHALKFUN, the tool used to search FASCIA, the NSA's database of device-location information.
National Security Agency
20131204-wapo-chalkfun_foreignness.pdf
The Washington Post
Snowden
PDF
en
HASH011a5b6b742fca9a9344b547
Op MULLENIZE and beyond - Staining Machines
IP Addresses
This document is an internal memo created by GCHQ describing Operation MULLENIZE, an attempt to distinguish othewise anonymous internet users. The agency uses "User Agent Staining" to change the way in which the user's web browser identifies itself on the web. It is used to unmask TOR users, as well as devices on networks in which many share the same IP address, such as Internet Cafes.
Government Communications Headquarters (GCHQ)
20131004-wapo-gchq_mullenize.pdf
The Washington Post
Snowden
PDF
en
HASH011a4d02e0ffd18f7435c339
Watchlisting Guidance
Executive Order 12333
This document is a report created by the National Counterterrorism Center. It describes the procedures in place allowing intelligence agencies to place individuals suspected of terrorism related offenses onto government watch-lists.
National Counterterrorism Center (NCTC)
20140723-Intercept-March-2013-Watchlisting-Guidance.pdf
The Intercept
Snowden
PDF
en
HASH011a00c3648a36babf4908
NSA Intelligence Relationship with Sweden
Counterintelligence - Russia
This document is a NSA report describing the nature of the NSA's surveillance relationship with Sweden's National Defence Radio Establishment (FRA). It is largely focused upon the FRA's collaboration in SIGINT against "high-priority Russian targets."
National Security Agency
20131205-svt-fra_russia.pdf
SVT
Snowden
PDF
en
HASH011a80e79b754c6f06f0e4d7
The SIGINT Philosopher: Unlike all of My Terribe Teammates, I am a Wonderful Teammate
NSA performance review
This article, from the internal NSA newsletter, SIDtoday, is one in a series written by the "SIGINT philosopher." This article discusses the performance and peer review system among NSA analysts.
National Security Agency - SIGINT Development
20150811-intercept-sigint-philosopher-unlike-all-my-terrible.pdf
The Intercept
Snowden
PDF
en
HASH011abb42ea02ccea5509d443
Counterterrorism (CT) Relationship with the German Federal Intelligence Service (BND) anf the German Federal Office for the Protection of the Constitution (BfV)
SIGINT - Signals intelligence
This document is a briefing sheet describing elements of the intelligence relationship between the National Security Agency and the German Federal Intelligence Service (BND) and the German Federal Office for the Protection of the Constitution (BfV). It highlights potential problems between the NSA and the German agencies, key talking points, and access given to NSA tools and services such as XKEYSCORE.
National Security Agency
20140618-DerSpiegel-internal_nsa_discussion_guidelines_relating_to_cooperation_with_the_bnd_and_bfv.pdf
Der Spiegel
Snowden
PDF
en
HASH011a61a7344c73c4be4450d8
Tracking Targets on Online Social Networks
SIGINT - Signals Intelligence
This document is an internal NSA presentation. It outlines the procedures for retrieving intelligence located in NSA repositories harvested from from online social networks using the NSA's data analysis tool, XKEYSCORE.
National Security Agency
20150701-intercept-tracking_targets_on_online_social_networks.pdf
The Intercept
Snowden
PDF
en
HASH011aff0d063c6d63c7e28e42