NSA Leak Dokumente Liste

Aus Piratenwiki
Wechseln zu: Navigation, Suche

inlineTabelle Links (1 - 100)

Nr Datum DocDatum Org Doc Titel Inhalt ACLU EFF FreeSnoden Cryptome Seite Typ
100 2013-12-11 - NSA Sweden FRA Quantum Accomplishments - - Accomplishments from NSA Select Accomplishments: Production NSA Sweden FRA Quantum Accomplishments 2 pdf
99 2013-12-10 - - - - - - - G8-G20 Spying (Duplikat von Nr.86) 4 pdf
98 2013-12-10 2006-09-20 - GSM Classification Guide Internal NSA document outlining the agency 'sability to intercept, process and discern location data from mobilephone calls. GMS Classification Guide GSM Classification Guide GSM Classification Guide GSM Tracking 2 pdf
97 2013-12-10 2012-10-01 NSA Summary of DNR and DNI Co-Travel Analytics Study overviewing key elements of the co-traveler analytics both under development and operational at NSA. Cotraveler Overview Cotraveler Overview Summary of DNR and DNI Co-Travel Analytics GSM classification guide Co-Traveler 24 pdf
96 2013-12-10 - NSA GhostMachine Excerpts from slides describing the NSA's Special Source Operations cloud analytics platform, code-named GHOSTMACHINE. Ghost Machine GhostMachine SSO GHOSTMACHINE Analytics GHOSTMACHINE 4 pdf
95 2013-12-10 - NSA Target Location An excerpt from a transcript of National Security Agency training videos that describe how to verify the location of a targeted device. Target Location Target Location - Target Location 1 pdf
94 2013-12-10 2013-04-03 - NSA CSEC Partnership Information paper from the NSA detailing the NSA's intelligence relationship with Canada's Communications Security Establishment Canada (CSEC). NSA CSEC Partnership NSA CSEC Partnership - - 2 pdf
93 2013-12-10 2013-04 NSA Location Cookies NSA internal presentation slides detailing signal surveillance techniques and successes. Location Cookies Location Cookies - - 4 pdf
92 2013-12-09 2008 GCHQ Video Games Paper NSA paper entitled "Games: A look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities," stressing the risk of leaving games communities under-monitored. NSA Video Games Paper NSA Video Games Paper MHS and GCHQ “Get in the Game with Target Development for World of Warcraft Online Gaming”
Games: a look at Emerging Trends, Uses, Threats and Opportunities in Influence Activities
Spying on Games 82 pdf
91 2013-12-09 - NSA Spying on Games - - - Exploiting Terrorist Use of Games & Virtual Environments Spying on Games 2 pdf
90 2013-12-05 2013-04-18 NSA Spionage-Beziehungen zu Schweden Excerpts from a document related to Swedish-American surveillance of Russia FRA Russia FRARussia Spionage-Beziehungen der NSA in Schweden Sweden Spied Russia for NSA 2 pdf
89 2013-12-05 2010-09-10 NSA NSA Italy Spying Excerpts from slides describing spying against the Italian Embassy in Washington DC. Italy Spying Italy Spying Italy – last 30 days
SCS Operations in Italy
Close Access Sigads
NSA Spies Italy [3 S.] 4 htm
pdf
88 2013-12-04 - NSA CHALKFUN Excerpt from NSA Agency training manual explaining how to determine if a targeted device is "foreign". Chalkfun Foreignness Chalkfun Foreignness CHALKFUN and TAPERLAY CHALKFUN 1 pdf
87 2013-12-04 - NSA FASCIA NSA slides about the FASCIA program, including the volume and type of device-location data collected by the agency. FASCIA Slides Fascia FASCIA FASCIA 2 pdf
86 2013-12-02 2010-06-23 - Spying G8 & G20 Meeting Canada Briefing notes on NSA operational plans to conduct surveillance during the 2010 G8 and G20 summits in Canada. NSA Lends Support to Upcoming G8 and G20 Summits in Canada G20 Summit [4 S.] NSA lends support to upcoming G8 and G20 meetings in Canada G8 - G20 Spying [3 S.] 4 pdf
85 2013-12-02 - CSEC - - - DSD Data - - 4 pdf
84 2013-11-30 - NSA Dutch SIGINT AIVD SIGINT - AIVD SIGINT Notes for Dutch SIGINT/Cyber Analytic Exchange Dutch SIGINT 3 pdf
83 2013-11-30 2013-11-30 CSEC CSEC Brazil Spying Presentation by Communications Security Establishment Canada on surveillance of Brazil's Ministry of Mines and Energy. CSEC Presentation CSEC Brazil CSEC – Advanced Network Tradecraft CSEC Brazil Spying 18 htm
pdf
82 2013-11-26 - - Evidence of Microsoft's vulnerability Slides describing collection of data from Internetproviders. Address Books/Serendipity/HTTP-Demux - apps.washingtonpost.com - - - 3 htm
81 2013-11-26 2009-11-24 GCHQ
NSA
Microsoft Monkey Puzzle E-Mail von GCHQ an NSA die darauf hindeutet, dass von Microsoft für NSA-Programm der Zugriff auf Google und Yahoo Verkehr ausgerichtet wurde. Did the NSA target Microsoft too? Microsoft Monkey Puzzle MUSCULAR and realms - 1 pdf
80 2013-11-26 - NSA Microsoft Cloud Exploitation - Did the NSA target Microsoft too? Microsoft Cloud Exploitation Microsoft data Microsoft Cloud Exploit 4 pdf
79 2013-11-26 2013-10-03 NSA Muslim Porn Viewing Excerpts from document detailing collection of information on targets' online sexual activity, intended to be used to discredit them. Program to discredit "radicals" through use of online sexual activity Radicalizers Pornography Global Radicalizers Vulnerable in Terms of Authority Muslim Porn Viewing 3 htm
pdf
78 2013-11-23 2012-02-23 NSA SIGINT Strategy 2012-2016 Strategy document detailing NSA mission statement and goals. SIGINT Strategy 2012-2016 SIGINT Strategy 2012 SIGINT Strategy 2012-2016 SIGINT Strategy 2012-2016 5 htm
pdf
77 2013-11-23 2012 NSA SIGINT Cryptologic Platform Presentation demonstrating NSA infected 50,000 computers worldwide with malware. Worldwide SIGINT / Defense Cryptologic Platform NSA Malware Worldwide SIGINT / Defense Cryptologic Platform SIGINT Cryptologic Platform 1 htm
pdf
76 2013-11-22 - - Boundless Informant Presentation describing Boundless Informant's "Mission Capabilities from Metadata Records." Boundless Informant [Duplicate of June 2013] Boundless Informant [Duplicate of June 2013] - [Duplicate of June 2013] 8 pdf
75 2013-11-22 - - Boundless Informant FAQ - - Boundless Informant FAQ [Duplicate of June 2013] - [Duplicate of June 2013] 3 pdf
74 2013-11-22 - NSA - Slides detailing the collection of call records from Afghanistan and Norway over a period of 30 days. Afghanistan, Norway, Boundless Informant, Boundless Informant FAQ Afghanistan Collection Afghanistan – last 30 days
Norway – last 30 days
- 2 htm
73 2013-11-20 2013-02-14 - - Notes on a meeting with Dutch intelligence services, whose officials described their use of Computer Network Exploitation technology to hack web forums and collect data of users. Notes for Dutch SIGINT/Cyber Analytic Exchange Collection, Processing and Dissemination of Allied Communications [4 S.] Collection, Processing and Dissemination of Allied Communications - 3 pdf
72 2013-11-20 2007 - UK Phone Data Memo detailing UK-U.S. deal allowing NSA to store data of UK citizens not suspected of wrong doing. SID Analysts Can Now Unminimize [UK Phone Data] - 2007 agreement on UK contact identifiers - 1 jpg
71 2013-11-19 - - Boundless Informant / FAQ - - - - BOUNDLESS INFORMANT incl. FAQ 13 pdf
70 2013-11-19 - NSA Norway - Last 30 Days - - Norway Collection - Norway 1 pdf
69 2013-11-17 - - DSD 3G-Handsets Impact and Update - - DSD3G 3G: impact and update DSD-3G 6 pdf
68 2013-11-17 - GCHQ Royal Concierge - - Royal Concierge Royal Concierge Royal Concierge (de)
Royal Concierge (en)
4 pdf
67 2013-11-04 - - Boundless Informant - - Boundless Informant (Duplikat von Nr.6) - - 8 pdf
66 2013-11-04 - NSA Special Source Operations (SSO) - Details of MUSCULAR - - Special Source Operations (SSO) Collection Optimization "Midpoint" Slides - Google and Yahoo! exploitations [6 S.] - WINDSTOP, SSO, Yahoo - Google
MUSCULAR - INCENSOR Google and Yahoo
14 htm
65 2013-11-04 - NSA Special Source Operations Collection Optimizazion - - Special Source Operations (SSO) Intercept Program Slides -- cable programs, details of MUSCULAR Special Source Operations overview Cable Spying Types [7 S.] 4 pdf
64 2013-11-04 - - - - - WINDSTOP Collection 30 day period December 2012 - January 2013 WINDSTOP – last 30 days - 1 pdf
63 2013-11-03 - - Collection Accesses - - Collection Accesses 30 Nov 2009 Collection accesses - 1 htm
62 2013-11-03 2007-10-03 NSA SIGINT Mission Strategic Plan 2008-2013 - - NSA SIGINT Mission Strategic Plan 2008-2013 2008-13 Strategic Plan SIGINT Mission 2013 11 htm
pdf
61 2013-11-033 2007-01 NSA 2007 Strategic Mission List - - NSA SIGINT January 2007 Strategic Mission List January 2007 Strategic Mission List SIGINT Mission 2007 11 htm
pdf
60 2013-11-01 - NSA Corporate FAA Reporting Metrics Corporate FAA Reporting Metrics - Corporate FAA Reporting Metrics Corporate FAA Reporting Metrics SSO2 Slide (Corporate FAA Reporting Metrics) 1 pdf
59 2013-11-01 2013-04 - - - - - Relationships & Authorities
Corporate FAA Reporting Metrics
PRISM, SSO [11 S.]
SSO1 Slide (Relationships & Authorities)
SSO2 Slide (Corporate FAA Reporting Metrics)
13 pdf
58 2013-10-30 2013-03-14 NSA Project Muscular An excerpt from the Special Operations Weekly -- an internal NSA publication -- describing data collection via the MUSCULAR program. NSA: Special Operations Weekly Excerpt Slideson MUSCULAR program possibly from February 28, 2013 Project Muscular - 3 pdf
57 2013-10-30 - - Current Efforts - Google An NSA Powerpoint slide showing the intersection of "Public Internet" and internal "Google Cloud" user data. NSA Powerpoint Slide: Google Cloud Exploitation MUSCULAR slide "Current Efforts - Google" pdf-fail - - 1 pdf
56 2013-10-28 - NSA Spain - Last 30 Days - - Graphic showing phone calls intercepted in Spain December 2012 - - 1 pdf
55 2013-10-27 - NSA - - - NSA SCS Slides on embassy spying [Slides 3-6] - NSA-CIASCS [3 S.]
NSA-CIASCS [2 S.]
5  ??
54 2013-10-25 2010-09-10 NSA Close Access Sigads - - Close Access Sigads September 10, 2010 (listing French Embassy) NSA codenames Close Access Sigads 2 pdf
53 2013-10-25 - NSA Cable attacks French Presidential Network - - Cable regarding cyber attacks on French Presidential Network April 12, 2013 Four-page internal memo NSA Hosts FRSpies 4 pdf
52 2013-10/24 - NSA Phones World Leaders - - NSA memo to Signals Intelligence Division (SID) staff October 27, 2006 regarding monitoring of phones of world leaders - - 1 pdf
51 2013-10-22 2013-04 NSA PRISM 4.2013 PRISM ist ein Top Secret eingestuftes Programm zur Überwachung und Auswertung elektronischer Medien und elektronisch gespeicherter Daten der National Security Agency und gehört zum dem großen Überwachungsprogramm „Stellar Wind“. An dem Programm sind neun der größten Internetkonzerne und Dienste der USA beteiligt: Microsoft (u. a. mit Skype), Google (u. a. mit YouTube), Facebook, Yahoo, Apple, AOL und Paltalk. - Prism April 2013 - PRISM 11 pdf
50 2013-10-21 - NSA PRISM Wanadoo-Alcatel - - NSA PRISM slide - alcatel / wanadoo (undated) - Wanadoo - Alcatel 1 pdf
49 2013-10-21 - NSA Boundless Informant France - - Boundless Informant France PRISM overview and Boundless Informant on France
Boundless Informant on France
Boundless Informant 2 pdf
48 2013-10-20 - NSA - - - NSA Cable dated November 10, 2010 discussing hacking of Mexican President's email - - 1 pdf
47 2013-10-14 2011-09 NSA Content Aquisition - - NSA Special Source Organization (SSO) slides on Content Acquisition Optimization Content Aquisition Optimization SSO Content Slides 9 pdf
46 2013-10-14 2013-01-07 NSA SSO Overview - - Intellipedia entry-Special Source Organization (SSO) Collection Optimization Overview - SSO Overview 4 pdf
45 2013-10-14 2012 NSA Content Optimization Internal NSA presentation detailing the collection of hundreds of millions of contactlists from around of the world. Content Acquisition Optimization PowerPoint Slides NSA Special Source Organization (SSO) Slides on Content Optimization - Address Books (SCISSORS) SSO Collection Optimization SSO Slides [7 S.] 9 pdf
44 2013-10-06 - CSEC - Presentation on Brazilian Ministry of Mines and Energy - - - CSE Brazil Ministry 7 htm
43 2013-10-04 2012-06 NSA Tor Stinks Presentation Presentation on de-anonymizing users of Tor,a tool meant to protect online anonymity. "Tor Stinks" "Tor Stinks" Presentation June 2012 "Tor Stinks" Presentation "Tor Stinks" 23 pdf
42 2013-10-04 - NSA Tor Egotistical Giraffe Presentation on EgotisticalGiraffe, a technique designed by the NSA to attack Tor users. Peeling back the layers of Tor with Egotistical Giraffe Peeling Back the Layers of Tor with Egotistical Giraffe January 8, 2007 Peeling back the layers of Tor with Egotistical Giraffe Egotistical Giraffe 20 pdf
41 2013-10-04 - NSA Tor Types of IAT Extracts from an NSA document on Tor. Extracts from an NSA document on Tor Types of IAT (how Tor works) Tor: ‘The king of high-secure, low-latency anonymity’ Types of IAT Tor 9 pdf
40 2013-10-04 - - - NSA Notes from talk on Tor by Roger Dingledine November 2007 - - - Roger Dingledine
[Not Snowden document]
2 htm
39 2013-10-04 - NSA Tor Report 2006 - - NSA Crypt analysis and Exploitation Services Report on TOR 2006 NSA report on the Tor encrypted network Tor 49 pdf
38 2013-10-04 - GCHQ Tor Op Mullenize and beyond GCHQ report on ‘MULLENIZE’ program to ‘stain’ anonymous electronic traffic - GCHQ Mullenize GCHQ report on ‘MULLENIZE’ program to ‘stain’ anonymous electronic traffic GCHQ MULLENIZE 2 pdf
37 2013-09-28 2011-01-03 - - NSA memo on "new contact-chaining procedures to allow better, faster analysis" of foreign intelligence targets. NSA Contact-Chaining Memo NSA memo from January 3, 2011 on contact chaining - Contact Chaining Social Networks [1] 3 pdf
36 2013-09-28 - NSA - An NSA powerpoint slide illustrating how phone and email data are used to graph the relationships of foreign intelligence targets. NSA Social Network Graph Powerpoint Slide Slide on contact chaining (SYANPSE) - SYANPSE 1 pdf
35 2013-09-20 - GCHQ GCHQ Belgacom Hack - - GCHQ Slides on Belgacom - Belgacom 3 htm
34 2013-09-16 - NSA - - - NSA Network Analysis Center 2010 SIGDEV Conference on creditcard authorization net workmapping - SWIFT 3 pdf
33 2013-09-11 - NSA NSA-Israel: Memorandum of Understanding - - IsraelSharing NSA and Israeli intelligence: memorandum of understanding NSA-Israel Spy 5 pdf
32 2013-09-09 - NSA - - - NSA slides on smartphones - Smartphones 5 pdf
31 2013-09-08 - - - (WP) STORMBREW - StormbrewTV - - - -
30 2013-09-08 - - Petrobas - - NSA slides on Petrobras and private networks - Petrobas ~60 -
29 2013-09-05 - NSA Classification Guide for Cryptanalysis - - NSA Classification Guide for Crypt analysis from September 13, 2005 NSA classification guide for cryptanalysis NSA classification guide 3 pdf
28 2013-09-05 - NSA SIGINT Enabling Project - - NSA SIGINT Enabling Project Description - engaging companies to covertly leverage product designs (nodate) SIGINT Enabling Project SIGINT Enabling
SIGINT Enabling [NYT 3]
SIGINT Enabling [PP 3]
3 pdf
27 2013-09-05 - NSA Bullrun – Classification Guide - - Project Bullrun Description June 16, 2010 Project Bullrun – classification guide to the NSA’s decryption program BULLRUN
BULLRUN [NYT 4]
BULLRUN [PP 4]
5 pdf
26 2013-09-03 - NSA Brazil and Mexico case studies - - SATC slides Mexico and Brazil Case Studies Intelligently filtering your data: Brazil and Mexico case studies Brazil and Mexico 20 htm
25 2013-09-01 - NSA - NSA document dated June 2010 (notreleased) discussing targeting of French Foreign Ministry - - - French Foreign Ministry 0 -
24 2013-08-31 - NSA - NSA document dated March 23,2006 (notreleased) showingt hat AlJazeera was surveilled - - - Al Jazeera 0 -
23 2013-08-30 - NSA Black Budget - - FY 2013 Congressional Budget Summary February 2012 National Intelligence Program Summary ("black budget") Inside the 2013 U.S. intelligence ‘black budget’ [17 S.]
2013 U.S. intelligence budget tables [26 S.]
Budget 43 pdf
22 2013-08-23 - NSA - - - Prism Payments - - - -
21 2013-08-15 2007-01-08 NSA Targeting Rationale (TAR) An NSA document describing how analysts should explaint heir targeting decisions under the FISA Amendments Act. NSA Memo: Targeting Rationale (TAR) NSA Targeting Analyst Rationale slides (undated) NSA Auditing: Targeting Rationale - 4 pdf
20 2013-08-15 2011-10-12 NSA - An NSA document describing the FISACourt's 2011 FAA Certifications and noting the FISC ruling that certain procedures for the collection of "Multiple Communications Transactions" were "deficienton statut oryand constitutional grounds." FAA Certification Renewals with Caveats NSA Special Source Organization (SSO) news article from October 12, 2011 discussing FISC ruling holding NSA surveillance unconstitutional SSO transitions following FISA Court ruling - 1 pdf
19 2013-08-15 2011-11-01 NSA U.S. Person Information An NSA training slide about what analysts should do when they acquire "U.S.person information". Slide: So you got U.S. Person Information? "So You Got a US Person?" training slide November 8, 2011 Training material: US Person Information - 1 pdf
18 2013-08-15 2012-05-03 NSA SID Oversight & Compliance A2012 quarterly audit of the NSA's surveillance activities, which describes 2.766 violations by the NSA of the surveillance laws and its internal rules and regulations. SID Oversight and Compliance NSA Signals Intelligence Division (SID) Oversight & Compliance Report May 31, 2012 discussing privacy violations for the preceding year 2012 SID Auditing report - 13 pdf
17 2013-08-09 2011 NSA - An NSA Section 702 rule change expanding NSA targeting/surveillance authorities. NSA Section 702 'Loop Hole' NSA Special Source Organization (SSO) glossary on Section 702 - - 1 pdf
16 2013-07-31 2008-02-25 NSA XKeyScore Training Slides Eine NSA Ausbildungs-
präsentation die den Zweck und Umfang des XKeyScore Programms beschreibt.
NSA XKeyscore Powerpoint NSA XKeyScore Training Slides, 2.2008 XKeyScore training presentation, 2008 XKeyScore 32 pdf
15 2013-07-10 2013-04-13 NSA PRISM UPSTREAM Slide An NSA training slide about the collection of internet and phonedata from fiber-optic cablenet works via the UPSTREAM program. UPSTREAM Powerpoint Slide PRISM Slide - PRISM Slide 1 htm
14 2013-06-30 - NSA Dropmire - - Dropmire - Dropmire 1 pdf
13 2013-06-29 2013-04-13 NSA PRISM NSA training slides about the acquisition of surveillance information through the PRISM program. PRISM Powerpoint Slides re Data Acquisition PRISM Slides PRISM Powerpoint Slides re Data Acquisition PRISM [8 S.] 4 pdf
htm
12 2013-06-27 2007-11-20 NSA - A memo from the NSA to the DOD seeking approval of a proposed amendment to procedures governing the NSA's metadata analysis NSA Memo to DOD - Proposed Amendment to Conduct Analysis of Metadata DOJ Memo from November 20, 2007 Proposing Amendment to DOD procedures to allow NSA todo contact chaining of metadata related to US Persons Justice Department and NSA memos proposing broader powers for NSA to collect data DoJ Memo on NSA 16 pdf
11 2013-06-27 2009-03-24 NSA President Bush's post-9/11 surveillance programs A2009 NSA IG Report reviewing President Bush's post-9/11 surveillance programs. Draft NSA IG Report NSA OIG Working Draft Report from March 24, 2009 on StellarWind (PSP) NSA Inspector General review of government surveillance programs after 9/11 StellarWind 51 pdf
10 2013-06-27 2011-02-02 - - ADOJ report to the Senate Intelligence Committee describing the government's bulk collection program under Section 215. 2011 OIG Report on Bulk Collection - - [NotSnowden] 9 -
9 2013-06-23 2009-12-14 - - ADOJ report to the Senate Intelligence Committee describing the government's bulk collection program under Section 215. 2009 OIG Report on Bulk Collection - - [NotSnowden] 7 pdf
8 2013-06-20 2009-07-29 NSA FAA Minimization Exhibit B FISC document describing the NSA'sminimization procedures under Section 702 of FISA (the FISAAmendments Act). FAA Minimization Procedures Minimization Procedures used by NSA in Connection with Data Acquisitions Pursuant to 702 FISC July 29, 2009 FAA Minimization Procedures Minimization Exhibit B 9 pdf
7 2013-06-20 2009-07-29 NSA FAA Targeting Exhibit A FISC document describing the NSA's targeting procedures under Section 702 of FISA (the FISA Amendments Act). FAA Targeting Procedures Procedures Used by NSA for Targeting Non-US Persons Reasonably Believed to Be Outside the US to Acquire Foreign Intelligence Pursuant to 702 FISC July 29, 2009 FAA Targeting Procedures Minimization Exhibit A 9 pdf
6 2013-06-08 2012-07-13 NSA Boundless Informant NSA training slides describing the Boundless Informant tool and "mission capabilities from metadata records." NSA Boundless Informant Powerpoint Slides [8 S.] Boundless Informant Introduction Slides July 13, 2012 Boundless Informant slides [8 S.]
Describing Mission Capabilities from Metadata Records [4 S.]
Boundless Informant Slides 8
4
pdf
5 2013-06-08 2012-06-09 NSA Boundless Informant - FAQ An NSA "Work-in-Progress" factsheet describing the Boundless Informant dataminingtool. NSA Boundless Informant Frequently Asked Questions Boundless Informant Explanation/FAQ Slides September 6, 2012 Boundless Informant – Frequently Asked Questions Boundless Informant FAQ 3 pdf
4 2013-06-08 - NSA - - - PRISM/Upstream explanation slide - - 1 -
3 2013-06-07 - NSA Presidential Policy Directive (PPD-20) Presidential Policy Directive PPD-20 on US Cyber Operations Policy - - Presidential Policy Directive PPD-20 on US Cyber Operations Policy PRESIDENTIAL POLICY DIRECTIVE (PPD-20) 18 pdf
2 2013-06-06 2013-04-13 NSA PRISM Overview NSA training slides providing an introduction and overview of the PRISM program. PRISM Overview Powerpoint Slides [4 S.] PRISM Slides [4 S.]
PRISM (4.2013) [11 S.]
PRISM/US-984XN Overview [12 S.] PRISM [9 S.] 4 pdf
htm
1 2013-06-05 2013-04-25 - Verizon SECONDARY ORDER AFIS Corder approving the application of Section 215 for Verizon metadata collection. Section 215 - Secondary Order (Verizon) Verizon 215 Secondary Order April 25, 2013 Verizon FISA Court order Verizon 4 pdf

 Top


Einzelnachweise


Dropzone


. Top