This internal NSA report dated 14 August 2009 describes that year’s SIGDEV (Sigint Development) Conference, in which representatives of 5 Eyes agencies and the wider US intelligence community meet “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis”: see the Intercept article: The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket, 4 April 2014.
This presentation, prepared by GCHQ’s Joint Threat Research Intelligence Group (JTRIG) for the 2010 SIGDEV conference describes the agency’s “effects” operations – including the use of social media for propaganda purposes: see the Intercept article: The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket, 4 April 2014.
This slide from a March 2013 NSA Special Source Operations presentation reveals the existence of a FISA Court order (case number 13-319) relating to “Germany”, among others: see the Der Spiegel article ‘A’ for Angela: GCHQ and NSA Targeted Private German Companies and Merkel, 29 March 2014.
This single slide from a 1 August 2009 presentation from the NSA’s Center for Content Extraction shows that the communications of 122 heads of government were stored in the agency’s central “Target Knowledge Base”, 11 of whom are named on this slide. The collection for most of these targets was automated: see the Der Spiegel article ‘A’ for Angela Merkel: GCHQ and NSA Targeted Private German Companies, 29 March 2014.
Selected slides, some with speaking notes, drawn from a 2010 NSA presention, describe the aims of the agency’s operations against Chinese company Huawei: see the New York Times article N.S.A. Breached Chinese Servers Seen as Security Threat, 22 March 2014.
A series of casual posts written by a single author stationed in the NSA’s Signals Intelligence Directorate and posted on the agency’s intranet in 2012. Several posts written in December of that year describe the rationale and methodology of targeting systems administrators: see the Intercept article Inside the NSA’s Secret Efforts to Hunt and Hack System Administrators, 20 March 2014.
This extract from the 2013 Congressional Budget Justification for the National Intelligence Program (the Black Budget) describes the spread of MYSTIC’s “complete access” to other target counries: see the Washington Post article NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls, 18 March 2014.
This extract from the NSA’s Special Source Operations division’s weekly memo describes the operation of SCALAWAG, the SIGAD (or collection address) associated with the MYSTIC collection of bulk telephony data: see the Washington Post article NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls, 18 March 2014.
This is cover slide from a briefing presentation on MYSTIC produced by the NSA’s Special Source Operations: see the Washington Post article
NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls, 18 March 2014.
This short extract from an April 2011 NSA document describes the operation of the agency’s QUANTUMHAND tool: see the Intercept article Compare the NSA’s Facebook Malware Denial to its Own Secret Documents, 15 March 2014.