Revealed documents: NSA Provides Un-‘conventional’ Support Related article: NSA kept watch over Democratic and Republican conventions, Snowden documents reveal, by Ryan Gallagher, 24 April 2017 in the An NSA-US Navy report in the Snowden archive shed light on the extent of US defence information compromised when a US spy plane collided with a Chinese fighter jet in 2001.The 117-page report, prepared three months after the incident largely vindicates the plane’s crew for their attempts to destroy the signals intelligence and cryptographic material on board before its emergency landing and criticises the lack of institutional preparation for such an incident.
Revealed documents: Blarney Program TDY Handbook FAIRVIEW TDY Handbook FAIRVIEW Dataflow Diagrams Special Source Operations: Corporate Partner Access DNI Processing of RINGBILL Access SSO Web (U) Blarney SKIDROWE – Low Speed DNI Processing Solution Replacing WEALTHYCLUSTER2 Related articles: Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, by Ryan Gallagher and Henrick Moltke, 16 November 2016 in the , New Zealand based company Endace are revealed as a supplier to GCHQ and other intelligence agencies, including Morocco’s DGST which has been singled out by Amnesty and others for human rights abuses.
The company supplies equipment that allows telecoms providers to make their systems “intercept capable” and analysis of previously-released documents from the Snowden archive suggests that Endace-supplied equipment played a critical role in enabling the agency to dramatically expand its surveillance of undersea cables between 20.
A GCHQ document from 2009-2010 explains the PHANTOM PARROT tool, which enables the search of data downloaded from phones seized during border stops, often unbeknownst to their owners, which has then been sent to GCGQ for inclusion in a central database (LUCKY STRIKE), where it is integrated with financial data.
The previous UK Independent Reviewer of Terorrism Legislation stated on several occasions that the current system is not subject to sufficient safeguards.
Further documents from the Snowden archive show the range of the NSA’s ambitions in accessing and utilising medical data.
Source document: DIA – Swimming Upstream in the SIGINT System Interagency SARS Conference– May 20th Special Source Operations Weekly – 18 April 2013 A New Approach to Uncovering WMD Programs FY 2013 Congressional Budget Justifiation Related article: How the U. Spies on Medical Nonprofits and Health Defenses Worldwide, by Jenna Mc Laughlin, 10 August 2016 in the Amidst the controversy about the hacking of Democratic Party networks, which US authorities have linked to the Russian government, previously published documents in the Snowden archive illustrate the extent to which the US’ own signal intelligence agency has breached electronic systems in other countries where elections are ongoing, with targets including successive Mexican Presidents.
That, and the NSA server (FOXACID) has been described in previously published documents from the Snowden archive.
Revealed documents: FOXACID SOP for Operational Management of FOXACID Infrastructure Wireless LAN/CNE Tool Training Course and Evaluation Introduction to WLAN / 802.11 Active CNE Operations Introduction to BADDECISION FOXACID SIGINT Development Support II Program Management Review DGO Enables Endpoint Implants via QUANTUMTHEORY QUANTUMTHEORY success at SARATOGA Expeditionary Access Operations: NSA’s Close Access Network Exploitation Program Related article: The NSA Leak is Real, Snowden Documents Confirm, by Sam Biddle, 19 August 2016 in the show how the NSA’s capabilities have at times been frustrated by the adoption of relatively low-tech strategies.
The US is making large investments into its offensive cyberwarfare capability.
Source documents: Intelligently filtering your data: Brazil and Mexico case studies Computer-Network Exploitation Successes South of the Border Related articles: Commentary: The world’s best cyber army doesn’t belong to Russia, by James Bamford, 9 August 2016, GCHQ’s JTRIG unit used a link shortener in an attempt to influence online activists at the time of the 2009 Iranian presidential elections and the Arab Spring.
While Japan houses and part-funds three NSA bases on its territory and shares access to tools like XKEYSCORE, the US agency also spies on the Japanese government and institutions.