Advertisement
secobi

NSA programs overview

Aug 10th, 2013
469
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.34 KB | None | 0 0
  1. http://www.reddit.com/user/Jou_ma_se_Poes
  2. http://www.reddit.com/r/worldnews/comments/1k0qwn/two_encrypted_email_services_have_closed_down_for/cbk7csi
  3.  
  4. Knowledge is power. The NSA haven't been to careful with their information. With 15000 documents classified documents out there I am sure that eventually my "unknowns" for the programs below will be known. I hope someone at the NSA chokes on their coffee when they read what we know and what we will still know. I am sorry the list is so long, the NSA have been busy. If you know what any of the unknowns are do let us all know.
  5. Dial Number Recognition (DNR) Digital Network Intelligence (DNI) Geospatial Metadata Analysis (GMA) SIGINT Geospatial Analysis (SGA) SIGINT Terminal Guidance (STG) Each SIGAD is basically a collection site, physical or virtual; the SIGAD alphanumerics are used to indicate the source of intelligence FOR a particular report.
  6. The NSA listening post at Osan in Korea has the SIGAD USA-31. Clark Air Force Base is USA-57. US-987LA is with Bad Aibling Germany US-987LB are telecommunications surveillance in Afghanistan
  7. XKEYSCORE processes most of the SIGINT traffic that comes into the NSA by way of various SIGADs, and compartmentalizes it by selector. A selector might be "RUSFOR," which would stand for Russian foreign ministry intercepts.
  8. PRISM is US-984XN analyze information collected and deposited in a database - 117,675 active surveillance targets in PRISM's counterterrorism database
  9. Analysts working on a problem can request that a particular collection site be tasked, or used. The form they fill out is known as an SP0200. Additionally, when they wish to discontinue using a SIGAD for a mission, they send in another SP0200.
  10. TURBULANCE - Consists of nine sub programs including Traffic Thief, Turmoil and Tutelage. Other subprograms unknown.
  11. TRAFFIC THIEF - a database of "Meta-data from a subset of tasked strong-selectors" An example of a strong selector is an email address. In other words, it would be a database of the metadata associated with names, phone numbers, email addresses, that the intelligence services are specifically targeting
  12. AGILEVIEW: DNI tool
  13. AGILITY: DNI tool
  14. SKYWRITER: DNI reporting tool
  15. TREASUREMAP: DNI visualization tool
  16. DISHFIRE: DNI
  17. ETHEREAL: DNI
  18. TUNINGFORK/SEEKER: DNI
  19. OCTAVE: DNI/DNR tool for tasking
  20. UTT - DNR tool for tasking
  21. MAUI: a database for finished NSA intelligence products.
  22. PROTON: SIGINT database
  23. CULTWEAVE: SIGINT database
  24. HERCULES: CIA terrorism database
  25. MAIN CORE: database which contains personal and financial data of millions of U.S. citizens believed to be threats to national security
  26. PINWALE/UIS: archived foreign and domestic e-mails database (FBI access)
  27. MARINA - Internet/Telephone metadata database Unclear
  28. MAINWAY: Call records Database - contains metadata for hundreds of billions of telephone calls made through the four largest telephone carriers in the United States
  29. FALLOUT: Filter for MARINA and MAINWAY
  30. NUCLEON: Voice data Database (FBI access)
  31. CONVEYANCE: Filter for NUCLEON
  32. ARTEMIS: Geospatial analysis
  33. AIRHANDLER Geolocation analysis
  34. DRAGONFLY: Geolocation analysis
  35. GJALLER: Geospatial analysis
  36. GOSSAMER: Geospatial analysis
  37. GROWLER: Geospatial analysis
  38. KINGFISH: Geospatial analysis
  39. STINGRAY: Geospatial analysis
  40. TEMPTRESS: Geolocation analysis
  41. WITCHHUNT: Geolocation analysis
  42. CADENCE/GAMUT: Collection mission system for tasking
  43. UTT (Unified Targetting Tool?)
  44. COURIERSKILL: Collection mission system
  45. TURMOIL: Collection mission system
  46. METTLESOME: Collection mission system
  47. WEALTHYCLUSTER: Collection mission system
  48. Enhanced WEALTHYCLUSTER (EWC)
  49. MASTERLINK: Tasking source
  50. HIGHTIDE/SKYWRITER: Desktop dashboard
  51. RENOIR: Visualization tool
  52. SKOPE: SIGINT analytical toolkit
  53. DROPMIRE - NSA surveillance programme aimed at surveillance of foreign embassies and diplomatic staff, including those of NATO allies.
  54. BLARNEY - program to access internet data at key junctions and is facilitated by arrangements with commercial cable companies and internet servce providers. (part of Upstream)
  55. FAIRVIEW - NSA mass surveillance programme aimed at collecting phone, internet and e-mail data in bulk from the computers and mobile telephones of foreign countries' citizens. (part of Upstream)
  56. BOUNDLESS INFORMANT - is a big data analysis and data visualization system to give NSA managers summaries of NSA's world wide data collection activities - summarizes data records from 504 separate DNR and DNI collection sources (SIGADs).
  57. CPE (Content Preparation Environment) is a tool for writing report based on the analysis.
  58. ANCHORY: an intelligence community-wide database for intelligence reports.
  59. Mira4 and VERAS: German programs obtained by NSA (purpose unknown)
  60. Surveillance Detection Units (SDU) are organizations belonging to the US Government that have conducted secret surveillance that potentially broke national laws in various European countries.
  61. SIMAS - SDU's data is collected in a system called Security Incident Management Analysis System
  62. NSANET - network carrying information rated Top Secret or Sensitive Compartmented Information. (Snowden access)
  63. TERRORIST SURVEILLANCE PROGRAM - forerunner of PRISM
  64. STELLARWIND is the code name of a Sensitive Compartmented Information security compartment for information collected under the President's Surveillance Program
  65. TRAILBLAZER - earlier NSA effort.
  66. PIONEER GROUNDBREAKER - IBM, ATT and NSA...
  67. TEMPORA - British program including recordings of telephone calls, the content of email messages, Facebook entries and the personal internet history of users. Shares this with the NSA.
  68. CCDP - The Communications Capabilities Development Programme is a UK government initiative to create a ubiquitous mass surveillance scheme for the United Kingdom. It would involve the logging of every telephone call, email and text message between every inhabitant of the UK
  69. DHS
  70. FAST (Hostile Intent) - Future Attribute Screening Technology - precrime screening
  71. MATRIX - Multistate Anti-Terrorism Information Exchange Program closed down 2005
  72. Trusted Traveller Program https://www.dhs.gov/trusted-traveler-programs
  73. No Fly List - 22000
  74. Terror Watch List - over a million
  75. Disposition Matrix - number unknown
  76. Programs unknown in the NSA:
  77. AIRGAP/COZEN - unknown
  78. AMHS - unknown
  79. ARCANAPUP - unknown
  80. ARTEMIS - unknown
  81. ASSOCIATION - unknown
  82. AUTOSOURCE - unknown
  83. BANYAN - unknown
  84. BEAMER - unknown
  85. BELLVIEW - unknown
  86. BLACKPEARL - unknown
  87. CADENCE - unknown
  88. CHALKFUN - unknown
  89. CINEPLEX - unknown
  90. CLOUD - unknown
  91. COASTLINE - unknown
  92. COMMONVIEW - unknown
  93. CONTRAOCTAVE - unknown
  94. CONVERGENCE - unknown
  95. CREEK - unknown
  96. CREST - unknown
  97. CROSSBONES - unknown
  98. CYBERTRANS - unknown
  99. DOUBLEARROW - unknown
  100. FASCIA - unknown
  101. FASTSCOPE - unknown
  102. FOREMAN - unknown
  103. GISTQUEUE - unknown
  104. GLAVE - unknown
  105. GLOBALREACH - unknown
  106. GOLDMINER - unknown
  107. GOLDPOINT - unknown
  108. GOSSAMER - unknown
  109. HIGHTIDE - unknown
  110. HOMEBASE - unknown
  111. INFOSHARE - unknown
  112. INTELINK - unknown
  113. JOLLYROGER - unknown
  114. LIQUIDFIRE - unknown
  115. MASTERSHAKE - unknown
  116. MESSIAH - unknown
  117. METRICS - unknown
  118. MICHIGAN - unknown
  119. NEWHORIZONS - unknown
  120. NIGHTSURF - unknown
  121. NORMALRUN/CHEWSTICK/FALLENORACLE - unknown
  122. OAKSTAR - unknown (part of Upstream)
  123. OCELOT - unknown
  124. OCTSKYWARD - unknown
  125. PATHMASTER/MAILORDER - unknown
  126. PANOPTICON - unknown
  127. PLUS - unknown
  128. PRESENTER - unknown
  129. PRINTAURA - unknown
  130. RAVENWING - unknown
  131. ROADBED - unknown
  132. SCORPIOFORE/CPE - unknown
  133. SIGNAV - unknown
  134. SHARKFINN - unknown
  135. SNAPE - unknown
  136. SPOTBEAM - unknown
  137. STORMBREW - unknown (part of Upstream)
  138. STINGRAY - unknown
  139. SURREY - unknown
  140. TAPERLAY - unknown
  141. TAROTCARD - unknown
  142. TRACFIN - unknown
  143. TRAILMAPPER - unknown
  144. TREASUREMAP - unknown
  145. TRICKLER - unknown
  146. TUNINGFORK - unknown
  147. TUSKATTIRE - unknown
  148. TWISTEDPATH - unknown
  149. WEBCANDID - unknown
  150. YELLOWSTONE/SPLITGLASS - unknown
  151. Edit. WIRESHARK and ARCMAP removed. See Entropius' post. Both commercial/harmless programs. Don't want to create a paranoia sandwich. It is bad enough as it is.
  152. Second edit ETHEREAL removed - thanks to PointyOintment and azaydius
  153. Third edit: Someone wrote to me asking what my problem is:
  154. Thank you for contacting me with your concerns. I will answer as honestly and faithfully as I can. I am not an American. I am an attorney in a far away land. Look up my user name if you really must.
  155. ALL the information I have posted is publically available. ALL of it. The NSA should be more careful.
  156. What has the information been used for? The one XKeyscore slide stated over 300 terrorist captured. The NSA claim that their internal spying has disrupted 58 plots in the USA. Where are all these supposed terrorists and when are their trials starting? We're not talking about the Boston Bombing, because they weren't there for that. We're talking about 58 seperate terrorist attacks which Americans have never heard about? Oh wait I hear you say "they were kept secret for a reason..." No... How about this is all fiction. Where is the evidence? General Alexander should be able to sit back, smile and start listing the targets, preparations and everything regarding each of these "58 supposed plots", yet he can only point to a single guy sending $8500 to Al-Shabaab. WOW! $8500!!! Stop the frikken presses! $8500!! /s
  157. The other uses of internationally intercepted communications is to mark people out for death based on who they have been talking to. You are aware that the US uses telephone metadata from Afghanistan to launch strikes. Meaning that the content of the phonecalls matters not, what matters is how many times you speak to someone considered to be few enough hops away from someone considered a terrorist? I think the continual drone strikes are a crime against humanity and you only have to consider what it is like to live with the constant threat of death hanging over them.
  158. I'm not really enjoying my schadenfreude and I told you so when it comes to US citizens losing their rights. FFS! I TOLD YOU SO! You know how many thousands of downvotes I have had to endure trying to warn of the dangers? I eventually just gave up. Americans just knew better. It fucking pains me that I got nowhere fast.
  159. I believe that privacy is a basic human right. It is not permissable to trample it underfoot because "terrorists" and "terrorism". I have lived through a real armed campaign with bombings and landmines and I didn't buy it then and still not buying it now.
  160. Which USG clandestine operations do you believe are of value? It all seems to have backfired rather spectacularly.
  161. What about the abuses of these very same progams that we're hearing about? Do you think the internal surveillance should be automated and watch for people spending money they shouldn't have, can't explain and/or haven't declared to the IRS? So you think the internal surveillance should be used for petty drug possession busts?
  162. How many people are there in Al-Qaeda? A 100 as the ISI reckon? A 1000? How many of those are in the USA? OK. Now WHY are there 117,675 active surveillance targets in PRISM's counterterrorism database? It's out by a factor of 117:1. There are over a million Americans on the Terror Watch List. What is THIS ALL ABOUT? Do you have any idea?
  163. What is the FISA court record for and against the government? All those warrants to do all that spying.... how many cases have eventuated because of this.
  164. So yes, I am against the NSA and everything they do and enable. I don't think the NSA represents the USA in any meaningful way. From the outside it looks like a rogue operation with no meaningful oversight.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement