INDEX


Index of all articles on this weblog, grouped by their main subject(s) and with newest articles on top:


National Security Agency (NSA)

NSA collection systems
- FAIRVIEW: Collecting foreign intelligence inside the US
- INCENSER, or how NSA and GCHQ are tapping internet cables
- Some numbers about NSA's data collection
- NSA's largest cable tapping program: DANCINGOASIS
- Slides about NSA's Upstream collection
- NSA's global interception network
- DRTBOX and the DRT surveillance systems
- New slides about NSA collection programs

Section 215 domestic phone records
- How NSA contact chaining combines domestic and foreign phone records
- Section 215 bulk telephone records and the MAINWAY database

The BOUNDLESSINFORMANT tool
- BOUNDLESSINFORMANT: metadata collection by Dutch MIVD instead of NSA
- The BOUNDLESSINFORMANT interface
- Screenshots from BOUNDLESSINFORMANT can be misleading
- BOUNDLESSINFORMANT only shows metadata

The PRISM program
- What is known about NSA's PRISM program
- PRISM as part of the BLARNEY program
- NSA says there are three different PRISMs
- New insights into the PRISM program
- Is PRISM just a not-so-secret web tool?
- Are the NSA's PRISM slides photoshopped?

International cooperation
- Data sharing systems used within the Five Eyes partnership
- New details about the joint NSA-BND operation Eikonal
- Some equipment that connects NSA with its foreign partners
- The German operation Eikonal as part of NSA's RAMPART-A program
- NSA's foreign partnerships
- 14-Eyes are 3rd Party partners forming the SIGINT Seniors Europe
- Five Eyes, 9-Eyes and many more
- What are SIGADs starting with DS for?
- NSA also has arrangements with foreign internet providers

Non-Snowden leaks
- With NSA contractor Martin arrested, other leakers may still be at large
- Is the Shadow Brokers leak the latest in a series?
- Leaked documents that were not attributed to Snowden

Other NSA topics
- E-mails from inside the NSA bureaucracy
- Something about the use of selectors: correlations and equations
- How NSA targeted the Venezuelan oil company PdVSA
- NSA's Legal Authorities
- Wikileaks published some of the most secret NSA reports so far
- NSA and GCHQ stealing SIM card keys: a few things you should know
- Snowden would not have been able to legally "wiretap anyone"
- NSA's Strategic Mission List
- Document shows that it was not NSA, but FBI that monitored 5 Americans
- The National Security Agency in 2002
- Snowden-documents show no evidence for global mass surveillance
- Video demonstration of two intelligence analysis tools
- New interpretations of NSA monitoring the German chancellor
- NSA's organizational designations
- How NSA targeted chancellor Merkel's mobile phone
- An NSA eavesdropping case study
- Pictures at the NSA's 60th anniversary


United Kingdom (GCHQ)
- INCENSER, or how NSA and GCHQ are tapping internet cables
- Torus: the antenna to significantly increase satellite interception
- NSA and GCHQ stealing SIM card keys: a few things you should know
- How GCHQ prepares for interception of phone calls from satellite links


Canada (CSE)
- OLYMPIA: How Canada's CSEC maps phone and internet connections
- Did CSEC really track Canadian airport travellers?


New Zealand (GCSB)
- Torus: the antenna to significantly increase satellite interception
- New Zealand and XKEYSCORE: not much evidence for mass surveillance


Germany (BND)
- Wikileaks publishes classified documents from inside German NSA inquiry commission
- Secret report reveals: German BND also uses XKEYSCORE for data collection
- German journalists about working with the Snowden documents
- Something about the use of selectors: correlations and equations
- Unnoticed leak answers and raises questions about operation Eikonal
- New details about the selectors NSA provided to BND
- New details about the joint NSA-BND operation Eikonal
- German BND didn't care much about foreign NSA selectors
- German investigation of the cooperation between NSA and BND (III)
- German investigation of the cooperation between NSA and BND (II)
- Update on tapping German chancellor Merkel's phone
- German investigation of the cooperation between NSA and BND (I)
- The German operation Eikonal as part of NSA's RAMPART-A program
- Pictures from inside the German intelligence agency BND
- New interpretations of NSA monitoring the German chancellor
- How NSA targeted chancellor Merkel's mobile phone
- How secure is the Merkel-Phone?


France
- A look at the latest French laws on intelligence collection
- Wikileaks published some of the most secret NSA reports so far


The Netherlands (AIVD/MIVD)
- A perspective on the new Dutch intelligence law
- Something about the use of selectors: correlations and equations
- New details about the joint NSA-BND operation Eikonal
- NSA and GCHQ stealing SIM card keys: a few things you should know
- The phones of the Dutch Prime Minister
- Dutch government tried to hide the truth about metadata collection
- BOUNDLESSINFORMANT: metadata collection by Dutch MIVD instead of NSA
- Dutch queen Beatrix' phone


Classifications
- About STELLARWIND and other mysterious classification markings
- NSA still uses the UMBRA compartment for highly sensitive intercepts
- The British classification marking STRAP
- Five Eyes, 9-Eyes and many more
- From BULLRUN to NOCON and LACONIC
- The US classification system


Hotlines
- Obama used a cybersecurity link for the first time to warn Russia
- The red phone that was NOT on the Hotline
- The 50th anniversary of the Washington-Moscow Hotline
- Bilateral hotlines worldwide
- The Washington-Moscow Hotline


Phones of the President of the United States
- Trump's "beautiful" Oval Office phones and what was changed on them
- The presidential communications equipment under Barack Obama
- 9/11 inside the White House emergency bunker
- New IP phones in the White House
- New phones aboard Air Force One
- Some SIGINT and COMSEC during the Nuclear Security Summit
- How Obama's BlackBerry got secured
- President Reagan using a STU-II telephone
- Obama using a secure GSM phone
- Obama on vacation
- Does Obama really lack cool phones?


Phones of other heads of state
- Another "red phone" for the Israeli prime minister
- How secure is the Merkel-Phone?
- The phones and the iMac of Kim-Jong un
- Papal telephony
- Dutch queen Beatrix' phone
- The Israeli prime minister's red phone


US government and military phones
- The phones of US Director of National Intelligence James Clapper
- A mysterious Tektron secure telephone
- NSA director Alexander's phones
- US State Department red phones
- A White House staff phone
- Commander Petraeus' phones
- Inside the White House Situation Room


Secure mobile phones
- General Dynamics secures commercial smartphones
- Highly secure mobile phones
- Swiss video on mobile phone security


Miscellaneous
- The 5-year anniversary of this weblog
- US military and intelligence computer networks
- What if Google was an intelligence agency?
- Some SIGINT and COMSEC during the Nuclear Security Summit
- Video demonstration of two intelligence analysis tools
- SIGINT Activity Designators
- Abbreviations, Acronyms, Nicknames and Codewords


1 comment:

Political Avenue said...

HELLO THERE!

I have an political online webmagazine called POLITICALAVENUE.COM™
There I have some material I think you will be much interested in. One NSA security handbook for new employees at NSA. And even some pictures from homeland security and such which shows their secret phones. Since i find some of your posts and material well done, could you consider writing one or two articles for publish on POLITICALAVENUE.COM on the subject of yours. It's a free webmagazine so I can't pay you anything until I get proper advertisers, perhaps next year. But I have 11.000 readers per month, if you would like to write an article or two as an expert of your subject?


Write me at thepoliticalavenue@mail.com


From Sweden with Sunshine!
Gustav Norstrom
Chief Editor.