July 20, 2014

New phones aboard Air Force One

(Updated: May 15, 2021)

The location that best represents Top Level Telecommunications in every sense of the word is probably Air Force One, the aircraft that carries the president of the United States.

As unbelievable as it sounds, the telephone sets used aboard this plane dated back to the 1980s and so they were finally replaced by new ones in August 2012. Here we will take a look at this new telephone equipment, which is now used by president Obama when he travels by air.


President Obama using one of the new phones aboard Air Force One, August 13, 2012.
(White House Photo by Pete Souza - Click to enlarge)


The new phones

In a range of pictures showing president Barack Obama using a telephone aboard Air Force One, we can see that the new phones consist of a handset in a customized cradle. In the conference room they have a rubber foot so they can be placed on the table without sliding away:



President Obama using one of the new phones aboard Air Force One
(Photo: AP - October 24, 2012)


The phone sets to be used by the president in his office room and the conference room have a brown/goldish color that matches the wood and the leather chairs. All other handsets that have been installed throughout the plane are in standard gray:



President Obama talks with Chief of Staff Jack Lew, former President Bill Clinton,
Justin Cooper, David Axelrod, and Senior Advisor David Plouffe. November 4, 2012.
In the back we see two new phones in gray on a wall mounted cradle.
(White House Photo by Pete Souza - Click to enlarge)



President Obama and Press Secretary Jay Carney disembark from Air Force One.
Left of the door we see a wall mounted version of new phone in gray.
(White House Photo by Pete Souza - June 17, 2014)


The Airborne Executive Phone

These new phones aboard Air Force One can be recognized as the Airborne Executive Phone (AEP) made by L-3 Communications. This is a military contractor that, among many other things, also manufactures the STE, the secure desktop telephone that is most widely used by US military and government.

The Airborne Executive Phone is able to make both secure and non-secure calls from a single handset. It also provides Multiple Independent Levels of Security (MILS) for digital voice and internet data access. This should provide end users with the experience of "reliable connectivity, interoperability and security they would have in an executive office environment".


Global Secure Information Management Systems

The Airborne Executive Phone is part of L-3 Communication's Global Secure Information Management Systems (GSIMS). This is an IP-based system for secure airborne communications and has a modular, scalable, and redundant design.

GSIMS integrates existing analog and digital radio and interphone systems with its own IP-based architecture, this in order to provide reliable connectivity, secure video conferencing and controlled wireless connections. The system is effectively controlled from an operator workstation.

L-3 Communications advertises (pdf) the GSIMS system as the most advanced secure communication system for VIP and Head of States aircraft:



More details about the Global Secure Information Management Systems (GSIMS) can be found in the fact sheet (pdf).


Development and installation

The installation of new phones aboard Air Force One was part of a larger, 81 million dollar contract that was awarded to L-3 Communications in 2009. This contract included the installation of Airborne Information Management Systems (AIMS) hardware and software. It modernized the on-board communication systems and replaced outdated analog systems, providing fixed bandwidth switching and integrated secure/non-secure video teleconferencing. Also included was the installation of seamless passenger information interfaces throughout the VC-25 aircraft that serve as Air Force One.

It seems that the Airborne Executive Phone (AEP) was originally developed by Telecore Inc., as can be read in the resume of someone who made a video presentation of this device (he did the same for the Senior Leadership Airborne Information Management System of L-3 Communications). Telecore is the company that manufactures the IST-2 telephone for the Defense Red Switch Network (DRSN), which is also a single device that can be used for both secure and non-secure calls. Probably Telecore sold the AEP to L-3 Communications.


Secure and non-secure calls

As we can see in the L-3 Communications advertisement, secure calls are indicated by a red background in the display and non-secure calls by a green one. This corresponds with two lights on the back of the handset: a green light that flashes when a non-secure call comes in and a red light when it's a secure one. During the call the green or the red light stays on:



President Obama talks with NASA's Curiosity Mars rover team aboard Air Force One,
August 13, 2012. We see the green light on, as this is an unencrypted call.
(White House Photo by Pete Souza - Click to see the full version)



President Barack Obama talks on the phone aboard Air Force One, April 10, 2014.
Here we see the red light on, and interestingly, the White House didn't
release to whom Obama was talking on this occasion.
(White House Photo by Pete Souza - Click to see the full version)


Air Force Two

The new Airborne Executive Phones are also installed in the smaller Boeing C-32, a modified Boeing 757, which gets the air traffic call sign Air Force Two when it is carrying the vice-president of the United States. Sometimes this plane is also used by the president, and then serves as Air Force One, like for example for a trip on July 17, 2014 to the Port of Wilmington in Delaware:



President Obama talks on the phone with president Petro Poroshenko of Ukraine
about the Malaysia Airlines plane crash in eastern Ukraine, July 17, 2014.
Here we see the new phone in gray, and as Obama's finger is covering
the red light, and the green light is off, it seems a secure call.
(White House Photo by Pete Souza - Click to enlarge)



The old phones aboard Air Force One

Initially, the current Air Force One had 85 telephones installed all over the plane. These consisted of a cradle and an old-fashioned, so-called G-style handset. They came in two versions, one in white and one in beige. The white handset was for non-secure calls and the beige one for phonecalls over a secure line. These telephones were introduced on the previous plane that served as Air Force One, during the presidency of Ronald Reagan(!).



President Obama takes questions from seven reporters from the black press aboard
Air Force One on their way to the NAACP convention in New York. July 2009.
In this picture we see the phones that were previously used.
(White House Photo)


After the new Executive Voice over Secure IP (VoSIP) telephone network was installed in 2007-2008, which connects the White House with some of the most senior policy makers, the Cisco 7975G Unified IP Phone used for this network was also placed in Air Force One, where the big device was somewhat out of place:



Close-up of the white and the beige handsets and the Cisco 7975 IP phone
in the conference room of Air Force One, March 2009.
(Photo: Stephen Crowley/The New York Times)


Now, all these three different phones have been replaced by a single Airborne Executive Phone, which connects to both ordinary and highly secure telephone networks.



Links
- Insider: 31 photos that show how Air Force One has changed through the years (2021)
- The Drive: "Air Force One" Jet Reemerges With Upgraded Communications For World Trip (2017)
- jp.MSN.com: 米大統領専用機の電話はアイアンマンっぽいヘンな電話
- Gizmodo: The Phones on Air Force One Look Like Iron Man Accessories
- Tinker AFB: Maintenance in chief: Looking after Air Force One
- History of the Presidential Telephones of the United States
- Radiocommunications: Air Force 1 Information

More comments in the Hacker News thread

July 12, 2014

Document shows that it was not NSA, but FBI that monitored 5 Americans

(Updated: April 16, 2021)

Three days ago, on July 9, 2014, Glenn Greenwald published an article which he earlier announced as being the grand finale of the Snowden-revelations. It would demonstrate that NSA is also spying on ordinary American citizens, something that would clearly be illegal.

The report is titled "Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On" and it tells the story of Faisal Gill, Asim Ghafoor, Hooshang Amirahmadi, Agha Saeed and Nihad Awad whose e-mail addresses were found in an NSA file from the Snowden-trove. Although the article confusingly mentions both FBI and NSA, many people and media got the impression that this was the long-awaited major NSA abuse scandal.

But as we will show here, the document that was published contains no evidence of any involvement of the NSA in this particular case. Everything indicates that it was actually an FBI operation, so it seems not justified to have NSA mentioned in the article.


The FISA spreadsheet

Greenwald's report is all about a spreadsheet titled "FISA recap" - which refers to the Foreign Intelligence Surveillance Act (FISA) from 1978. This law allows electronic surveillance of Americans who are suspected of espionage or terrorism.

The spreadsheet contains 7485 e-mail addresses that were apparently monitored under FISA authority between 2002 and 2008. Unfortunately the article doesn't say whether the addresses are all from American e-mail providers or that some of them are foreign.

We do know that 202 (or 3%) of these e-mail addresses belong to a "US person", 1782 (or 24%) to a "Non-US person" and of 5501 (or 73%) addresses the nationality of the user is unknown:



Part of a spreadsheat titled "FISA recap" showing e-mail addresses monitored
between 2002 and 2008. The table seems to be ordered by expiration date
(click to enlarge)


In this sample, there are 8 e-mail addresses where the nationality is marked as "US Person" and except for one, these are all under responsibility of FBI. Of the 12 marked "Non-US Person", 4 are under responsibility of the CIA, 7 under the NSA and 1 has no responsible agency.


FBI Case Notations

Each entry in the list has a unique Case Notation starting with XX.SQF followed by six numbers. Greenwald states that such a case notation starting with XX.SQF is "assigned to all “FISA accounts” as a unique identifier" and points to a slide titled "FISA dataflow" as evidence for that:


Slide showing "FISA dataflow". It's unclear why the Case Notation format
has been partially redacted, and PALMCARTE is also not explained.
NAC presumably stands for NSA's Network Analysis Center.
(date unknown)


But in a little known NSA document (pdf) from 2006, which was published on March 11, 2014 by The New York Times, we see that XX.SQF is actually the prefix for FBI FISA data. It also says that US-984J is a SIGINT Activity Designator (SIGAD) which denotes FBI collection.

Data collected by NSA under FISA authority is identified by the SIGAD US-984*, in which the asterisk is a placeholder for additional suffixes (other than a J), like for example in US-984XN, which is the SIGAD for NSA's famous PRISM program.

So, the prefix XX.SQF isn't used for "all FISA accounts" as Greenwald wants us to believe, but just for those from the FBI. The 2006 document doesn't say what prefix is used for NSA data, but from the PRISM-presentation we know that communications collected by NSA through PRISM are identified by the trigraph SQC.

Analogue to the way the PRISM case notations are composed, a case notation from the spreadsheet, like for example XX.SQF055191 for the e-mail address of Asim Ghafoor breaks down into the following parts:
XX - This may stand for Internet Service Providers
. (dot) - Indicating multiple types of content
SQF - Fixed trigraph denoting FBI FISA collection
05 - Year the Case Notation was established: 2005
5191 - Serial number of the targeted address


The FBI as Responsible Agency

A second role of the FBI becomes clear when we look at the spreadsheet column for the "Responsible Agency". According to Greenwald's article, this column shows the federal agency that requested the monitoring of a particular e-mail address. In the sample shown above we see that this can either be FBI, NSA or CIA.

Most striking is that for the e-mail addresses of all five Muslim-American leaders, the FBI is the responsible agency that requested their surveillance. This was also recognized in Greenwald's story, and it's of course exactly how it should be, as it's officially up to the FBI to investigate American citizens and residents:



Excerpts of the FISA spreadsheet showing the entries for five Muslim-American leaders
The asterisk behind some of the mail addreses seems to
indicate that collection has been terminated
(compilation by IC Off the record - click to enlarge)


As we can see, these entries for the five Americans contain nothing that points to any kind of involvement of the NSA. Instead, both the case notation and the responsible agency indicate that it were FBI operations.

Greenwald and his co-author Murtaza Hussain were asked on Twitter whether there might be some additional evidence for the involvement of the NSA, but they haven't responded to this question.

The only relationship this list has to the NSA, is that it was among the Snowden-documents, but that can also be easily explained by the fact that for many other entries the NSA is the responsible agency. The list was most likely sent to all three agencies as a recap of which addresses were monitored on their behalf.

Given these considerations, it seems that the spreadsheet actually shows a large number of e-mail addresses that have been monitored by the FBI, and therefore their case notation starts with XX.SQF. This monitoring apparently took place partly for the FBI's own investigations and partly on behalf of NSA and CIA, to whom the FBI would have passed the communications from the e-mail addresses they requested.

According to a Foreign Policy article, the NSA is the most frequent requester of data from the FBI's interception unit DITU, for which there's a direct fiber-optic cable between Quantico and the NSA headquarters at Fort Meade.

Someone's suggestion that the case notation reflects the agency that requested the surveillance seems not plausible, because in that case there would have been a different prefix for FBI, NSA and CIA, but here the communications they requested all have the same XX.SQF-prefix.

Update:

In November 2017, The Intercept published an editon of the NSA's internal newsletter SIDtoday from August 17, 2005, which says:

"NSA gets most of its CT-related FISA collection from the FBI, which collects, formats, and disseminates international terrorism-related FISA intercept to NSA, CIA, and internally to FBI agents and analysts. The Digital Intercept Technology Unit (DITU) is the FBI unit responsible for all FISA data collections and is located at the FBI's Engineering Research Facility on the grounds of the FBI Academy in Quantico, Virginia."

"While NSA, CIA, and FBI all receive copies of the raw FISA collection, each agency uses their own reviewers and has their own priorities. For example, TRAFFICTHIEF tipping requires that metadata be delivered to NSA as quickly as possible while FBI analysts generally don't consider the metadata nearly as timesensitive."

A team from the FBI meets periodically with data providers, which includes an NSA/SSO representative. Access to the providers allowed to discuss new collection capabilities and tailor the format of the data according to NSA requirements. Since 2005, the NSA's FISA team had a full-time position in the DITU for direct access to the providers.


How the FBI intercepts messages

All the cases on the list started before the FISA Amendments Act of 2008 was enacted, so it was done under the authority of the original Foreign Intelligence Surveillance Act (FISA) of 1978, which requires an individual order of the FISA Court (FISC) for every American that is considered a target. According to a top FBI lawyer, the application for every single US person consists of a 35 to 150 page packet that has to demonstrate the necessary probable cause.

After the FISC granted a warrant, the FBI probably went to the target's Internet Service Provider (ISP) in order to collect his communications. Each ISP is legally obliged to have Lawful Intercept (LI) equipment installed on their networks, in order to "perform electronic surveillance on an individual target as authorized by a judicial or administrative order", in this case the FISA Court warrant.

The equipment filters internet data packets based upon identifiers like e-mail and IP addresses, which means all kinds of communications that contain a particular e-mail address will be pulled out and forwarded to the FBI's Data Intercept Technology Unit (DITU). This method would also explain why in all case notations from the spreadsheet we see a dot, indicating that the collection resulted in multiple types of content.

Some people suggested that the government went to Yahoo and Google to get the messages from the Gmail.com and Yahoo.com e-mail domains (and retorically asked whether these companies did fight the order), but that is unlikely. For the assistance of these kind of web service providers, NSA set up the PRISM program, wich started in the fall of 2007, so only shortly before the surveillance cases mentioned in the spreadsheet expired. Yahoo joined PRISM in March 2008 and Google in January 2009.

The NSA has similar filtering equipment installed at switches of major internet backbone cables (for the so-called Upstream collection), but these are specifically used for foreign or international communications. One would expect that data collected this way, has a case notation with an NSA trigraph, but Washington Post journalist Barton Gellman writes that Upstream collection from network switches also has case notations that begin with XX.SQF, because this kind of collection is "managed by the bureau and shared with NSA". This seems to be a mistake because it is generally considered proven that Upstream interception is done by the NSA (for example: the Upstream slides don't mention the FBI, and a PRISM slide says NSA has a direct relationship with Upstream-providers).


There's a lot we don't know

In trying to clarify what the spreadsheet tells us, I assumed for the sake of readability that the FBI actually intercepted, processed and stored messages from these five Muslim-American leaders. But in his article, Glenn Greenwald suggests that even that is not known for sure:

"Given that the government’s justifications for subjecting [these five] U.S. citizens to surveillance remain classified, it is impossible to know why their emails were monitored, or the extent of the surveillance. It is also unclear under what legal authority it was conducted, whether the men were formally targeted under FISA warrants, and what, if anything, authorities found that permitted them to continue spying on the men for prolonged periods of time."

What he says is that we actually know hardly anything, except for the fact that the e-mail addresses of the men were found on the "FISA recap" list. Although the Muslim-leaders seem innocent of spying or acts related to terrorism, there's still the possibility that the FBI had good reasons to monitor them, but we just have no information about that.

In an ABC News report, anonymous former and current US government officials said that the five men could be guilty or innocent or even cooperating with the government (for example by having agreed with monitoring their communications in order to collect evidence against suspects).

According to these officials, Snowden or Greenwald may well have misunderstood the spreadsheet and made wrong interpretations. ABC further noticed that the document was also curiously absent of the regular classification markings, but that is probably because the list isn't in a .doc or a .pdf document, but in its original .xls spreadsheet file format.


Conclusion

Just like many other documents from the Snowden-leaks that were misrepresented, the original file disclosed in this latest Greenwald piece contains no evidence that NSA had anything to do with the monitoring of the five Muslim-American leaders. In fact, everything points to the FBI, but apart from that we know too little about these cases to say whether the Bureau acted illegally or out of paranoia. However that may be, we can't blame that on the NSA.

Update #1:
After an interview with Edward Snowden on May 5, 2015, Washington Post journalist Barton Gellman said that he himself wouldn't have published about this issue, because he saw not enough evidence for the claims that Greenwald made in his article for The Intercept.

Update #2:
On August 15, 2016, the website The Intercept published a few documents from the Snowden trove showing that the NSA used PRISM to get information about a New Zealand citizen who GCSB believed was involved in a plot against the regime on the island of Fiji, which turned out not to be the case.



Links and Sources
- TheWeek.com: What you need to know about the latest NSA revelations
- Salon.com: First Amendment’s racial tumult: Why Greenwald’s latest revelation matters
- ABCNews.com: Feds Spied on Prominent Muslim-Americans, Report Claims
- ForeignPolicy.com: Meet the Spies Doing the NSA's Dirty Work

July 8, 2014

NSA still uses the UMBRA compartment for highly sensitive intercepts

(Updated: December 7, 2014)

Three days ago, on July 5, 2014, The Washington Post published some of the most important stories from the Snowden-leaks so far. It revealed that Snowden did had access to the content of data collected under FISA and FAA authority - a fact that had been kept secret until now. I'll come back on that main story later.

Here we will take a look at a remarkable detail from two slides that were also disclosed in the Post's article. The classification marking of these slides contains the codeword UMBRA, which was generally considered to be abolished in 1999, but now seems to be still in use. After going through several options, my conclusion is that UMBRA is most likely the codename of a so-called unpublished SCI control system.





"Target Package" prepared by the National Security Agency
prior to the capture of Abu Hamza in January 2011
(click to enlarge)


These slides are from a 2011 powerpoint presentation which details the plan to capture al-Qaeda facilitator Muhammad Tahir Shahzad and which pinpoints his location and his activities based upon intercepts from his various e-mail accounts. He was captured in Abbottabad the day after this presentation was finalized.


In the 2012 NRO Review and Redaction Guide (pdf) the existance of the UMBRA codeword is approved for public release, just like its paragraph portion marking TSC (for Top Secret Codeword). But as this manual also lists many revoked codewords, it is not conclusive about wether UMBRA is still used. One thing that is interesting though, is that the TSC portion marking would fit some of the redacted spaces in the newly disclosed slide:


Some possible options for the portion markings



Top Secret Codeword

UMBRA was one of three codewords that were used to protect sensitive intercepts of Communication Intelligence (COMINT). These codewords represented three levels of sensitivity:
- UMBRA for the most sensitive material (Category III)
- SPOKE for less sensitive material (Category II)
- MORAY for the least sensitive material (Category I)

These kind of codewords were used since the end of the 1950s World War II and together they were commonly called "Top Secret Codeword" (TSC), which was often seen as a level "above Top Secret", although it was actually more like a "vertical" division of the Top Secret-level. The codewords UMBRA, SPOKE and MORAY can be seen on many highly secret documents, a number of which have been declassified, like for example this statement from 1980 for a court case about NSA's information about UFOs:


(click for the full document as pdf-file)


According to instructions like these, the codewords UMBRA, SPOKE and MORAY, as well as the COMINT categories I, II and III were terminated as of October 1999. From then on, the kind of information they were used for, had now to be protected by the general COMINT control system, or by specific compartments thereof for more sensitive information.
Update:
Since World War II, the NSA and her predecessors used codewords for protecting highly sensitive COMINT information and they were generally replaced by a new one every one or more years. The Top Secret codeword TRINE was compromised when the North Koreans captured the NSA spy ship USS Pueblo in 1968. TRINE was then replaced by UMBRA.


SPOKE

Very interesting is that not only UMBRA, but also the codeword SPOKE seems to be still in use. One document from the Snowden-leaks, which was published by Der Spiegel on December 20, 2013, is marked SECRET STRAP1 SPOKE. STRAP is the codeword that GCHQ uses to protect sensitive information, with STRAP1 denoting the least sensitive category:


Given the rather old-fashioned logo-type of the letters SD, it's not quite clear whether the document, or at least the header might predate 1999, although the content is clearly from more recent years. Der Spiegel said that it's an "analysis of the communication paths between Belgium and Africa prepared in January 2009".


Possible options

NSA using codewords that were generally considered abolished, reminds of a similar case in which the NOCON marking appeared in a document from the Snowden-trove. The general use of that marking was terminated in 1995, but NSA kept using it as an internal marking. As such it isn't listed in the official Classification Manuals, which are declassified regularly.

Now it seems that the same could have happened to the codewords UMBRA, SPOKE and maybe also to MORAY, but there's a difference: NOCON is a dissemination marking, a category which is less strictly controlled than a compartment, like UMBRA.

As the classification line of the newly disclosed slides seems not fully correct (there has to be a single, instead of a double slash between ORCON and REL USA, FVEY), which makes that there are a few options for what UMBRA could actually represent.



One option is that the double slash between COMINT and UMBRA is correct. In that case UMBRA wouldn't be a Sensitive Compartmented Information (SCI) label for intelligence information - which it actually looks like most - but a codeword from another category, like for example a Special Access Program (SAP) or Foreign Government Information (FGI) (Marc Ambinder favors this option).

Another option is that there should have been just a single slash between both terms. That would mean UMBRA is a normal SCI control system, in this case one that is apparently kept secret, as it was never mentioned anywhere since 1999.

The latter option seems very well possible, because the most recent Intelligence Community Classification Manual (pdf) acknowledges the existance of "registered but unpublished SCI control systems" which "must remain unpublished due to sensitivity and restrictive access controls".

It seems less likely that UMBRA is the undisclosed compartment of the COMINT (SI) control system, which is listed in the most recent Intelligence Community Classification Manuals, because in that case the marking would have read TOP SECRET//COMINT-UMBRA//etc.

Questions

Given this sensitivity, one wonders why in the orange classification bars of the slides UMBRA hasn't been blacked out. The overall classification line in the first slide and also most of the portion markings were fully redacted, although the latter can hardly contain something that is more sensitive than the UMBRA abbreviation.

Another question is whether Edward Snowden had authorized access to the UMBRA compartment, or that he was able to just grab these slides otherwise. The Washington Post suggests that he did had access to the Exceptionally Controlled Information (ECI) compartment RAGTIME, which is similar to UMBRA, but for content collected under FISA authority (UMBRA is probably for content collected under EO 12333).


Conclusion

For those who are somehow familiar with the US classification system, it must be quite surprising to see a codeword that has been considered dead for 15 years popping up from the Snowden-leaks. The most likely explanation is that after UMBRA (and SPOKE too) was publicly abolished in 1999, NSA kept using it in secret as a compartment for very sensitive communication intercepts, but now as an unpublished SCI control system - letting outsiders think that UMBRA was something from the past!

Update:
On December 4, 2014, the website The Intercept came with a story about NSA mapping access options for mobile phone networks under the AURORAGOLD program. One of the NSA presentations about this program contains a slide which shows an example of an NSA serialized product report. The classification line of this report reads: TOP SECRET  UMBRA  US/UK/CAN/AUS/NZ EYES ONLY:




Links and Sources
- Lux ex Umbra: UMBRA history
- TheWeek.com: The return of an intelligence code word with a storied history
- A work of art from the series "Secret Codewords of the NSA": UMBRA
- William M. Arkin, Code Names, Deciphering U.S. Military Plans, Programs, and Operations in the 9/11 World, Steerforth Press, 2005.

July 3, 2014

The National Security Agency in 2002



During the past year, a number of slides from a 2002 NSA presentation titled "National Security Agency: Overview Briefing" were disclosed as part of the Snowden-leaks.

This presentation as a whole would have been a great comprehensive overview of the structure and the mission of NSA at the start of this millennium, but until now only six slides were made public, widely scattered over a period of almost a year and media from 3 continents, almost as to prevent people getting to see the whole picture.

All slides from this presentation can be recognized by their rather overloaded blue background, combining the seals of NSA and CSS, a globe, numerous ones and zeros representing digital communications, and a fancy photoshopped lens flare. In a number of slides, the font type of the classification marking looks different, which could indicate that the presentation was altered and/or re-used several times.




This slide was published by Brasilian media in July 2013. A somewhat distorted version (pdf) was published by Der Spiegel on June 18, 2014. It shows a world map with all the locations where there's a satellite intercept station, which is used for the collection of foreign satellite (FORNSAT) communications.

Nine stations are operated by NSA, including two as part of an SCS unit (see below), and seven stations operated by 2nd Party partners, in this case Great Britain, Australia and New Zealand:
US Sites:
- TIMBERLINE, Sugar Grove (US)
- CORALINE, Sabena Seca (Puerto Rico)
- SCS, Brasilia (Brazil)
- MOONPENNY, Harrogate (Great Britain)
- GARLICK, Bad Aibling (Germany)
- LADYLOVE, Misawa (Japan)
- LEMONWOOD, Thailand
- SCS, New Delhi (India)
  2nd Party Sites:
- CARBOY, Bude (Great Britain)
- SOUNDER, Ayios Nikolaos (Cyprus)
- SNICK, near Seeb (Oman)
- SCAPEL, Nairobi (Kenya)
- STELLAR, Geraldton (Australia)
- SHOAL BAY, Darwin (Australia)
- IRONSAND, Waihopai (New Zealand)

All these satellite intercept stations were interconnected, and it was this network that became publicly known as ECHELON. Revelations about this eavesdropping system in the late 1990s led to public and political outrage and subsequent investigations very similar to what happened since the start of the Snowden-leaks.

Until the new millennium, international communications travelled via satellite links, which made ECHELON one of NSA's most important collection systems. But since then, international traffic has shifted almost entirely to fiber-optic cables, making this the agency's current number one source.

We have no slide about NSA's cable tapping capabilities in 2002, but from other sources we know that there were at least three programs operational outside the US:
- RAMPART-M for access to undersea cables
- RAMPART-T for land-based cables, in cooperation with CIA
- RAMPART-A for cable access in cooperation with 3rd Party partner agencies




This slide was published by the Italian paper L'Espresso on December 6, 2013. It once again shows a world map, this time with the names of over 80 cities where there's a joint NSA-CIA Special Collection Service (SCS) unit. These units operate covertly from inside a US embassy or consulate to get access to targets that are difficult to reach otherwise. The names of cities in countries that are hostile to the US are redacted by the paper.

There are also four "Survey Sites" and seven "Future Survey Sites", but at present it is not clear what that means. Finally, there are two Technical Support sites: PSA in Bangkok, Thailand, and RESC (Regional Exploitation Support Center?) at the US Air Force base in Croughton, UK. The headquarters of the Special Collection Service (SCS) itself is in Beltsville, Maryland.




This slide was published by Der Spiegel on June 18, 2014. It shows a world map with the locations where there's a Cryptologic Support Group (CSG). These CSGs are part of the signals intelligence and cryptologic branches of the five US Armed Services (Army, Navy, Air Force, Marines, Coast Guard), which together form the Central Security Service (CSS) - the tactical part of NSA.

Cryptologic Support Groups provide advice and assistance on SIGINT reporting and dissemination and are located at all major US military command headquarters, both inside and outside the United States. The locations of Cryptologic Support Groups in 2002 were:
- STRATCOM: United States Strategic Command, Omaha
- TRANSCOM: United States Transportation Command, Belleville
- USSPACECOM: United States Space Command, Colorado Springs
- JSOC: Joint Special Operations Command, Spring Lake
- State Department, Washington
- NMJIC: National Military Joint Intelligence Center, Washington
- CIA: Central Intelligence Agency, Langley
- ONI: Office of Naval Intelligence, Suitland
- San Francisco
- FORSCOM: United States Army Forces Command, Fort Bragg
- JFCOM: United States Joint Forces Command, Norfolk
- SOCOM: United States Special Operations Command, MacDill AFB
- CENTCOM: United States Central Command, MacDill AFB
- Key West (Naval Air Station)
- SOUTHCOM: United States Southern Command, Doral
- EUCOM: European Command, Molesworth
- NAVEUR: United States Naval Forces Europe, London
- USAREUR: United States Army Europe. Wiesbaden
- USAFE: United States Air Forces in Europe, Ramstein
- EUCOM: European Command, Stuttgart
- USFK: United States Forces Korea, Seoul
- Japan
- Hawaii (United States Pacific Command)

This large number of CSG locations is one of the things that reflects the importance of NSA's military mission, which is almost completely ignored in the Snowden-reportings (the slide was published rather unnoticed as part of a batch of 53 NSA-documents)




This slide was published in Greenwald's book No Place To Hide on May 13, 2014. It shows what NSA saw as current threats in 2002, with an overlay that seems to have been added later and which lists a range of communication techniques. Greenwald says this slide shows that NSA also counts these technologies, including the Internet, as threats to the US, proving that the US government sees this global network and other types of communications technology as threats that undermine American power.*

This interpretation is rather far-fetched because in that case, pagers and fax machines would also be a threat to the US. It's obvious the list shows the means by which individuals and organisations that threaten the US can communicate - which of course is important to know for a signals intelligence agency like NSA.

The actual threats listed in the slide are:
- Hackers
- Insiders
- Traditional Foreign Intelligence
- Foreign [...]
- Terrorists
- Criminal elements
- Developing nations



This slide was published in Greenwald's book No Place To Hide on May 13, 2014. It says that NSA has alliances with over 80 major global corporations supporting both missions (i.e. Signals Intelligence and Information Assurance) and presents the names of a number of big American telecommuncations and internet companies, along with pictures of some old-fashioned communication devices.

Greenwald's book says that in the original presentation, this slide follows some unpublished ones that are about "Defense (Protect U.S. Telecommunications and Computer Systems Against Exploitation)" and "Offense (Intercept and Exploit Foreign Signals)".*



This slide was also published in Greenwald's book on May 13, 2014. It shows the three main categories of "customers" of NSA, which are government and military organizations that can request and receive intelligence reports. Besides other major US intelligence agencies, we see that NSA works for civilian policy makers as well as for military commanders, from the Joint Chiefs of Staff (JCS) and the Commanders-in-Chief (CINCs) down to tactical commanders.

Greenwald uses this slide to point to the Departments of Agriculture, Justice, Treasury and Commerce, the mentioning of which he sees as proof for an economic motive of NSA's spying operations.* Although almost all countries (try to) spy in order to get information that can be usefull for their national economic interests, Greenwald is doing as if this kind of intelligence is somehow off limits, and thereby discrediting NSA.


> See also: NSA's global interception network in 2012



Links and Sources
- National Security Agency: Transition 2001 (pdf)
- Declassified interview with NSA Director Michael Hayden (pdf) (2000)

In Dutch: Meer over het wetsvoorstel voor de Tijdelijke wet cyberoperaties