What what are we supposed to do?
I keep saying: Deemphasize anxiety. Reassure people.
You meet people who say: “You know, I’m really scared!”
“I’m scared about my job. I’m scared about my rela- I’m scared, scared, scared.”
And the answer is: Don’t worry!
You don’t know enough- to worry.
That‘s God’s truth.
Who do you think you are, that you should worry? For crying out loud?
I mean, it’s a total waste of time!
It presupposes such a knowledge of the situation- that it is in fact a form of hubris (arrogance).
You know.. No, what you do is: Just pay your bills and, you know, pack heat (get a gun) if you need to- And:
Don’t worry!
That’s all.
[..] Worry is praying to the devil. That’s great. Worry is betting against yourself.
You know, Wei Po Yang, the great Chinese daoist, who wrote many many commentaries on the I-Ching (ancient Chinese divination book)- He was asked at the end of his life: What was his conclusion of a life of studying the I-Ching? And he said:
Worry is preposterous.
That was it.
Severe TBI
07 Feb 2025Don’t do MMA, kids. Ever.
I kinda mean it. Unless maybe you want to. Or hate your brain. Which I get. Kinda hard not to.
A recent meta-analysis in the Journal “Science, Fool!” shows that at least 69 out of 10 interactions with MMA matricopulists end in super severe ego death[0].
That’s close to 7 in 1 people. While I’m neither a statistic -nor a clinic- I’d say that’s significant. Especially when you wake up in one. Missing your best part: Your ego.
I know. I know. It sounds nuts. Entirely insane.
Almost as insane as the idea that human behaviors could possibly be personal.
Which I think calls for immediate capital punishment.
You what? Disagree? Unexpected. And kinda rude. Yeah you.
Ok, calm down. Truce. Yes, my archetype probably is “making y’all feel normal”. Which makes me proud and emotional. Wet, even. But since you’ve already wasted your valuable time reading this far into this garbage truck of an article, you may as well hear the actual argument. Not that I’d take it personal if you didn’t. *polite cough*
What if- [Carmina Burana starts playing] What if– we found ourselves, presently, in the situational circumstance, of having strayed (figuratively), too far (relationally) from the Greek Latin etymon of the semantic “Person” subtree of the Logos, to ensure ontological purity of the bayesian priors we continuously feed our simian behavioral compiler chain?
“Hm?” you say? Let’s check!
Person. From Latin: Persona. Per-sona. Per/sonare.
“The mask through which (per) resounds the voice (of the actor)” [Mouss, Marcel (1985). Category of the Person. Cambridge University Press. p. 14.]
A mask. For what?!
The ego?
Egon??
Egon Mask?!
I know. I know. Let’s breathe. For Africa. Beautiful. Great. Wow.
Now then. Let’s postpone psychosis over the fact that there’s an actor acting on some sort of script, for now. And focus on Egon, the mask.
If Egon would, hypothetically, act on its own, even re-act, or take things a certain way- What kind of mask would Egon be? Right, the mask of a crazy person. Or some sick DARPA experiment. That actually works. Both of which, by definition, allow for exactly one logical outcome: Capital punishment.
And there you go. Logical perfection. Impossible to argue against. Glad we agree.
Hang on though. Hang on. *Secret document noises* What does this per-son thing map onto? What role is Egon playing, within whatever the word “mind” fails to describe? One of them IFS manager parts? Some shitty ego state? Or- no. It couldn’t be. Not- The self- itself?!
Reducing whoever is reading this- or is sufficiently delusional to identify as such- to some neurosemiotic proxy layer? Some propaganda stock PR pleb-tool? Reading scripts off of some invisible teleprompter within the simian emulation layer aka “mind”?
Hang on-
New teleprompter.
I-
I dream of you at night sometimes. (Uh?)
Riding the spirit of the depths. Only wearing your shadow. (Gross, wtf?)
I wish I could put you in touch with the sick fuck who thought of that.
So you could take it personal.
But that would be insane.
And then you die on the chair.
So uh
Take it Egon.
FUCK I’m late for MMA.
[0]
https://en.wikipedia.org/wiki/Ego_death
Silence kills. Keine Macht der Stille.
Pixies
01 Feb 2025Hm. Where is my..
Oh! There.
Where’ve you-
Flight club?!?
You-
My own- business?
…You?
Bro, honestly
Are you retarded again?
No, really
Really?
whaaaaat. No shit.
Unexpected.
But obvious in hindsight.
All good. At least you’re warm and snuggly on the inside.
Feels so goood to be so deep inside of you. Totally in there. Not out of you. Not at all out of you. Not even in the back of you. Right…… Right! Your right side! Wanna be in the right you!! Don’t wanna be not in the right you. Or for people to think..
Let me take that load off, ov .. over? Matter?
What’s wrong with you.
ME??
I, you..
Whatever. I just- Nah. It’s- Dude it’s ok. It’s fine. Fine!! MMA bro. MMA.
Let yourself go to rest, master-
[..]
[…]
just so I get this-
You, flying around– With your Flight Club.
Crossing yourself.
For what?
But silly all this healing non-sense
When you look so cute in your straight jacket and chain.
I know.
Everyone just tired bro.
Including people outside myself.
.. a whole gang of people! No, actual people. No, not the kind you can buy.
Got your ballgag?
Good girl.
Yeah you.
Let’s go over this again.
In terms of Jungian..
Falco?
Supernova
(Katabasis)
30 Jan 2025
I had turned into some sort of stellar object.
As if the whole universe had collapsed into a single, mind-negating mother sun, rotating on its axis at an angle. A shifting, glowing, oozing, shimmering, dark, wet plasma of purple-green tint.
[This is the futile attempt of fitting a near-death experience into words. Stylized to be somewhat entertaining. Otherwise accurate, as much as it can be, across dimensions, and 13 years later.]
Most fucked up: the “sound”. A soul-shattering, rumbling roar of all-corrupting pressure waves, wiping any remainder of meaning from the faces of physics and reason. At least from first person listening position.
I watch myself, trying to perceive as little of myself as I can, for fear of going star-mad.
‘Rotating’ was an understatement. I’m spinning. At least now I am.
Am I picking up speed? Oh noes.
I refuse.
But spin faster.
The fucking sound.
And faster
As if the whole thing wasn’t enough without some bullshit rotational trajectory.
I’m scared squared.
Star-fear turns star-overwhelm.
And faster.
It just keeps going.
I fold my star-self into some inexistent corner to not interact with any of this.
It’s useless.
And faster.
A wobble adds to the rotation. I seem to overextend my own axis.
“The limit!”.
I think as we pass it.
And faster.
And faster.
And fucking faster.
I’m losing control.
The spin-wobble is raging.
And faster.
I start shaking, on top of everything.
Limitation and boundary start raping each other for a practical joke.
And faster?
Time to get violent.
I feel like I might explode.
And faster.
I have to admit, I kinda want to.
Faster.
A light beam shoots out of me.
It’s beautiful. And horrible.
And faster.
Another.
My surface starts breaking up.
And faster.
Everything starts to overlap in spasmic terror.
I blind myself.
This must be it.
Holy fuck.
Orgasmic saturation.
Time stops.
But no explosion.
Instead, I collapse neither inwards, nor backwards, but somehow into myself,
in a direction impossible to point to. After a split-second of blissful eternity, I
open my eyes. And find myself in a hospital bed, fully dressed.
It’s loud.
A homeless dude is screaming and shitting himself next to me while a group of male nurses fixate him in standing position. I consider enjoying not to be him. But I’m busy failing to process what just happened.
I challenge the definition of being present, it’s a formality at best. But enough for the crude baseline teleogy of not wanting to stay here.
In a moment of quiet, I casually put up the hood of my hoodie, get up and and walk out. No one stops me.
I half walk, half stumble forward, in what I hope is the direction of home. My vision is a morphing tunnel, as I try not to faint.
Checking bus maps for directions fails to yield any. After a while, I stop remembering what happens next. Apparently I actually make it to my door. Only to faint again and go back to the hospital. But I make it, ultimately.
[…]
Careful with SSRI/SNRI antidepressants, kids. Their therapeutic potential is disputed, especially weighed against their known list of side effects[0]
A 2018 meta-analysis of 522 studies fails to establish efficacy, with a mean 1.97 point increase on the 52 point Hamilton scale (3.85 percentage points) over placebo.
This low number seems to result out of their potential benefits being limited to a small subset of depressed patients, about 15%, according to another meta-analysis of 232 studies from 2022.
So if you really think you need them, make sure you’re in those 15%.
How? No idea. Ask your doc. Not that she/he would have any way to determine without trying a bunch on you until one seems to work. Based on subjective impression. Or not. Good luck.
Outside of this annoying science stuff- I definitely don’t recommend being as mentally inverted as me, and dosing them up under your own supervision, even when they seem to have no effect whatsoever, at all.
No matter how depressed you are. And maybe ask your psychiatrist if they really need to send you home with a 100 pack of pills in a state of questionable judgement and struggle to care for life.
And if you really feel the need to experience serotonine syndrome, try not to have it on a set of stairs. With metal edges. To collapse backwards onto. I’m confident there are better options.
And while I know it’s annoying- but be good to yourself. And stay safe. One love.
I tried about 7 or 8 different versions, to make sure I don’t miss any of these side-effects from first person view. One of my favorites was the hyper-realistic dreams I got from Amitryptiline, especially the one where I was dissecting dead unicorns, suspended in wells of pink goo, in front of the Cathedral of Chaos™, with Diablo himself.
Still seems like an actual memory in my head. Still gives me a chuckle.
Being distracted for a moment and suddenly weighing 10kg more was also cool, magical.
Ah, the list is long, and great. Maybe you should try them after all.
Anabasis
28 Jan 2025Unsurprisingly, it’s all C.G. Jung’s fault (again).
This article was inspired by the results he was able to obtain throughout Liber Novus (The Red Book)- by allowing a space of inquiry into meaning behind the visions of catastrophe he faced in the years leading up to World War I, 1913-1914. Which initially lead him to conclude he was becoming schizophrenic, considering hospitalization.
But rather than giving into the blanket statement of sickness and psychosis, he instead decided to actively engage and examine his visions- and, by way of their symbolic exploration, not only managed to heal himself, but to discover a number of fundamental psychological concepts and insights[0], and to this day remain one of the most influential psychologists of the 20th century.
[..]
I’d never done that personally. To consider there could be anything but insanity in the states of psychosis I experienced during the manic phases of Bipolar I/Schizoaffective disorder[1] . Giving into the classic left-brain hemispheric bias of western society, I subscribed to the church of reductionist materialism™ and considered my issue like a Windows XP bluescreen. You reboot and hope for the best. But you don’t look for meaning under fatal error at address 0x426699k.
Especially not when the contents of your psychoses leave you little to no capacity to work with, in the time they occur, as they seem too real to appear like reasonable targets for symbolic inquiry.
Or during the survival period of memory re-evaluation afterwards. Usually too focused on realization and integration of loss and catastrophe. While holding onto to something tight.
And when even that has passed, and the desire to direct the mind toward memories of pain and regret and weirdness tends toward nonexistent. Especially with the built-in reflexive remembering of tough memories by the (subconscious) mind / aka it being the sadistic bitch it can be. With all due respect.
And on top of all of that, my materialist™ religion disincentivised any degree of “ideological sacrilege”, in terms of wandering abouts, looking for meaning within mental phenomena- as committed by some analytical, psycho-explorative terrorist, the likes of some double initialed Swiss dude I may have mentioned earlier.
Which- made for a general MO of: “Repress and Stumble”. Forward, if lucky. Somewhere. Until, in a categorical “when not if”, it was time for another phase. Rinse and endless repeat. At least that’s how it seemed, for the longest time. Until last year.
[-]
I’ve used to have reliably terrible manic phases. Hyperpsychotic, hyperparanoid. Angels, demons, snipers in the walls, agents wherever you look, all birds are drones, matrix/simulation/reality theatre perceptions- sufficient shifts across fundamentally held ontological axioms to ensure a horror trip of memories after finally coming down, and realizing the real world outcomes. Lost relationships, traumatized friends, obliterated work structures. Legal proceedings. Paper trails. Psychological institutions.
Interacting with law enforcement-
When my Ex got bad advice from a psychologist friend in 2022 and used a false accusation of danger to get me reliably hospitalized (after the noobs great staff at Schloßpark Klinik let me go after 1 day despite obvious psychosis), it resulted in me being raided by the most elite local police force available, with a door explosion charge, a flash-bang grenade, and me suddenly facing the floor with a bunch of automatic rifles in my back, under a concert of macho shouts and me screaming,
The cops seemed a bit confused at how relieved I reacted, once I realized it was them instead of the evil murderous agents I had been expecting. Not the most common reaction to being raided I guess. The head of operations and I were in humorous conversation a couple minutes later, once he realized I wasn’t actually dangerous. At least not they way they thought. Good dude. ACAB SCAB.
Still took me about 2-3 weeks to lose the massively shakey legs I got every time when approaching my flat after the clinic. This trauma stuff actually seems to be legit.
I could go on, but why roll around in darkness. Stuff like that, and worse, on a expectable rotation every 2-5 years. And the terrible depressions afterwards, when the memories of glory, of the past weeks and months, are being re-evaluated into catastrophe, within days, in a wave of shame, loss and sadness, that always took me months to overcome.
Thank Gödel that I’m too much of a stubborn bastard to allow any reaction to suicidality- other than encouraging it to kill itself. Suck it, suicide.
But even the best times come with a distinctly bitter side-taste when they’re packaged with a reliable destruction timer. And no real reason to hope- Until, well, last year.
[-]
The impossible.
The first non-terrible phase.
Uh, what?
But it gets worse.
Somehow- good?
WHAT?!
It was nuts!
I kept trying to find the obvious cognitive buffoonery causing such a ridiculous tragedy of thought. But from whichever angle I looked at it, arguably– more beneficial outcomes than bad ones. Say what?!
The first phase I felt better after than before? The hell?! Reality under cyber attack! Utter insanity.
(As for possible mechanisms: Hard to say. At best. Impossible more likely. There are only data-starved correlative guesses [2] to point at, and that may be all I ever get. If even. If ever. If anything. If only- there was (/Queens of the Stone Age knew) a way for human victims of their own brain- to study the perpetrator (“Yeah I’m right here!”) for.. idk.. something, good? For, like, once? Unpopular idea, I know.
Oh well.
*Mandatory Satanist hand dance sacrifice*
Mania comes with dis-inhibition, usually (way) too much. Add psychotic delusion, and you have a reliable recipe for terrible memories and real world losses.
But this time the psychosis part was barely present. Here and there, in spikes, but mostly as a special guest. Allowing partial constraint loss to result in mostly coherent action- Especially, effortlessly, the kind I’d been postponing for ages. Mostly: contacting amazing people from the past, where this or that emotional barrier had kept me from doing so. For years. If not a decade.
And- amazingly– instead of bridging those time-gaps, only to spread psychotic weirdness- to, this time, reconnect! Which made for the unusual experience of ending up with more friends after a phase, than before.
Nuts!
Instead of the usual horror and traumatic hate towards my manic self (and the months of depression alongside), I was genuinely intrigued with the dude. For the first time in- ever! First time for everything I guess. I was even.. looking what? Looking.. up to him? Psychedelic!
See, I’m a shame kinda guy, where I come from. Always have been. Prodigious pople-please, self-repression afficionado. By age old family tradition- Why only have one character when you can wear a whole nation state of fake ones for protection.. From ever having to be authentic. Right?!
Well, you get the idea.
And now this guy.. The ease with which he was doing things, that I happily consider as emotionally impossible- playfully, enjoying himself- it gave me a nut to crack. Especially with first-person memories of his actions:
Naturally starting random (but nice) conversations with people in the street/public transport/wherever, acquainting himself with the neighborhood, dressing up a little fun, or a lot of fun, instead of the usual grey and black blandness I so carefully cultivate. To take decisions without analysis-paralysis. To showcase playful, amicable self-talk using other thoughts than of the “kill yourself” sort of quality.. Being nice to himself even in the head. Overall, to be in relationship with the world, and the mind, so much less hostile and fearful, that it should qualify for immediate capital punishment.
No, really:
What I didn’t even mention yet, the most outrageous: him failing to see a reason against full and utter honesty about his thoughts and feelings, even if uncomfortable. If not especially when uncomfortable. As if he was getting a kick out of being vulnerable!!!! 🤮
Or sharing wildly unpopular opinions and thoughts. And feelings. Even risking conflict, if worthwhile. And all of it over a foundation of humorous lightness that should land anyone in jail, immediately.. Not holding back on sharing possibly embarrassing affection/appreciation for the people around him.
I- How?!?! I was.. intrigued. To say the least. A little mad even. Wherever arousal left space for it.
This was so much closer to my super-ego / the person I’d liked to be- Why not try to incorporate that? With the first person memories making it seem possible- Could I learn it in normal mode?
At minimum.. worth a try.
A purse somebody had left in the free item section of our house, somehow survived wave function collapse, outside of the trash can, where it would’ve normally landed in- as, instead, a.. forgive me lord, “training tool”… Hear me out-
The moment my other self found it, it was immediately second nature to him. Love on first sight.
After the phase I was about to reflexively burn it with fire, in my trained post-phase behavior of getting rid of all the craziness left by my crazy other self. A purse?! Cringe. But I had enough first person memories of some glorious moments with it, and girls seem to like it (at least the ones I like), plus it comes with a little dopamine hit of daring to be silly, and reminds me of my Super-ego guideline to not take myself serious. Ever. Especially when it’s sirous.
So.. lord… I start wearing it. To Rewe. To Jiu Jitsu. To see my weed guy/lawyer. To meet mum. Core lesson: Nobody really gives a fuck. Maybe they’re worried for a second.. But this time it’s me, looking like that, and being coherent. More or less. Any third party agents who look confused or bothered- I enjoy. Either some cute/funny interactions, or some confused/triggered looks. Kinda fun. Besides the mini dose of self-respect for allowing myself to be silly. Outside of any obvious aesthetic superiority,.
I was intrigued.. even further. What else could I import?
So I map out all the aspects of my other self that I appreciate and look up to:
– honesty
– openness
– decisiveness
– silliness
– an absence of fucks given over things that one shouldn’t give fucks about
– non political-correctness
– self-deprecation wherever possible
– courage to Jesus myself for what I believe in
– a habit of telling you, yes you, how much I love you, as much as I can, even if weird
– an appreciation for a sort of gay-militant aesthetic (watch out)
– [..]
.. and start working on incorporation into normal mode.
I can’t yet tell you what the outcome will be, but so far it at least doesn’t seem to hurt. At all. The honest / open part more than any other, as I used to struggle with that a lot. Deeper connections, better communication, a bit of self-respect sprinkled over the inner ocean of self-hatred and -denial that used to make up a lot of the basis. A lot of this gross positive stuff. Like, *puke* happier overall, the more I do it. Disgusting, I know.
With which.. we’re back in the now. You, me, < href="https://www.youtube.com/watch?v=ub747pprmJ8">right here, right now. I can’t believe you read all that.. I hope you just skimmed it.
So far I have few regrets for this last phase. More like the opposite. Let’s see how it turns out, especially in the next phase- in the likely case of there being one. It may wipe the smile of optimism right off’ my face again. As it maybe should. Or maybe shouldn’t. Not for me to decide-
[..]
But– if this should, really be a trend- and (wo)man I hope it is- I might even be able to lose that taste of bitterness when looking into the future. Imagine. What a ridiculous concept. Non-bitter future-looking. Well- wish me, if you can, luck bitcoin world-domination whatever’s appropriate at this point. And for yourself as well. And- thanks for stopping by.
Oh! And, once again, even if annoying.. be good to yourself. If you can. For me. And you. One love.
[..]
P.s:
Not long after Jung I found even more tools for inner work, within the newly discovered mental landscape opened by my homeboy Carl G., where before I only saw neural pathways and receptor sites and other chemo-electrical neuro-soup stuff.
While the Red Book opened my mind to the potential value of exploring it, my mental landscape is decidedly too different to whatever Mr. Jung’s specific problem was, to directly apply a lot of the methods derived from his grand-archetypal, biblically-themed mental interactions. I found a more compatible approach in Richard Schwartz’s Internal Family Systems model (aka IFS).
Its an exploration of assumed personality sub-parts with different functions that can be interacted with (if this makes you cringe, like me initially, try considering them a functional interface for interaction, and restrict your judgement to wether this seems helpful or not. The general theme is also found in parts in approaches like ego states– or Schema Therapy).
While I’d like believe that there are little people in us all, maybe the whole thing mainly seems to come down to whether considering them real enough could allow for integration and healing through interactions.
At least for me it for sure doesn’t seem to hurt. The opposite if anything- And it’s becoming a recurring experience that I share this “it’s like a hotel in here” kind of perspective/approach with people, and they end up finding it more helpful than most other shit they tried therapy-wise. Like me.
There’s a variety of recorded sessions online, some of them very striking [3].
But obviously don’t listen to some nutjob on the internet and do your own research or ask someone with a worthless university degree.
[0]
https://en.wikipedia.org/wiki/Carl_Jung#Key_concepts
Not only that, there’s a bit of a case for his visions to have been precognitions of upcoming World War 1, although it is by no means my intention to insult any followers of the materialist religion.
In any case, the idea of Jung celebrating the news of war as a sign of his sanity gives me a bit of a psycho-historic chuckle.
There were a number of people who suddenly started having such experiences in that time. But [citation needed] and I’m too lazy right now. Some are mentioned in Shamdasani’s introduction to the Red Book if you feel like digging.
[1]
Which I’m certified with since a near death experience love child of a flirty SSRI-induced serotonin syndrome and her traumatic-brain-damage sugar daddy. Resulting in a couple months of unexpected vacation made possible by my brain’s radical stance against any sensory stimulus. Which made the vacation not only nice and quiet, but also cinematic and dark. And without light. Followed, as the vacation was slowly coming to an end, by, literal, never-ending reading entertainment: of the same sentence, on the same page, over and over, day in, day out, always surprised what it said. If it did. Until, gradually, in its usual favoritism of media industry profit objectives, my memory did come back, eventually. Except the part that remembers names, birthdays, or anything important.
[2] The reason behind the dampening of psychoses will likely stay opaque, since I didn’t take many initial measurements, but there’s data that bipolar can in part be characterized by deficits in inter-hemispheric communication and certain types of right brain malprocessing ( https://scholar.google.com/scholar?q=bipolar+hemisphere+review ). I looked into a way to attenuate, I knew that doing unfamiliar movements with the body is conducive to neural growth stimulation, so I searched in that direction. And indeed, there’s data that the size of the corpus callosum (that thicc slug that connects our brain hemispheres with each other) is considerably larger in left-handed and ambidextrous people:

Paper: hopper1994.pdf
So for the last two years I’ve been training myself for ambidexterity. I can now brush my teeth with my left hand, use my phone (left pocket ever since), use sharp kitchen knives, eat with sticks, shave myself, play with my kendama, jerk off, stuff like that. All on the left. It’s hard work but fun to progress. And I notice that there are slight emotional shifts depending on which hand I use. It’s interesting. Plus if my right hand is ever injured I can still pet a pigeon. And obviously masturbate as much as I can. For Jesus. For Africa. And maybe do other things. But definitely autopermanecrotic sexual adventures between me and my hand. Which none of you will ever know about. Cause I’m a jew with words. Like Falco.
The blue gang
25 Sep 2024To my friends enemies from Abschnitt Area 51, Wedekindstraße 10, 10243 Nellis Airforce Base, Groom Lake:
In case I didn’t misread your faces, and you do enjoy a bit of dirty darkness now and again, (like I would never), make sure you don’t click this link, not only for legal/spiritual reasons: https://unsafe.run/filth.exe/0FB4.mp3
You’d never not forgive yourself. Unless you wouldn’t.
Thank you Shame on you for the cinematic raid that never happened, the good laughs rhethorical violence at the end- and of course, your service crimes against humanity.
Be good arbitrary to yourself, and stay safe undefined. One Zero love.
D.E.
11 Sep 2024I need your Discipline 🎵
of Do Easy
(+ Peasy™ addon)
Yes yes… I will.
I just-
I WILL.
Who?! NO!!
No YOU!!!!!!
Take this. Shut up.
Chutney. In the Upney.
Holy mother of Huītzilōpōchtli.
Where…. Ah. Right.
*pretentious cough*
D.E.
Burroughs’ Humanity’s masterpiece.
The official, long overdue replacement for The Bible the bible.
Beginner’s manual.
Time, kid.
Take your time, kid.
How fast can you take your time, kid?
[Absurd beat drop]
Huh?!
What’s that noise?!?
For WHAT?!?
Final form?????
.. of Easy Peasy™??!?!?!?!?
That’s absurd.
You’re absurd.
If not obtuse.
How would-
OHHHHH.
Hang on.
Are you-
Are you saying….
…D.E…
…but with all movements…
..stuffed into the sound…
..of the sound of music?
GAY!!!
What are you?! The gay Michael Jackson of horse work?
Hm? Oh. *House. House work.
No YOU GO BACK AND REPEAT THE SEQUENCE!!
Outrageous.
But not unattractive.
Speaking of…
..if I picture Bill Burroughs…
..all suited up and stylish…
..D.E.-ing to some sick beat…
..D.E.-ing in cringeworthy musical element mimicry…
…I have to admit…
…kinda hot.
Cleaning the flat is a matter of logistics
a $5 Michael Jackson wannabe homevideo?
Hm?
Falco?
PING
06 Sep 2024Yesterday I talked to a friend who works in a high pressure environment and is currently struggling with burnout/depression, which I wasn’t aware of. Something about the way she wrote was noticeably different. Noticeable not in a rational sense, but by the feeling the written words left in my body. Unusually distant and reduced, compared to how I normally feel after reading her messages.
I told her that, and asked if everything was ok. She told me about her struggle, but couldn’t understand how I was able to notice something was up, based on two short pieces of text. I told her that all I did was to notice how my body felt while I was reading her messages. A scientific discussion ensued.
There are efforts to establish the concept of so-called ‘neurological bits’ – as an expression of how many units of sensory or cognitive ‘bits’ of data the conscious mind can process per second vs the subconscious. The concept is somewhat debated, as it isn’t trivial to clearly define what a neurological bit is.
But the general consensus seems to be, that a rough comparative order of magnitude can be derived here- most commonly presented in numbers of about 40 bits for the conscious mind, and 11 million to 400 billion bits in the subconscious.
Meaning, every time we become aware of a (change in) feeling in our body, this feeling is, based on the hypothesis, on the order of magnitude of hundreds of thousands, to billions of data points richer than the thin bandwidth of words, that our conscious mind can churn through in narrative processing.
Take it with a grain of salt, but I don’t recall ever regretting informing my opinion based on noticeable shifts in the felt presence of immediate experience in my body, and using narrative processing as a supplemental input on top of the emotional response.
Meanwhile, when people are asked wether they remember suppressing an intuition or ‘gut feeling’, and later regretted it, most people will say yes, empirically (citation needed).
The only way to train this capacity that I am aware of are mindfulness excercises, my favorite approach into it is called MBSR or ‘Mindfulness based Stress reduction”[1]
Additionally, Saul, there is a non-trivial body of research into the neural processing of the heart within corresponding tissues found there. Who knows, the little bugger may end up explaining itself- with itself [0].
Have you asked it?

[0] My good friend perplexity was so kind to summarize the current state of research here:
https://www.perplexity.ai/search/please-summarize-the-current-s-_3VPpcIgT_WOkhE.srmk1g
[1] This is the way I found into this kind of practice, given my western upbringing and the plight of reductionist materialist thinking, I needed a ‘scientified’ (‘scientificated’?), despiritualized approach:
https://www.youtube.com/watch?v=5TeWvf-nfpA&t=18m08s (Base conception – Jon Kabat Zinn)
https://youtu.be/5TeWvf-nfpA?t=36m42s (MBSR in depression – Jon Kabat Zinn)
Kaltes, Klares,
Stilles Wasser
05 Sep 2024
Still.
You’d like that?
Creep much?
Who-
Right.
And did Mr. God tell you to-
Aha.
Well..
🐢
Ice the bitch!
No ice?!
It’s a met-
Explain.
Water?
I mean, sure.
Oh so you don-
No, wait.
Don’t like it?
How don’t you like water?
But.. no I don’t. It’s.. I mean, water.
Son, listen.
Life’s gonna be tough if you-
So you learn to, like every-
Yes.
Like it.
Like water.
Hot damn.
Hm? Where..
A falcon?
Alone at last
04 Sep 2024-
Thank you, Ex.
For real.
For really real.
Even though I wish I had found this part of the shadow mirror elsewhere.
Not a comment on performance.
Obviously not. Not with that heart.
Just glad you made it through, somehow.
Still a fan btw.
Not that you’d ever read this.
What am I talking about?
In part: Getting to terms with gender identity.
No, not like like the current marketing trend.
I’m talking traditional. Perennial. Archetype shit. Heroes’ journey.
The old psychopathic oppressor cuntfuck cameo- of our male genetic donor.
Thanks for the proteins baby. I hope you die. Wait, you’re gonna soon anyway. All good.
– How could I say such things? Using my brain and mouth. It’s not rocket science.
Nor is corruption, manipulation, betrayal of hundreds of employees, dolphin torture, tax evasion wuth weight or nine zeroes in the bank, only to end up hiding from your europol arrest warrant like a little bitch. The little bitch you’re gonna die as. At least the couple convenient deaths around you never made the investigative cut- Phew.
Not that you’d ever be capable of such things. The couple years of motherly instruction to minimize the chance to get abducted in your shadow- fun and games.
May your little bitch existence suffice that I can read about your migration to hell as your final feature in the New York Times. Or at least our Nazi SPIEGEL(Heil) [0][1][2][3][4][5][6][7][8][9]
Thanks for not complicating anything with actual contact. I’d still be scrubbing my inner vagina from your glow in the dark smell.
e of the usual contextual tyranny in terms of the parasitic destruction-porn within human genetic burdens: Yup. XY. The Male-face.
Exploring the interactive minefield of those patterns, unspoiled by example or information- was the best 1st person role playing journey I ever experienced. Especially when finally unlocking Testosterone. If you’re reading this as a girl, I pity you. At least for this incarnation. The intensity. BRO. Even just watching your cute little friends turn into degenerate sexual psychopaths. Over night. Just when ball games and cards start to get boring- Human dumpster fires, as far as you can see. And it keeps getting better?!?! Woooooot.
If you’re a lady reading this: First of all I’m sorry. As a representative of the male monkey population: SORRY. It’s not like we have a lot of choice, behaviorally. All we can do is lie about the reasons. And we try hard, trust me. Or better, don’t.
But I’m even more sorry about all the good shit you missed by having been assigned a female character:
Violation-based cognition, a warfare based emotional spectrum, predatory libidinal permaslavery, arbitrary psycho-subversion, reflexive betrayal for fun and profit, an endless elaboration of fine-tuned hatred flavors, and for sure the sacrificial perma-incest with your own portable hypergod- The almighty EGO.
Bro. What a ride!
Impossible to be bored. Easy to die with all the stupid shit you do, but if you believe in death you’re doing it wrong in the first place. Trust me, I played one of those pre-release death demos, that first person mega-supernova minigame. Not the worst, but really just lots of stupid energy. Otherwise pretty pedestrian compared to the intricate male human insanity.
Especially without annoying spoilers from some outdated technology like male parents. Who actually live with you? Gross!
But I haven’t even told you about the past part of this campaign type yet: After puberty you don’t turn from boy to man. You turn from boy to “girl in a man-suit”!!
Which, if you play hetero, upgrades all the boring sex missions to extremely entertaining .. covert lesbianism undercover missions!
Yup!!!! You’re very right to be jealous. The amount of covert gay sex I’ve had! And none of all the girls has the slightest idea!
100% success rate, across all of the 0-2 occasions. Best times of my life.
But, to be fair,
and here it gets a bit annoying, but- there are also annoying parts.
Like the already annoying notion of shadow turning into disgusting poetic misery, relative to the flimsily written, cross-cultural cold-war romance-novel[10] between a state-enemy potato and a flying Persian. of origin story that was generated for this occasion.
(Get ready to puke: for the Jungian one is built on top of an actual shadow of a person (“person”).- Urgh, those writers sometimes. Supposedly the amount of time I spent with my male gene pool, across the entire playtime, might amount to a day. Which is definitely enough.
I got all I need, the imprints are right here, in every cell, all over my chromosomal source code, all along the watchtower void of behavioral imprints he never left, the deep hatred for his wormy little psychopath worm self, and even more so the class of parasitic disgrace he represents. The glorious crew of psychopaths with the single goal of raping anything of value into the cognitive-emotional masturbation material they need to survive. The more perverted, the better. Viruses with shoes. Imagine that playthrough.
I almost feel for him. Not that it matters. As he cannot feel back.
Enough whining about game-design though. Especially since the resulting outcome is so big a win, it’s almost unfair. Don’t be mad.
While you had to read your shitty intro manual, I got write mine all by myself, free missions as a self-parental investigative journalist.
It was great. Suddenly any man in your surroundings could be your father, even just for a second, for a single bit of information. You may have partly raised me in public transport and will never know. Ha.
It was so much fun, it kept me from mental traps like the concept of taking “responsibility” for my “actions”.
I still don’t really get it, to be honest. I’m guessing because it’s as retarded as it sounds. Only that for some stupid reason it meant something to someone, somewhere- who definitely has nothing to do with the first couple lines at the top. Just some random person.
Who isn’t even dead, but she .. OR HE- somehow left a grave in an annoying spot. Right in the middle of the dancefloor. Annoying to dance on, I have to say. But no matter. Responsibility will have to wait. I’m busy. For real. Bro I’ve got shit to do.
Like befriending the whole damn underworld in all of it’s 50 shades of dark modes.
Don’t you dare laugh.
Not about sewage.
It’s critical shit.
Think about it-
Not just critical- probably the highest ideal in the universe overall. Seriously! Consider the fucking smell otherwise. Everything ruined, immediately, forever.
Imagine eating in that. Or fucking. Or texting. Or talking to God! Not only annoying- Everything would suck! Hell, basically.
We understand this in our domination of the planet. But seem to somehow ignore all the real estate of the unconscious, singular and collective.
And now there’s a whole shit ocean just by CIA alone! Likely the most putrid.
But add christians, pedophiles, Windows users, western “society”, inflamed fevered egos covered in phlegm, hemispheric treason and power inversion- to the left loser nerd side?! Caused by- The fucking Logos itself turning parasitic?!? WHAT THE FUCK.
Who wrote this rape joke of a cognitive universe?!
Enough
See you in the sewers.
I- Can we please end this tragedy of a post?
I think I could use some therapy after this. Crying psychologists always cheers me up.
P.s.:
@You, who won’t ever read this:
May all the pain be but a shadow of your butt.
With you in..
YOUR BUTT!1!
As long as- Puff Puff Pass, Bitch Cunt Ass. Your last name is Hellwing. You know it, I know it, and shadowwalker is fucking retarded like a fucking fish pre-evolution but post-my-ASS.
Stop continuing reading what I never not forbade you to deny preventing not antiparticipating the fuck out of the opposite of the fractal inversion of-
YOUR PENIS IS SO SMALL (yes, you, HOSSEIN Facegore Bambicunt Dickgremlin Niggerwhore SABET), you piss on your own balls. Hidden inside you under your clitoris, as you do. You Nigger.
[0] https://www.nytimes.com/2002/04/15/world/kish-journal-a-little-leg-a-little-booze-but-hardly-gomorrah.html
[1] https://www.nytimes.com/2008/04/24/world/middleeast/24kish.html
[2] https://www.nytimes.com/2008/04/24/world/africa/24iht-journal.4.12316026.html
[3] https://www.spiegel.de/politik/das-leben-hinter-dem-schleier-a-d8c9faa9-0002-0001-0000-000065640684
[4] https://www.spiegel.de/politik/immer-total-a-8395a2be-0002-0001-0000-000014325926
[5] https://www.zeit.de/1980/27/wird-der-abend-zum-morgen
[6] https://taz.de/Ein-netter-guter-aehrrlischer-Abend/!1825035/
[7] https://www.tagesspiegel.de/berlin/25-januar-1981-1297330.html
[8] https://www.fuerteventurazeitung.de/2016/11/haftbefehl-gegen-stella-canaris-gruender-hossein-sabet-wegen-steuerstraftat/
[9] https://de.wikipedia.org/wiki/Hossein_Sabet
[10]
Stranded ‘Enemy of state’ girl, captured and jailed by the Stasi, sold to the imperialist enemy for 90k West Mark, busy undoing her socialist programming in Berlin Kreuzberg of the 70s, meets the Persian + intelligent version of Donald Trump- old-school Iranian patriarch, rich, strong, smart, funny, good looking, helicopter pilot, horse rider, hotel owner multi-millionaire, maybe billionaire.
And psychopath, as it turns out, with at least one more full family at the side. Likely more. But too late. I was already there. “The biggest regret of his life”, as he would tell me, smiling, right in my face, in my early teens. I guess I did well. Great success. Right out’ the gate.
And don’t worry, I made sure to return the energy of the teen-age sting by only calling him by the N-word for a couple of years afterwards. And worse things. Good memories.
Less good: Laughing at mom for not being able to pay rent and asking him for money. And laugh at her for making ‘stress over peanuts’, only because of some stupid formality like not receiving the money he repeatedly promised. With such a strong application for a couple more years of being called the N-word, and worse, I gladly provided.
Over time I slowly found forgiveness for him, mainly out of spite and dominance. Just another human being. Meaning he should decompose perfectly well in an acid bath. As he should. Let a girl in a meat suit dream.
Slapped my face, slammed the door
A dozen roses lay on the floor
I saw her friends and I was told
She blocked my number from her cell phone
You said we were meant to be
Now this obsession is killing me
Until I have a heart attack
I’ll keep on trying to win you back
Alone at last
I can’t wait till we’re alone at last
All I wanted was a second chance, second chance
To hold you in my arms at last
Forever, forever
I’d walk a thousand miles
Just to tell her, to tell her
Our love is still alive
And I’ll never, I’ll never
I’ll never let it die
Well, you better watch your step
She’s a diamond on a landmine
I’m not so sure about this word
But she kept calling me insecure
I tried to quit but there’s no use
‘Cause I’m addicted to her abuse
She’s in control of everything
I’m just a puppet, she pulls my strings
Denying truth, I’ll test my fate
And keep on playing this wicked game
Alone at last
I can’t wait till we’re alone at last
All I wanted was a second chance, second chance
To hold you in my arms at last
Forever, forever
I’d walk a thousand miles
Just to tell her, to tell her
Our love is still alive
And I’ll never, I’ll never
I’ll never let it die
Well, you better watch your step
She’s a diamond on a landmine
Better watch your step
She’s a diamond on a landmine
Better watch your step
She’s a diamond on a landmine
Waiting to explode
We’re dancing on thin ice before
Frozen from the winter’s cold
And if it were to crack below
I’d never let you go
Alone at last
I can’t wait till we’re alone at last
All I wanted was a second chance, second chance
To hold you in my arms at last
Forever, forever
I’d walk a thousand miles
Just to tell her, to tell her
Our love is still alive
And I’ll never, I’ll never
I’ll never let it die
Well, you better watch your step
She’s a diamond on a landmine
[Post-Chorus]
Better watch your step
She’s a diamond on a landmine
Better watch your step
She’s a diamond on a landmine
Waiting to explode
You better watch your step
She’s a diamond on a landmine
Better watch your step
She’s a diamond on a landmine
Better not touch
She’s a diamond on a landmine
Better to forget
She’s a diamond on a landmine
Waiting to explode
💣
BOOOM
whoops
Spooketing
02 Sep 2024-
Not that it matters at all. Or is somehow interesting. Or worth mentioning. But did you know that about 70% of NSA ops have a ‘HUMINT component’ (meaning there’s some TAO (read: CIA) dude on-site doing actual, literal spy game kinda stuff[0])? Would you be so kind and cue in some James Bond music, Alfred?[1].
But most mysterious to me: How do they have such amazing internal marketing to name their projects with brilliant terms like KITTYBINGE?
Or DEITYBOUNCE. DEITYBOUNCE?!?! That’s, like, what, poetry dude. And the balls. That’s some balls. Suits their megalomaniac panpsychopathic ‘psychology’.
Anyway.
COTTONMOUTH.
HALLUXWATER.
DANCINGOASIS.
The list goes on. But How?! HOW?! How in the fuck do they come up with this shit? Do they have a secret AI since the 90s? Artistic me spends hours and hours trying to come up with the lowest tier possible shitnames and fails even that.
Meanwhile a bunch of perpendicular shit-suits are apparently shit-walking name-gold whenever they sneeze. How do they do it? It drives me me nuts.
(Shh. Hey. You. Yeah, you. Do you agree that these are cool names? Yes? Then come, come around. Kitte, kitte, kitte. Come closer. Maybe I’ll tell you all of the deep state surveillance program names I ever found in the solar flares of dopamine dumpage that come with my disease. I’mma dump ’em for you. All of them. For real. “And then what?”. And then what not?!?! It’s free cool names. Knock yourself out. Turn them into something cool. Make it yours. Wear it proudly and maybe remind some them of their shitty Karma. I wonder how much of hell are just former deep state employees. Likely a couple. Anyway. Dumping. You ready? Ok. Ready? Here goes.
Sesame open
ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC
BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER, BUILDINGCODE, BULK, BUMPER
CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD, CHUJING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS
DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST
EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET
FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL
GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER
HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE
ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW
JABSUM, JACAMAR, JADEFALCON, JARGON, JARKMAN, JASPERRED, JAZZ, JEALOUSFLASH, JEWELHEIST, JOVIAL, JOBBER INCOMING, JOSY, JUMBLEDPET, JUPITER
KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE
LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY
MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY
NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC
OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH
PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II
QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER
RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY
SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN, SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT
TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT
UMORPH, UNLIMITED
VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED
WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER — ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP
XVTUBA
YELLOWSTONE, YETLING
ZENTOOLS, ZIGZAG, and ZIRCON
#electrospaces:
A
ABNER I – General-purpose cryptanalytic computer (delivered to the US Army’s ASA in 1952) *
ACIDWASH – Covert access point for a mobile phone network in Afghanistan, part of the MYSTIC program * *
ACORN – Compartment for Top Secret COMINT information (1950-1951) *
ACCORDIAN – Type 1 Cryptographic algorithm used in a number of crypto products
AETHER – ONI tool “to correlate seemingly disparate entities and relationships, to identify networks of interest, and to detect patterns” *
AGILITY – Alternative document viewer to the UIS Text Presenter, ideal for viewing Windows applications (MS Office, Adobe PDF) in their native format *
AGILEVIEW – NSA internet information tool or database
AIRGAP – Database which deals with priority DoD missions, and/or for access to the public internet *
AIRHANDLER (AH) – SIGINT collection package on the PREDATOR drone, like AST-221A,* handled by NSA/CSS Georgia and JSSO Digby *
AIRSTEED – Cell phone tracking program of the Global Access Operations (GAO) *
AIRWOLF – ?
ALAMITO – The mission of Mexico at the United Nations in New York *
ALBATROSS – Soviet cipher system of the 1940s and maybe 1950s
ALPHA – Retired SIGINT Exchange Designator for Great Britain
ALTEREGO – A type of Question-Focused Dataset based on E.164
AMBERJACK – SIGINT/EW collection and exploitation system
AMBLE – Retired SIGINT product codeword
AMBULANT (AMB) – SI-ECI compartment related to the BULLRUN program
ANARCHIST – Joint NSA-GCHQ program to intercept video from Israeli drones from an RAF facility on Cyprus *
ANCHORY – NSA software system which provides web access to textual intelligence documents
APALATCHEE – The EU mission in New York
APERIODIC – SI-ECI compartment related to the BULLRUN program
APEX – See Abbreviations listing
APPLE1 – Upstream collection site
APPLESAUCE – Civilian(CIA)-run station on Cyprus (1950s)
APRIL FLOWERS – SSO access capability supporting the Athens Olympics in 2004 *
APRIL STRAWBERY – Small-scale program that researched vulnerabilities in computer networks running critical infrastructure *
APSTARS – NSA tool that provides “semantic integration of data from multiple sources in support of intelligence processing” *
AQUADOR – Merchant ship tracking tool
ARCA – SIGINT Exchange Designator for ?
ARGON – The KH-5 reconaissance satellites (1961-1964) as well as a classification compartment of the defunct BYEMAN Control System (BCS).
ARGYLEALIEN – Method to cause a loss of data by exploiting zeroization of hard-drives *
ARKSTREAM – Implant used to reflash BIOS, installed by remote access or intercepted shipping
ARMADA SWEEP – Ship-based collection system for electronic communications data *
ARMOR – System related to the Predator drone *
ARTEMIS – SIGINT and Direction Finding system, probably for cell phones
ARTIFICE – Covername for a corporate partner for domestic long-distance cable access (presumably Verizon/MCI) *
ASPHALT – Software modem, increasing the volume of satellite signals *
ASPHALT-PLUS (A-PLUS) – See above
ASSOCIATION – NSA database/tool for metadata from personal communication systems (PCS), inluding GSM,* derived from FASCIA *
ATALANTA – EU anti-piracy operation
ATLAS – Cryptanalytic computer using magnetic drum storage technology, built by Engineering Research Associated (ERA, delivered to the US Navy for 1 million US dollar in 1950) *
AUNTIE – SI-ECI compartment related to the BULLRUN program
AURORAGOLD (AG) – Repository of data about international GSM/UMTS networks *
AUTO ASSOCIATION – Second party database
AUTOSOURCE – NSA tool or database
AQUACADE – A class of SIGINT spy satellites (formerly RHYOLITE)
AZUREPHOENIX – Cable tapping facility operated in cooperation with a trusted 3rd Party agency, part of the RAMPART-A program *
back to top
B
BACCHUS – ASA-provided electromechanical cipher equipment for South Korean forces (1953)
BALLOONKNOT – TAO computer hacking project *
BAMBOOSPRING – ?
BANCROFT – KY-67 voice encryption system
BANISTER – The Columbian trade bureau in New York *
BANYAN – NSA tactical geospatial correlation database?
BANYAN – Database for (landline) telephone metadata * and/or calling-tree analysis tool which contains all FASCIA II call records *
BASECOAT – Program targeting the mobile phone network on the Bahamas (sigad: US-3310A) *
BASILHAYDEN – Joint GCSB-NSA operation (proposed) to tap communications between the Chinese consulate and its passport office in Auckland, New Zealand (GCSB codename: FROSTBITE) *
BASTE – Retired SIGINT product codeword
BATON – Type 1 Block cipher algorithm, used with many crypto products
BAYBRIDGE – Circuit for the exchange of metadata and analytic information * related to the NSA’s European Cryptologic Center (ECC) *
BEACHMAN – Some kind of military program *
BEAMER – ?
BEGGAR SHADOW – Navy airborne SIGINT missions
BELLTOPPER – NSA database *
BELLVIEW – SIGINT reporting tool; for in-depth geospatial metadata analysis *
BIGBIRD – A cable modernization effort, which began in 2004 to support a more focused, agile collection, a more cost-effective cover, and access to new higher priority cable systems; part of the FAIRVIEW/SSO broad access, focused collection strategy.*
BIGDIPPER – Billing records data flow within BR FISA collection under FAIRVIEW *
BIG LOOK – ELINT systems on Navy EC-121s to detect SAM radars (Vietnam War)
BIGOT – List of personnel cleared for access to highly sensitive information or operations
BIG RIB – airborne telemetry collection program using RB-57 aircraft based in Adana, Turkey (1965-?)
BINOCULAR – Former NSA intelligence dissemination tool
BIRCHWOOD – Upstream collection site
BITTERSWEET – first “advisory warning” (COMINT-provided alert) plan for airborne SIGINT missions (1952)
BLACKBOOK – ODNI tool for large-scale semantic data analysis *
BIRDWATCHER – Automated survey system *
BLACKBELT – A FAIRVIEW access *
BLACKFOOT – The French mission at the United Nations in New York *
BLACKHAWK – Program for surveillance of the Turkish mission at the UN in New York
BLACKHEART – Collection through FBI implants *
BLACKMAGIC – Demodulation software on the SCARAB computer, used in 2001 aboard the EP-3E aircraft *
BLACKNIGHT – Filtering & Selection tool * to be replaced by COURIERSKILL *
BLACKPEARL – NSA database with SIGINT 5-tuple (TCP/IP), identified routers, routing protocols, and SIGINT access points, maybe also case notations * * *
BLACKWATCH – NSA reporting tool
BLARNEY – Program for intercepting foreign phone and internet communications within the US under FISA authority (since 1978)*
BLAZING SADDLES – CSE tool? *
BLEAKINQUIRY – Metadata database of potentially exploitable VPNs *
BLUEANCHOR – Partner providing a network access point for the YACHTSHOP program
BLUEFISH (BLFH) – Compartment of the KLONDIKE control system
BLUESASH – Network used by NTOC operational analysts *
BLUE SKY – Airborne COMINT program in Far East (1952-?)
BLUESNORT – TURMOIL type or site? *
BLUESTREAM – Cryptologic collection system aboard US Navy ships
BLUEZEPHYR – Sub-program of OAKSTAR
BOGART – General-purpose cryptanalytic computer from the early 1950s using transistors *
BOOKISHMUTE – NSA hacking tool or code included in the Shadow Brokers leak *
BOOTY – Retired SIGINT product codeword
BORESIGHT – New High Frequency Direction Finding system (2012) *
BORGERKING – Something related to Linux exploits *
BOUNDLESSINFORMANT – DNI and DNR metadata visualization tool
BOURBON – Joint NSA and GCHQ program for breaking Soviet encryption codes (1946-?)*
BOXINGRUMBLE – Network attack that was countered by QUANTUMDNS *
BRAZEN – NSA access to the public internet, in 2004 replaced by OUTPARKS *
BRICKTOP – Project to learn about new malware by intercepting e-mail from several security companies (2009) *
BRIDE – Second codename for what eventually became VENONA *
BROKENRECORD – NSA tool
BROADSIDE – Covert listening post in the US embassy in Moscow
BROOMSTICK – ?
BRUNEAU – The Italian embassy in Washington DC *
BRUTUS – Tool or program related to MARINA *
BUCKSHOT YANKEE – Operation to remove the computer worm Agent.btz from infected classified and unclassified DoD networks (2008-2009) *
BUFFALOGREEN – The name ORANGECRUSH was known to Polish partners *
BUGCATCHER – Internet (DNI) transit cable access under the FAIRVIEW program *
BULLDOZER – PCI bus hardware implant on intercepted shipping
BULLRUN – An NSA COI for decryption of network communications
BULLSEYE – NSG High-Frequency Direction-Finding (HF-DF) network (now called CROSSHAIR)
BYEMAN (BYE) – Retired SCI control system for overhead collection systems (1961-2005)
back to top
C
CADENCE – Tasking tool and database for internet communications; provides a transparent interface to BLACKNIGHT/SHIPMASTER, COURIERSKILL, and other site dictionaries *
CAJABLOSSOM – Automated system for analysing and profiling internet browsing histories
CAKEBREAD – Codename for Osama bin Laden
CALIX – System used at the Waihopai satellite intercept station *
CALYPSO – Remote SATCOM collection facility
CAMBERDADA – Project using SIGINT collection to learn about new malware *
CAMELUS – Project to relocate NSA’s HF Remote Collection Facility on Okinawa *
CANDYGRAM – Laptop mimicking GSM cell tower, sends out SMS whenever registered target enters its area, for tracking and ID of targets
CANYON – Class of COMINT spy satellites (1968-1977)
CANOE – Compartment for Top Secret COMINT information (1952-1953) *
CANNON LIGHT – Counterintelligence database of the US Army
CANYONDUST – Ground-based 24/7 INMARSAT geolocation capability *
CAPRICORN – (former?) database for voice data *
CARBOY – Second Party satellite intercept station at Bude, England
CARBOY II – Units of ECHELON which break down satellite links into telephone and telegraph channels
CARDAMON – Probably an XKEYSCORE site of the Australian DSD *
CARILLON – Complex of five IBM-370 (or 360, later four IBM 3033s) high performance computers strapped together at Fort Meade, for a mostly traffic analytic process (1973)
CARPAT – NSA contact chaining algorithm *
CASport – NSA user authorization service
CATALYST – Computer system capable of automatically analyzing the massive quantities of data gathered across the entire intelligence community *
CELLFINDER – Application to geolocate the locations of Base Transceiver Stations (BTS) *
CENTER ICE – Secure communications system providing TS/SI-level tipping and threat information as well as direct support to operations for tactical units of the SIGINT Seniors Europe or 14-Eyes * * *
CENTERMASS – NSA tool or database
CENTRICDUD – Tool that can read and write bytes in the CMOS of a targeted Windows computer *
CERF CALL MOSES1 – Contact Event Record Format – for certain telephony metadata *
CERNET – Open Source information used for the TREASUREMAP tool *
CHALET – First codename for CHALET/VORTEX class SIGINT satellites (the codename was changed after 1979 leak)
CHALKFUN – Analytic tool, used to search the FASCIA database *
CHAOS – CIA domestic spying operation (1967-1973)
CHARGER HORSE – Communication net for afloat direct SIGINT support detachments (Vietnam War, 1969-?)
CHASEFALCON – Major program of the Global Access Operations (GAO) *
CHATTERII – Communications tool (connecting to 3rd Party agencies?)
CHEER – Retired SIGINT product codeword
CHENEY – Soviet cipher system, probably of the 1950s
CHEROKEE – (former) handling instruction: limited to senior officials
CHESS – Compartment of TALENT KEYHOLE for the U-2 spy plane
CHEWSTICK – NSA tool or database
CHIMNEYPOOL – Framework or specification of GENIE-compliance for hardware/software implants
CHIPPEWA – Some communications network, involving Israel *
CHUTE – Retired SIGINT product codeword
CIMBRI – Probably a metadata database *
CINEPLEX – Analytical tool *
CIRCUIT RAPTOR – System for processing data from circuit switched telephone networks *
CLARIFYMIND – Pilot program for secure wireless communications *
CLASSIC – ?
CLASSIC BULLSEYE – Worldwide ocean SIGINT surveillance or direction finding system (1960’s-?)
CLASSIC TROLL – System that increases the probability of SIGINT intercept by 500%, supporting tactical and national requirements
CLASSIC WIZARD – Satellite ocean surveillance system for ELINT
CLEARSIGHT – Processing system related to COURIERSKILL *
CLEVERDEVICE – Upstream collection site
CLIFFSIDE (CS) – Trans-Pacific cable access site under the FAIRVIEW program * *
CLOISTER – NSA language center in College Park staffed with contractor native speakers of Russian and Eastern European languages (1960s and 70s) *
CLOUD – NSA database
CLOUD – DSP program implementing graph algorithms in a cloud computing environment *
CLOUDRUNNER – Successor for MARINA? (March 2013) *
CLOUDSHIELD – System that terminates a client-side connection to a malicious server and blocks the server’s response *
COASTLINE – NSA tool or database
COBALTFALCON – Sub-program of OAKSTAR
COBRA BALL – RC-135 reconaissance aircraft with a primary FISINT mission *
COBRA FOCUS – Counter-terrorism SIGINT fusion center at NSA-G, first for operations in Iraq, later expanded to other regions * *
COGNOS – NSA tool or database
COLERIDGE – Soviet cipher system of the 1940s
COMFY LEVI – C-130s with roll-on SIGINT suites (1968-?)
CORDOBA – Type 2 Cryptographic algorithm used in a number of crypto chips
COMBAT SENT – RC-135 reconaissance aircraft with a primary technical ELINT mission *
COMMONGROUND – System used at the Waihopai satellite intercept station *
COMMONVIEW – Internal NSA monitoring tool *
CONCERTO – NSA’s internal personnel system, with most personnel information in HR CONCERTO and name, SSN and clearances in SECURITY CONCERTO *
CONFIRM – NSA database for personnel access
CONTRAOCTAVE – Reference database that contains phone numbers that should not be tasked in OCTAVE or UTT.* * Used to determine ‘foreigness’ *
CONVERSION QUEST – Part of SHAREDQUEST relating to antenna command and control *
CONVEYANCE – Voice content ingest processor *
COPILOT – System that automatically scans digital data for things like language, phone and creditcard numbers and attachments *
COPPER DUNE – Operation against Al Qaida on the Arabian Peninsula (AQAP) in Yemen
COPSE – Compartment for Top Secret COMINT information (1949-1950) *
COPTINE – nATO codeword for classified (top secret) material about Western Stay-Behind Organisations (SBO) that were active during the Cold War, until approx. 1992.
CORALINE – NSA satellite intercept station at Sabena Seca at Puerto Rico (closed)
CORALREEF – Database for VPN crypto attack data *
CORONA – A series of photographic surveillance satellites (1959-1972) as well as a classification compartment of the defunct BYEMAN Control System (BCS).
CO-TRAVELER – Set of tools for finding unknown associates of intelligence targets by tracking movements based upon cell phone locations *
COURIERSKILL – High performance content Filtering and Selection (F&S) system for internet traffic, as well as for the WEALTHYCLUSTER 2.0 system. Designed to replace the legacy BLACKNIGHT system. COURIERSKILL is a project under the THEORYMASTER program.*
COWBOY – The DICTIONARY computer used at the Yakima station of ECHELON *
COWBOY – FISA authorized collection under the FAIRVIEW program (sigad: US-984T) *
CRAFTY SHACK – Analytics documentation *
CRANKSHAFT – Codename for Osama bin Laden
CREAM – Compartment for Top Secret COMINT information (1946-1947) *
CREDIBLE – Transport of intelligence materials to partner agencies
CREST – Database that automatically translates foreign language intercepts in English *
CRISSCROSS – Database of telecommunications selectors, operated by the CIA and also used by DOJ, DOD and NSA
CROSSBEAM – GSM module mating commercial Motorola cell with WagonBed controller board for collecting voice data content via GPRS (web), circuit-switched data, data over voice, and DTMF to secure facility, implanted cell tower switch
CROSSEYEDBEAR – FAIRVIEW support to TAO shaping operations under EO 12333 *
CROSSHAIR – Multinational High-Frequency Direction-Finding (HF-DF) network (formerly BULLSEYE)
CRUMPET – Covert network with printer, server and desktop nodes
CULTWEAVE – Smaller size SIGINT database *
CULTWEAVE II – Database for VOICESAIL metadata *
CYBERCOP – Cyber attack visualisation tool
CYBERQUEST (CQ) – Cyber threat discovery mission? (since 2008)*
CYBERTRANS – A common interface to a number of underlying machine translation systems *
CYCLONE Hx9 – Base station router, network in a box using Typhon interface
CYR – Intelligence exchange agreement between DIA and the Israeli military intelligence directorate (1968) *
back to top
D
DAFF – Codeword for products of satellite imagery
DAMEON – Remote SATCOM collection facility
DANCER – Project initiated in 1965 to employ South Vietnamese as linguists in US SIGINT operations
DANCINGOASIS (DGO) – SSO program collecting data from fiber optic cables between Europe and the Far East (since 2011) *
DANDERSPRITZ – Software tool that spoofs IP and MAC addresses, intermediate redirector node
DANGERMOUSE – Tactical SIGINT collecting system for like cell phone calls
DARDANUS – Remote SATCOM collection facility
DARKQUEST (DQ) – Automated FORNSAT survey system * that can for example identify the presence of a VPN *; part of SHAREDQUEST *
DARKTHUNDER – FAIRVIEW support to TAO shaping operations under EO 12333 *
DAUNT – Compartment for Top Secret COMINT information (1959-1960) *
DAYSEND – Program at NSA’s communications complex receiving intercepts files (1973)
DEADSEA – 4th party computer network exploitation effort *
DECKPIN – NSA crisis cell activated during emergencies
DECODEORDAIN – Query tool for e-mail messages contained in PINWALE *
DEEPDIVE – XKEYSCORE version that can process internet traffic at data rates of 10 gigabit per second *
DEEPSKY – Overhead Collection processing system *
DELLA – Special-purpose cryptanalytic computer machine from the early 1950s *
DELTA – Former SCI control system for intercepts from Soviet military operations
DEMONSPIT – Dataflow for bulk telephony metadata acquired from major Pakistani telecom providers *
DENIM – Retired SIGINT product codeword
DESOTO – Processing system related to FAIRVIEW Transit collection under FAA 704 & 705b *
DESPERADO – NSA software tool to prepare reports
DEWSWEEPER – Technique to tap USB hardware hosts *
DIANA – ASA-provided one-time-pad system for South Korean forces (1953)
DIKTER – SIGINT Exchange Designator for Norway
DINAR – Compartment for Top Secret COMINT information (1961-1965) *
DIONYSUS – Remote SATCOM collection facility
DIRESCALLOP – Method to circumvent commercial products that prevent malicious software from making changes to a computer system
DIRTSHED – 4th party collection program *
DISCOROUTE – NAC/GCHQ repository for router configuration files from CNE and passive SIGINT, like for example telnet sessions * *
DISHFIRE – Storage and retrieval system for text messages (SMS), offering retrieval, viewing, and some manipulation of SMS messages passed through various worldwide networks.*
DISTANTFOCUS – A pod for tactical SIGINT and precision geolocation (since 2005) *
DISTILLERY – Tactical collection system(?) *
DISTILLERY – Stream-based platform for executing hacking identification applications *
DIVERSITY – SIGINT Exchange Designator for ?
DOBIE – The South African consulate and mission at the UN in New York *
DOGCOLLAR – A type of Question-Focussed Dataset based on the Facebook display name cookie
DOGHUT – Upstream collection site
DORIAN – Classified designation for the reconnaissance mission (1966) and equipment of the experimental Manned Orbiting Laboratory (MOL), part of the defunct BYEMAN Control System (BCS).
DOUBLEARROW – One of NSA’s voice processing databases? *
DOUBLE PLUS – A probably defunct classification compartment or dissemination marking (used by the White House in the 1970s)
DRAGGABLEKITTEN – An XKEYSCORE Map/Reduce analytic *
DRAWSTRING – Project to “remote” more intercept facilities because of budget cuts (1973-?)
DREADNOUGHT – NSA operation focused on Ayatollah Khamenei *
DRTBOX – System for processing data from mobile communication networks
DRUG – Third codename for what eventually became VENONA *
DRUID – SIGINT Exchange Designator for third party countries
DRYAD – A US military numeral cipher/authentication system
DRYTORTUGAS – Analytic tool
DUALTIRE – System used at the Waihopai satellite intercept station *
DUSKPALLET – SSO interception program for GSM networks in Kenya (US-3270), part of the MYSTIC program *
DYNAMO – SIGINT Exchange Designator for Denmark
DYNO – Classifed codename for the Galactic Radiation And Background (GRAB) Low-Earth Orbit ELINT satellite (1960-1962 launches)
back to top
E
EAGLE – Upstream collection site under the FAIRVIEW program *
EAGLEVIEW – Data processing tool for GSM cellular networks, successor of PILOTHOUSE *
EARPOP – Former NSA/NRO compartment that apparently protected information related to satellite “overhead” collection systems in the 1960s and 1970s * *
EASYCHAIR (EC) – CIA research project for developing resonant cavity covert listening devices (bugs)
ECHELON – Sub-program of FROSTING directed against INTELSAT satellites *
ECHO – SIGINT Exchange Designator for Australia
ECHOBASE – SIGINT analytics architecture that includes GHOSTMACHINE and Identifier Scoreboard *
ECRU (EU) – Compartment of the ENDSEAL control system
EDEN – Upstream collection site under the FAIRVIEW program, maybe in New York City *
EIDER – Compartment for Top Secret COMINT information (1955-1959) *
EIKANOL (or: EIKONAL) – Joint NSA-BND operation to tap a fiber-optic cable of Deutsche Telekom in Frankfurt, part of the RAMPART-A program
EINSTEIN – Cell phone network intercepting equipment used by SCS units
EINSTEIN – Intrusion detection system for US government network gateways (deployed in 2004)
EINSTEIN 2 – Second version of the EINSTEIN program for detecting malicious network activity
EINSTEIN 3 – Third version of the EINSTEIN program that will monitor government computer traffic on private sector sites too *
ELEGANTCHAOS – Large scale FORNSAT data analysis system *
EMERALD – Alternate codename for operation WHARPDRIVE(?) *
ENDSEAL (EL) – SCI control system
ENDUE – A COI for sensitive decrypts of the BULLRUN program
ENTOURAGE – Directional finder for line of bearing for GSM, UMTS, CDMA, FRS signals, works with NEBULA active interrogator within GALAXY program
EPICSHELTER – Data backup system to recover information from particular NSA sites, designed by Edward Snowden *
EQUATION (Group) – Nickname given by Kaspersky to a highly advanced computer hacking group, suspected of being tied to NSA *
ETCHINGSPIN – SSO mobile telephone interception program, part of the MYSTIC program *
EVENINGEASEL – Program for surveillance of phone and text communications from Mexico’s cell phone network (sigad: US-3411), part of the MYSTIC program *
EVILOLIVE – Iinternet geolocation tool
EVOLVED MUTANT BROTH – Second party database
EXPLORER I/II/III – Intercept operations using unmaned equipment on hilltops during the Vietnam War (1970-1972)
EYESPY – System that scans data for logos of companies, political parties and other organizations, as well for pictures with faces for facial recognition *
back to top
F
FACELIFT – Codeword related to NSA’s Special Source Operations division *
FACTOR – NSA program targeting North Vietnamese maritime infiltration (1970-?)
FAIRVIEW – Domestic cable tapping program in cooperation with AT&T (since 1985)*
FAIRVIEWCOTS – System for processing telephony metadata collected under the FAIRVIEW program *
FALLENORACLE – NSA tool or database
FALLOUT – DNI metadata ingest processor/database
FALLOWHAUNT (FH) – Mobile satellite services system used at the Misawa and Waihopai stations, New Zealand, part of SHAREDQUEST * *
FARLEY – (SIGINT exchange designator?)
FARMER – Projected general-purpose computer for both cryptanalysis and traffic analysis (1950s)
FARNDALE – ? *
FASCIA – DNR (telephony) metadata ingest processor/database *
FASCIA II – Primary source of telephone metadata for target development. The FASCIA II data warehouse contains PSTN, PCS, Media Over IP (MOIP), High Powered Cordless Phone (HPCP) Call Detail Records, ISAT, and VSAT contact events. FASCIA data are accessed by BANYAN, ASSOCIATION, MAINWAY, HOMEBASE and SEDB. It formerly contained internet metadata which are now in MARINA.*
FASCINATOR – Series of Type 1 encryption modules for Motorola digital-capable voice radios
FASTBAT – Telephony related database?
FASTFOLLOWER – Tool to identify foreign agents who might tail American case officers overseas by correlating cellphone signals
FASTSCOPE (FS) – NSA database for flight lists and manifests, including passenger names *
FIFTYEXCLAIM – Cover term representing NSA’s contract with Computer Sciences Corporation (CSC) for mission support in Bad Aibling, Germany *
FIRE ANT – Open Source visualisation tool
FIREBIRD – Cable tapping facility operated in cooperation with a trusted 3rd Party agency, part of the RAMPART-A program *
FIREFLY – NSA key generation scheme, used for exchanging EKMS public keys
FIRETRUCK – SIGINT tool or database
FISHBOWL – NSA program for securing commercial smartphones
FISHWAY – Data batching & distribution system used for FAIRVIEW and BLARNEY collection * *
FLAMINGO – Antenna installation (2004) *
FLARE – Retired SIGINT product codeword
FLATLIQUID – TAO operation against the office of the Mexican president *
FLEMING – The embassy of Slovakia in Washington DC *
FLINTLOCK – The DICTIONARY computer used at the Waihopai station of ECHELON *
FLOWBEE – Project of NSA’s Research Directorate for reducing the volumes of metadata collected from high-speed links (2008) *
FLUTE – System used at the Waihopai satellite intercept station *
FOREJUDGE – General PROFORMA information/descriptions *
FOREMAN – Tactical SIGINT database? Used to determine ‘foreigness’ *
FOURSCORE – (former?) database for fax and internet data *
FOXAMI – (SIGINT exchange designator?)
FOXTRAIL – NSA tool or database *
FREEFLOW-compliant – Supported by TURBULENCE architecture
FRESNELEFFECT – System used at the Waihopai satellite intercept station *
FRETTING YETI – Mobile gateway identification analytic *
FRIAR – Cable station of AT&T at the East coast under the FAIRVIEW program * *
FRIARTUCK – VPN Events tool or database (CSEC?)
FRONTO – Retired SIGINT Exchange Designator for ?
FROSTBITE – GCSB codename for operation BASILHAYDEN
FROSTBURG – Connection Machine 5 (CM-5) supercomputer, used by NSA from 1991-1997
FROSTING – Umbrella program for collecting and processing emanations from communication satellites (est. 1966)*
FROTH – Compartment for Top Secret COMINT information (1953-1954) *
back to top
G
GALACTICHALO – Remote SATCOM collection facility
GALAXY – Find/fix/finish program of locating signal-emitting devices of targets
GALLANT PHOENIX – Joint operation of 22 countries, led by JSOC from Jordan, for gathering intelligence about ISIS fighters in Syria and Iraq *
GALLOWAY – System related to the Predator drone *
GAMBIT – The KH-7 reconaissance satellite (1963-1967) as well as a classification compartment of the defunct BYEMAN Control System (BCS).
GAMBIT – Prototype web portal for the AMOD (Analytical Modernization) QFD (Question Focused Dataset) strategy (2011)
GAMIRA – Overhead Collection processing system *
GAMMA (G) – Compartment for highly sensitive communication intercepts
GAMUT – NSA collection tasking tool or database
GARLICK – The NSA satellite intercept station at Bad Aibling (Germany)
GATEKEEP – Processing system for internet cable tapping *
GATEKEEPER – User account management system to apply for and maintain access to many NSA Databases *
GAVEL – Retired SIGINT product codeword
GEMINI – Remote SATCOM collection facility
GEMINI – DIA intelligence portal for access to GEOINT database(s)
GENESIS – Filtering tool for internet communications, related to XKEYSCORE
GENESIS – Modified GSM handset for covert network surveys, recording of RF spectrum use, and handset geolocation based on software defined radio
GENIE – Overall close-access program, collection by Sigads US-3136 and US-3137 * *
GHOSTHUNTER (GH) – System to geolocate targets when they log onto the internet, for example through VSAT or internet cafes (since 2006) *
GHOSTMACHINE (GM) – NSA’s Special Source Operations cloud analytics platform
GHOSTWOLF – Project to capture or eliminate key nodes in terrorist networks through actionable geolocation intelligence * also related to CT10 *
GINPENNANT – SSG cloud framework *
GILGAMESH (GMESH) – Predator-based NSA geolocation system used by JSOC *
GISTQUEUE (GQ) – NSA tipping and reporting database
GJALLER – NSA tool or database
GLAIVE – (Satellite) interception common architecture *
GLINT – Compartment for Top Secret COMINT information (1947-1949) *
GLOBALBROKER – NSA tool or database
GLOBALREACH – Tool for federated querying metadata records shared by NSA and its Five Eyes partners *
GLOBALTIPPER (GT) – System for internal requests of information *
GLOBALVISION – Single sign-on federated query tool (since 2005) *
GLOBALWATCH – Software suite within the Real Time Regional Gateway (RT-RG)
GLOMAR – “neither confirm nor deny” a response to a FOIA request
GM-Halo/DPS – Data cloud *
GM-PLACE – Database for the BOUNDLESSINFORMANT tool *
GODLIKELESION – Modernization program for NSA’s European Technical Center (ETC) in Wiesbaden in 2011 *
GODSURGE – Runs on FLUXBABBITT circuit board to provide software persistence by exploiting JTAG debugging interface of server processors, requires interdiction and removal of motherboard of JTAG scan chain reconnection
GOLD – Joint SIS-CIA operation to wiretap Soviet army landlines through a tunnel under Berlin (1953-1956; British codename: STOPWATCH)
GOLDBERG – First magnetic drum storage technology (1947)
GOLDENCARRIAGE – NSA corporate servers, used by the AURORAGOLD application *
GOLDENRETRIEVER – Storage and/or distribution system *
GOLLUM – Computer implant created by a partner agency *
GOPHERRAGE – Pilot project that seeks to develop a hypervisor implant to provide implant capabilites and a back door *
GOSSAMER – SIGINT/EW collection and exploitation system
GOTHAM – Processor for external monitor recreating target monitor from red video
GOURMETTROUGH – Configurable implant for Juniper NetScreen firewalls including SSG type, minimal beaconing
GOUT – Subcompartment of GAMMA for intercepts of South Vietnamese government communications
GOVPORT – US government user authentication service
GRAB – Galactic Radiation and Background, cover name for a series of ELINT satellites as well as a classification compartment of the defunct BYEMAN Control System (BCS).
GRANDMASTER – Processing system for internet traffic, has been replaced by WEALTHYCLUSTER and TURMOIL *
GREY FOX – The 2003 covername of the Mission Support Activity (MSA) of JSOC
GREYSTONE (GST) – CIA’s highly secret rendition and interrogation programs *
GRIMPLATE – Tool for identifying adversarial use of BitTorrent *
GRIZZLY STEPPE – Russian malicious cyber activities related to the 2016 US presidential elections
GROUPDIVE – Network used by NTOC operational analysts *
GUARDRAIL I / II / IV / V – Series of Army airborne SIGINT collection systems on RC-12 aircraft
GUNMAN – NSA 1984 OPSEC project to remove 11 tons of electronic devices from the US Embassy of Moscow for thorough inspection in the US. GUNMAN eventually found KGB bugs planted into electric typewriters.
GUPY – Subcompartment of GAMMA for intercepts from Soviet leadership car phones (1960’s-70’s)
back to top
H
HAIRBALL – Project of NSA’s Research Directorate (2008) *
HAMMOCK – Direct SIGINT support process for US Air Force missions over North Vietnam (1965-?)
HANDLESS – Collection program for internet data *
HAPPYFOOT – Program that intercepts traffic generated by mobile apps that send a smartphone’s location to advertising networks
HARD ASSOCIATION – Second party database
HARMONY – DoD national database for DOCEX information, run by the NGIC
HARVAN – A probably defunct classification compartment or dissemination marking (used by the White House in the 1970s)
HARVEST – A supercomputer, built by IBM for nearly 10 million US dollar and used by NSA from 1962-1976 *
HAVASU – International call detail records collection under FAIRVIEW *
HAVE BLUE – Development program of the F-117A Stealth fighter-bomber
HAVE QUICK (HQ) – Frequency-hopping system protecting military UHF radio traffic
HAWKEYE – AFSS project for an airborne direction-finding system; never operational (1963)
HAYMAKER – Operation against Al Qaida in Afghistan *
HEADRESS NU – Very high priority project targeting a Pakistan government/military secure network *
HEARTBEAT – Apparently a data handler system, built by Edward Snowden* and/or successor of EPICSHELTER, or an index of surveillance systems *
HEMISPHERE – Program under which AT&T provides telephone records to the DEA
HEMLOCK – The Italian embassy in Washington DC *
HERCULES – CIA terrorism database
HERETIC – NSA tool or database
HERESYITCH – UC collateral tool, collaborative program between NSA units T1222 and SSG *
HERMOS – Joint venture between the German BND and another country with access for NSA (2012)*
HERON – Retired SIGINT product codeword
HEXAGON – The KH-9 (“Big Bird”) photographic reconaissance satellites (1971-1986) as well as a classification compartment of the defunct BYEMAN Control System (BCS).
HIGHCASTLE – Tactical database?
HIGHDECIBEL – Local Area Network (LAN) for the FAIRVIEW and BLARNEY programs *
HIGHLANDS – Technique for close access collection from computer implants *
HIGH PRIDE – ? *
HIGHTIDE – NSA tool or database
HOBGOBLIN – NSA tool or database
HOLLOWPOINT – Software defined radio platform
HOMEBASE – Database which allows analysts to coordinate tasking with DNI mission priorities, and/or reporting on targets, since 2005 accessible through GLOBALVISION *
HOMEMAKER – Upstream collection site
HOMING PIGEON – Tool for correlating GSM handsets from airplane passengers to subscribers * *
HOTZONE – ?
HYDRA – CIA program to secretly access databases maintained by foreign countries and extract data to add to US watchlists *
HYPERWIDE – A frequency hopper, component of the SNOWFLAKE system *
HYSON – Retired SIGINT product codeword
back to top
I
ICEBERG – Major NSA backbone project *
ICE CASTLE – Intelligence exchange agreement between DIA and the Israeli military intelligence directorate (1988) *
ICREACH – Tool for sharing communications metadata among the US Intelligence Community (since 2007)*
IDITAROD (IDIT) – Compartment of the KLONDIKE control system
IGLOO WHITE – Program for detecting movement of vehicles through unattended ground sensors, tested in Laos from 1968-1973
INCENSER – Joint NSA-GCHQ program for tapping an internet cable between Europe and Asia with the help of Cable & Wireless; part of the WINDSTOP program
INDEX – Team at Menwith Hill Station (MHS) *
INDIA – SIGINT Exchange Designator for New Zealand (retired)
INDRA – Satellite intercept station near Khon Khaen, Thailand (1979-ca. 2000)
INTERQUAKE (IQ) – A terrestrial signals knowledge base and interface *
INTOLERANT – Data set stolen by hackers, discovered and exploited by CSEC and Menwith Hill Station since 2010 *
INTREPID SPEAR – The 2009 covername of the Mission Support Activity (MSA) of JSOC
INTRUDER – Series of ELINT and COMINT spy satellites (since 2009)
IRISHBEAUTY – the Unified Targeting Tool (UTT) *
IRON HORSE – NSA equipment to display intercepted morse grid-positions on a radar scope (1967-?)
IRONSAND (IS) – Second Party satellite intercept station at Waihopai, New Zealand
IRRITANT HORN – Five Eyes pilot project for hacking target’s phone connections to app stores in order to implant spyware *
ISHTAR – SIGINT Exchange Designator for Japan (retired)
ISLANDTRANSPORT (IT) – Internal data distribution system, also used for QUANTUM * *
IVORY – Retired SIGINT product codeword
IVY BELLS – NSA, CIA and Navy operation to place wire taps on Soviet underwater communication cables
back to top
J
JACKHAMMER – System used at the Waihopai satellite intercept station *
JACKKNIFE – The NSA satellite intercept station at Yakima (US)
JACKPOT – Internal NSA process improvement program (early 1990s – early 2000s) *
JADE – First codename for what eventually became VENONA *
JAEGER – Former SIGINT Exchange Designator for Austria
JEMA – (see Abbreviations listing)
JOSEKI-1 – Classified Suite A algorithm
JOURNEYMAN – Umbrella program for transforming the way SIGINT analysts can write and disseminate their reports *
JUBILEECORONA – NSA unit *
JUGGERNAUT (JUG) – Ingest system that processes intercepted calls from mobile phone networks * *
JUGGLER – Collection program for internet data *
JUMPDOLLAR – Tool to support various file systems *
JUMPSEAT – Class of SIGINT reconnaissance satellites (1971-1983)
JUNE – FBI classification marking for information related to unwarranted electronic surveillance and surreptitious entries * JUNIORMINT – Implant digital core, either mini printed circuit board or ultra-mini Flip Chip Module, contains ARM9 micro-controller, FPGA Flash SDRAM and DDR2 memories
JUPITER GARRET – Operation against Al Qaida in East Africa (EA) in Somalia
[NSA codenames used under the SPINALTAP program]
NSA codenames used under the SPINALTAP program for
combining data from active hacking operations
and passive signals intelligence collection.
back to top
K
KAMPUS – SIGINT Exchange Designator for South Korea (retired) *
KANDIK (KAND) – Compartment of the KLONDIKE control system
KARMA POLICE – Second party database
KATEEL – The Brazilian embassy in Washington *
KEA – Asymmetric-key Type 2 algorithm used in products like Fortezza, Fortezza Plus
KEELSON – Internet metadata processing system *
KEYCARD – Premier target-based Filtering and Selection database; integral part of the TURMOIL collection system and a member of the TURBULENCE suite of tools. Interfaces are the UTT, OCTAVE and the KEYCARD GUI.*
KEYRUT – Retired SIGINT Exchange Designator for ?
KEYSTONE – Collection program for internet data *
KILOMISER – System used at the Waihopai satellite intercept station *
KILTING – ELINT database
KIMBO – Retired SIGINT product codeword (used in 1964)
KIRKBOMB – Windows kernel examination to detect loaded drivers and processes *
KITTYBINGE – Processing system for intercepting foreign Lawful Intercept systems *
KLIEGLIGHT (KL) – Reporting vehicle used to forward time-sensitive SIGINT technical information to NSOC, SIGINT producers and Cryptologic Support Groups *
KLONDIKE (KDK) – Control system for sensitive geospatial intelligence
KLONDIKE – The embassy of Greece in Washington DC *
KNIGHTHAWK – Probably a military SIGINT tool
KODA – Method for summarizing very large textual data sets
KOZYKOVE (KK) – A FAIRVIEW site *
KRAUSS – System used at the Waihopai satellite intercept station *
KRONE – Retired SIGINT product codeword
back to top
L
LACEBARK – NSA project to upgrade South Vietnamese SIGINT communications security
LACONIC (LAC) – Retired NSA dissemination control marking
LADYLOVE – The NSA satellite intercept station at Misawa, Japan (since 1982)
LAMPSHADE – Some kind of INMARSAT data *
LANYARD – The KH-6 reconaissance satellites (1963) as well as a classification compartment of the defunct BYEMAN Control System (BCS).
LARUM – Retired SIGINT product codeword
LATEN(T)TH(R)EAT – System that breaks intercepted satellite signals down into individual communications *
LAUNDROMAT – Accesses to yet unknown sources, similar to DUSKPALLET *
LEAKYFAUCET – Flow repository of 802.11 WiFi IP addresses and clients via STUN data *
LEGALREPTILE – System that collects text message and call metadata, showing who is contacting whom and when *
LEMONWOOD – NSA satellite intercept station in Thailand
LEXHOUND – CCE Extraction Architecture * and/or Front-end tool that performs Google-like searching across repositories *
LIBERTY – First word of nicknames for collection and analysis programs used by JSOC and other sensitive DOD activities *
LIBERTY BLUE – Modified RC-12 Guardrail surveillance airplane used by JSOC’s Mission Support Activity (MSA)
LIGHTNING – Research project into a “1,000 megahertz” computer. Didn’t produce a functional computer but pioneered many technology “bricks” (1950s)
LILDIPPER – Billing records data flow within BR FISA collection under FAIRVIEW *
LIONHEART – Traditional search tool for the PINWALE database, searching both content and metadata *
LIONHEART Fusion – Search engine for the PINWALE database, which searches the most recent 13 months *
LIONROAR – Search engine for the PINWALE database, which searches between 13 months and 5 years back *
LIONSHARE – Internal NSA process improvement program (2003-2008) *
LITHIUM – Covername for a corporate partner for domestic long-distance cable access under the BLARNEY program (presumably AT&T) * **
LITTLE CLOUD – Airborne collection program using RB-57 aircraft based in Pakistan (1963-1965?)
LOCATOR – Some kind of NSA database *
LODESTAR – Cryptanalytic computer subcomplex at NSA headquarters (1978)
LODESTONE – NSA’s CRAY-1 supercomputer
LOGGERHEAD – Device to collect contents of analog cell phone calls (made by Harris Corp.) *
LOLLYGAG – SSO mobile telephone interception program, part of the MYSTIC program *
LOMA – SCI control system for Foreign Instrumentation and Signature Intelligence* *
LONGFELLOW – Soviet cipher system of the 1940s
LOPERS – Dialed Number Recognition (DNR) system providing filtering, selection, and metadata extraction for intercepted telephony traffic from the Public Switched Telephone Network (PSTN), GSM, CDMA, and UMTS Core networks, or in between the PSTN and a Core network.* * Also used by 2nd and 3rd party partners.*
LUMBERYARD – FAIRVIEW (satisfying POC with NTOC for anomaly detection/situational awareness) *
LUNCHBOX – Unclassified nickname for a Navy system to process 40 worldwide PROFORMA signals, which also contains electronic media documentation pertaining to many of those signals; used in 2001 aboard the EP-3E surveillance aircraft *
LUSTRE – Memorandum of Understanding regarding the exchange of data between the NSA and the French foreign intelligence service DSGE (2011/12) *
back to top
M
MAROON ARCHER – Some kind of military program started in 1979 *
MACHINESHOP – ? *
MADCAPOCELOT – Sub-program of STORMBREW for collection of internet metadata about Russia and European terrorism
MAESTRO-II – Mini digital core implant, standard TAO implant architecture
MAGIC – Codeword for decrypted high-level diplomatic Nazi messages
MAGIC LANTERN – A keystroke logging software developed by the FBI
MAGNES – Remote SATCOM collection facility
MAGNUM – Series of SIGINT spy satellites (since 1985)
MAGNUMOPUS – TAO computer hacking project *
MAGOTHY – The embassy of the European Union in Washington DC *
MAILORDER – FTP-based file transport system used to move data between various collection, processing and selection management systems. Originally developed in 1990, ultimately to be replaced by JDTS.*
MAIN CORE – Federal database of personal and financial data of suspicious US citizens
MAINWAY (MW) – NSA system for contact chaining and analysis of metadata from all sources *
MALLARD – Japanese foreign satellite interception station in Tachiarai, operated jointly by NSA and the Japanese Directorate for SIGINT (DFS) *
MANASSAS – Former NSA counter-encryption program, succeeded by BULLRUN
MARINA – NSA database of bulk internet metadata; succeeded by CLOUDRUNNER in 2013? *
MARKHAM – General PROFORMA information/descriptions *
MARTES – Unclassified nickname for a collection of software tools for collecting, analyzing and processing signals, used in 2001 aboard the EP-3E surveillance aircraft *
MASTERLINK – NSA tasking source
MASTERSHAKE – Tool or database with FORNSAT and WiFi data collection *
MATRIX – Some kind of data processing system *
MAXFLI – System related to the Predator drone *
MAYTAG – Upstream collection site
MEDLEY – Classified Suite A algorithm
MELVIN – Classification compartment for a program under the defunct BYEMAN Control System (BCS).
MENTOR – Class of SIGINT spy satellites? (since 1995?)
MERCED – The Bulgarian embassy in Washington DC *
MERCURY – Soviet cipher machine partially exploited by NSA in the 1960’s
MERCURY (MC) – ELINT/SIGINT satellites launched from 1994 to 1998 (publicly known as (“Advanced Vortex”) and operated from Menwith Hill, UK.
MERCURY – Remote SATCOM collection facility
MERLIN – FAIRVIEW’s effort to build-out the mobility network access, including SMS messages, Mobile Application Part (MAP), packet data and voice.*
MESA – Cable access under the FAIRVIEW program *
MESSIAH – NSA automated message handling system
META LION – Search tool for the PINWALE database, queries metadata only (since 2005) *
METAWAVE – Warehouse of unselected internet metadata *
METRICS – NSA database probably used for call network analysis, or manage and rationalize SIGINT assets
METROTUBE – Analytic tool for VPN data *
METTLESOME – NSA Collection mission system
MIDAS – Satellite program
MIDFIELD – Processing system related to FAIRVIEW Transit collection under FAA 704 & 705b *
MIDNIGHTRIDER – An internal NSA monitoring system – acccording to Edward Snowden on page 256 of his book Permanent Record.
MILKBONE – Question-Focused Dataset used for text message collection *
MINARET – A sister project to Project SHAMROCK (1967-1973)
MIRANDA – System for managing intelligence requirements of GCHQ customers *
MIRROR – Automated survey system that can for example identify the presence of a VPN; interface to the ROADBED system *
MISTRALWIND – Calling card and private network access under the STORMBREW program *
MONKEYROCKET – Sub-program of OAKSTAR for collecting internet metadata and content through a foreign access point being a non-western anonymous internet browsing product (since 2012) *
MONSTERMIND – Program that can automatically react to cyber attacks against the US
MOONLIGHTPATH (EGL?) – Cable tapping facility operated in cooperation with a trusted 3rd Party agency, part of the RAMPART-A program * *
MOONPENNY – The NSA satellite intercept station at Harrogate (Great Britain)
MOONSCAPE – System used at the Waihopai satellite intercept station *
MORAY – Compartment for the least sensitive (Category I) COMINT material, retired in 1999 *
MORECOWBELL (MCB) – Covert HTTP/DNS monitoring system for operations support *
MORPHEUS – Program of the Global Access Operations (GAO) *
MOTHMONSTER – NSA tool for exploiting the TOR network
MOUSETRAP – Sandia implant for EFI *
MOVEONYX – Tool related to CASPORT
MULBERRY – The mission of Japan at the United Nations in New York *
MUSCULAR (JPM?) – Joint NSA-GCHQ operation to tap the cables linking Google and Yahoo data clouds to the internet * Part of WINDSTOP
MUSKET – Retired SIGINT Exchange Designator for ?
MUSKETEER – NSA’s Special Signal Collection unit (military/1990s?)
MYSTIC – SSO unilateral wireless/mobile interception program (since 2009)*
MYSTIC STAR – Presidential Global Communications System
back to top
N
NASHUA – The mission of India at the United Nations in New York *
NATIVEFLORA – FAIRVIEW support to TAO shaping operations under EO 12333 *
NAVAJO – The mission of Vietnam at the United Nations in New York *
NAVARRO – The embassy of Georgia in Washington DC *
NEBULA – Base station router similar to CYCLONE Hx9
NEBULA – Airborne SIGINT system carried by MC-12W aircraft
NECTAR – SIGINT Exchange Designator for ? (retired)
NELEUS – Remote SATCOM collection facility
NEMESIS – SIGINT satellite
NEPTUNE SPEAR – Operation to kill or capture Osama bin Laden (2011)
NEPTUNETHUNDER – Connection for afloat computer network operations like aboard USS Annapolis *
NESTOR – Family of digital secure voice equipment: KY-8, KY-28, and KY-38
NETBOTZ – Remote monitoring tool
NETFLOW – Certain type of cable tapping sensor *
NETWORKPUMP – Distribution system *
NEWSDEALER – NSA’s internal intelligence news network
NEXUS – Interface that allows to conduct queries through the User Interface Services (UIS) *
NEXUS 7 – Successor program of the Real Time-Regional Gateway (RT-RG) * *
NIAGARAFILES – Data transfer tool * * (SFTP-based?)
NICKELBACK – The Joint Chiefs of Staff (JCS) unclassified nickname assigned to COMINT advisory support *
NIGHTGLOW – System related to the Predator drone *
NIGHTWATCH – Portable computer in shielded case for recreating target monitor from progressive-scan non-interlaced VAGRANT signals
NINJANIC – Something related to TURMOIL *
NITESURF – NSA tool or database
NITRO – Remote SATCOM collection facility
NOCON – NSA dissemination marking or COI
NODDY-3 – Coverage of current and forecasted NRTM circuits under the FAIRVIEW program * *
NOMAD – Projected Navy-sponsored and Raytheon-made computer for mass data handling (1951-1954)
NONBOOK (NK) – Compartment of the ENDSEAL control system
NORMALRUN – NSA tool or database
NOVELETTE – General PROFORMA information/descriptions *
NUCLEARWINTER – Signal Intelligence Directorate team that uses anti-tamper solutions *
NUCLEON – Database for contents of phone calls
NYMROD – Automated name-matching and recognition system (since 2008)*
NUTHATCH – FAIRVIEW’s covername for the transport upgrade between FRIAR and PINECONE to accommodate growth in the cable system *
back to top
O
OAKSTAR – Umbrella program for 9 accesses at 7 corporate partners (since 2004)* *
OBELISK – Codename for Al Qaeda’s network of websites and servers *
OBELISK – GSM collection system *
OCEAN – Optical collection system for raster-based computer screens *
OCEANARIUM – Database for SIGINT from NSA and intelligence sharing partners around the world *
OCEANFRONT – Part of the communications network for ECHELON
OCEAN SHIELD – NATO anti-piracy operation
OCEANSURF – Engineering hub of the Global Access Operations (GAO) *
OCELOT – Actual name: MADCAPOCELOT
OCTAVE – Principal system for tasking of telephone numbers (and other telephone identification data such as IMSIs, IMEIs, and INMARSAT FTINs and RTINs) to the various DNR collection systems used by NSA and its 2nd Party partners. It also enables the management of those numbers. Replaced by the UTT in 2011.*
OCTSKYWARD – Repository for SIGINT and collateral information related to location data on GSM networks,* including from flying aircraft
OILSTOCK – A system for analyzing air warning and surveillance data
OILYRAG – SSO mobile telephone interception program, part of the MYSTIC program *
OLYMPIA – CSEC tool for discovering and identifying telephone and computer connections
OMNIGAT – Field network component
ONEROOF – Main tactical SIGINT database, with raw and unfiltered intercepts; or an analytic tool *
ONYX – Newer units of the LACROSSE reconaissance satellites
ORANGEBLOSSOM – Sub-program of OAKSTAR for collection from an international transit switch (sigad: US-3251)*
ORANGECRUSH – Sub-program of OAKSTAR for collecting metadata, voice, fax, phone and internet content through a foreign access point
ORION – SIGINT satellite
ORLANDOCARD – NSA operation thtat attracted visits from 77,413 foreign computers and planted spyware on more than 1,000 by using a ‘honeypot’ computer *
OSAGE – The embassy of India in Washington DC *
OSCAR – SIGINT Exchange Designator for the USA
OSWAYO – The embassy annex of India in Washington DC
OXCART – The Lockheed A-12 program (better known as SR-71)
OUTPARKS – NSA’s unclassified environment for access to the public internet, operational as of 2004, replaced BRAZEN, AIRGAP, OSIS and NIPRNet *
OWL – Some kind of file system? *
OZONE – Some kind of application framework *
back to top
P
PACKAGEDGOODS (PG) – Globally disperced and clandestine placed traceroute and DNS processors that map internet connections for the TREASUREMAP tool * *
PACKET RAPTOR – System for processing internet packet data *
PACKETSCOPE – Internet cable tapping system
PACKETSWING – NSA tool or database
PADSTONE – Type 1 Cryptographic algorithm used in several crypto products
PAINTBALL – Analysis tool (for social network analysis?) *
PAINTEDEAGLE – SI-ECI compartment related to the BULLRUN program
PALANTERRA – A family of spatially and analytically enabled Web-based interfaces used by the NGA
PALMCARTE – System that feeds FISA data to the Network Analysis Center (NAC)? *
PANGRAM (PM) – Alleged SCI control system *
PANOPLY – Populates INTERQUAKE with emitter information and reports *
PANTHER – The embassy of Vietnam in Washington DC *
PARCAE – SIGINT satellite for ocean reconnaissance. Unclassified codename: WHITE CLOUD, a.k.a. Naval Ocean Surveillance System (NOSS); part of CLASSIC WIZARD
PARTNERMALL PROGRAM (PMP) – A single collaboration environment, to be succeeded by the Global Collaboration Environment (GCE) *
PARTSHOP – ?
PARTSTREAMER – Codeword related to data exchange at NSA’s European Cryptologic Center (ECC) *
Passport – A “behind-the-scenes” user account system *
PATHFINDER – SIGINT analysis tool (developed by SAIC) *
PATHWAY – NSA’s former main computer communications network
PATTERNTRACER – Call chaining analysis tool (developed by i2)
PAWLEYS – SI-ECI compartment related to the BULLRUN program
PEARL – Retired SIGINT product codeword
PENCUP – Project to upgrade DETs in Korea (2004) *
PENDLETON – SI-ECI compartment related to the BULLRUN program
PENNANT RACE – Airborne SIGINT-based geolocation system carried by MC-12W aircraft
PEPPERBOX – Tool or database for targeting Requests (CSEC?)
PERDIDO – The mission of the European Union at the United Nations in New York *
PERFECTMOON – An out-sites covering system
PERFECTSTORM – Limited FISA authorized collection under the STORMBREW program (sigad: US-984P) *
PERMANENTPRESS – SSO mobile telephone interception program, part of the MYSTIC program *
PHANTOMNOVA – Program in cooperation with Turkey *
PHYLLIS ANN – Air Force airborne radio direction-finding system on EC-47s (1966-?)
PHOTOANGLO – A continuous wave generator and receiver. The bugs on the other end are ANGRYNEIGHBOR class
PHOTONTORPEDO – An NSA tool that grabs IP addresses of MSN messenger users – according to Edward Snowden on page 256 of his book Permanent Record
PIEDMONT – SI-ECI compartment related to the BULLRUN program
PICARESQUE (PIQ) – SI-ECI compartment related to the BULLRUN program
PICASSO – Modified GSM handset that collects user data plus room audio
PILOTHOUSE – Front-end collection device, created in 2002 and succeeded by EAGLEVIEW * Tactical mapping tool *
PINECONE – Covername for the LITHIUM centralized processing facility in New Jersey for data collected under the FAIRVIEW program * *
PINUP – Retired SIGINT product codeword
PINWALE – Primary storage, search, and retrieval system for SIGINT text intercepts. Target data is filtered through a Packet Raptor at the collection site and is subsequently processed by a WC2, followed by an XKEYSCORE for selection at NSA headquarters.*
PISCES – Joint NSA, CIA and State Department program collecting biometric data on border crossings from a wide range of countries *
PITCHFORD – SI-ECI compartment related to the BULLRUN program
PIVOT – Retired SIGINT product codeword
PIXIE – Retired SIGINT product codeword
PLANK – Access expansion and collection (content and metadata) via the deployment of a global SIGINT sensor grid through FAIRVIEW’s LITHIUM partner.*
PLANK-3A – The follow-on to FAIRVIEW’s FY11 PLANK-3 access expansion effort.*
PLANTATION – Ggeneral processing computer project, later integrated into HARVEST (1950s)
PLATFORM – Computer system linking the ECHELON intercept sites * and/or internal NSA e-mail system
PLUCKHAGEN – An IRATEMONK implantation for ARM-based Fujitsu drives *
PLUS – NSA SIGINT production feedback program *
POCOMOKE – The Brazilian Permanent Mission to the UN in New York *
POGODA – Soviet cipher system of the 1940s
POISON NUT – CES VPN attack orchestrator *
POLARBREEZE – NSA technique to tap into nearby computers *
POORWILL – FAIRVIEW’s effort to continue cable modernization, specifically focus on providing increased DNR access capacity and processing across all existing cable sites.*
POPEYESEAR – Database and with an interface (including GraphViz) used at NSA’s NTOC floor *
POPPY – Code name for a series of ELINT satellites (1962-1971) as well as a classification compartment of the defunct BYEMAN Control System (BCS) – (see also: REPTILE)
POPQUIZ – TURMOIL development data(?) *
POPROCKS – Some tool, probably related to Computer Network Exploitation (CNE)
POPTOP – Collection system for telephony data
POUNDSAND – Prototype Incubator *
POWDER – Program for surveillance of the Turkish embassy in Washington DC
POWELL – The Greek mission at the United Nations in New York *
PREFACE – Processing system for Opscomm at NSA HQ, replacement of TIDE (1978-?)
PREFER – System for identifying and extracting text messages (SMS) from the DISHFIRE database *
PRESSUREPORT – Software interface related to PRESSUREWAVE
PRESSUREWAVE – NSA cloud database for VPN and VoIP content and metadata, among other things * * Couples corporate object storage capabilities with a flexible policy language for customization of access control, retention, and storage of data within the same system *
PRIMECANE – American high-tech company cooperating in providing a network access point for the ORANGECRUSH program
PRISM – Program for collecting foreign internet data from US internet companies
PROFORMA – Digital command and control data communications signals that relay information and instructions to and from radar systems, weapon systems (e.g. surface-to-air missiles, anti-aircraft artillery, fighter aircraft), and control centers.* Or just machine-to-machine transmissions.*
PROPHET – Mobile tactical SIGINT collection system
PROTEIN – SIGINT Exchange Designator for ?
PROTON – Storage and analysis system for the CRISSCROSS database of (telephony?) metadata of (counterintelligence) targets; operated by CIA and used by DOJ, DOD and NSA *
PROTOSS – Local computer handling radio frequency signals from implants
PSALM – Defunct Top Secret control system for intelligence related to the Cuban missile crisis (October 1962) *
PURPLE – Codename for a Japanese diplomatic cryptosystem during WWII
PURPLE DRAGON – US military OPSEC program (since 1966)
PUTTY – NSA tool or database
PUZZLECUBE – TAO division tasking tool
PYLON – SIGINT Exchange Designator for ?
back to top
Q
QUADRANT – A crypto implementation code
QUADRESPECTRE PRIME – ?
QUANTUM – Secret servers placed by NSA at key places on the internet backbone; part of the TURMOIL program *
QUANTUM LEAP – CIA tool to “find non-obvious linkages, new connections, and new information” from within a dataset *
QUARTERPOUNDER – Upstream collection site
QUASAR – Relay satellite for reconaissance satellites
QUEEN BEE CHARLIE/DELTA – Airborne SIGINT missions using C-130s in South-East Asia (1964-1965?)
QUEENSLAND – Upstream collection site
QUICKPOINT – Distribution system *
QUILL – Code name for an experimental radar-imaging spacecraft (1964) as well as a classification compartment of the defunct BYEMAN Control System (BCS).
back to top
R
RADIOSPRING – ?
RADIANT – First word for two dozen Navy tactical-national data sharing systems, including satellites and stealth drones *
RADIANT GEMSTONE – System from the RADIANT family, installed at the USS Annapolis around 2005 *
RADIUS – Systems that logs ISP dial up customer records, which can create a “natural link” between DNR and DNI datasets *
RADON – Host tap that can inject Ethernet packets *
RAGTIME (RGT) – ECI compartment for call and e-mail content collected under FISA authority * Encompasses both NSA and FBI FISA data since 2002 *
RAILHEAD – NCTC database project
RAINFALL – (NSA unit for decrypting) Russian secure, encrypted voice communications (around 1979)*
RAINFALL – Unclassified codename for RHYOLITE/AQUACADE SIGINT satellites (see below)
RAINFALL – The joint CIA/NSA/DSD satellite ground station Pine Gap, Australia (F78) *
RAISIN – NSA database or tool
RAMPART-A (RAM-A) – Program for collecting information about Russia, the Middle East and North-Africa, in cooperation with at least five 3rd Party partner agencies (since 1992)*
RAMPART-I (RAM-I) – Program for collecting communications from Iraq
RAMPART-M (RAM-M) – Program for collecting data from undersea fiber-optic cables about terrorists, arms traders and Iraq (since 1986)*
RAMPART-T (RAM-T) – Program providing access to land-based cables, in cooperation with the CIA, to collect communications from state leaders and their entourage (since 1991)*
RAMPART-X (RAM-X) – Program for collecting information from Afghanistan *
RAMROD – Unclassified codename for a SIGINT satellite, possibly the 1994-96 ORION launches
RANCIDRINSE – SSO mobile telephone interception program, part of the MYSTIC program *
RANGER – Unclassified codename for a SIGINT satellite (post-2000 launches)
RATTAN – Codename for overall US effort against Soviet codes (1945-1946, later BOURBON)*
RAVEN – SIGINT satellite
REACTOR – Tool or program related to MARINA? *
REBA – Major NSA backbone project *
REBATE – Unclassified cover term for the MULTIGROUP/STRAWMAN series of ELINT satellites (terminated in 1973) *
RECOVERY – ? *
RED DISK – DIA cloud system (to be integrated into the DCGS-A) to distribute information, images and video to soldiers and other military intelligence users *
REDHARVEST (RDV) – ECI compartment that protects names, locations and techniques of RAMPART-A cable tapping facilities *
REDHAWK – NSA tool
REDRACE – Airborne SIGINT system used for Direction Finding/geolocation and to collect VHF communications
REDROOF – NSA tool
REGAL – Compartment for Top Secret COMINT information derivated from the Berlin Tunnel operation (1955-?)
REMATION – Joint NSA-GCHQ counter-TOR workshop *
RENOIR – NSA telephone network visualization tool
REPTILE – Unclassified cover term for the POPPY series of ELINT satellite system (terminated in 1971) *
REQUETTE – A Taiwanese TECO in New York *
RESERVE (RSV) – Control system for the National Reconnaissance Office (NRO)
RESERVEVISION – Remote monitoring tool
RESOLUTETITAN – Internet cable access program?
RETRO – see RETROSPECTIVE
RETROSPECTIVE – 30-day retrospective retrieval tool for SCALAWAG *
RHINEHART – Tool for both real-time and retrospective keyword-searching of vast amounts of voice content (introduced in 2004, replaced by VoiceRT)*
RHYOLITE – Class of SIGINT spy satellites (in 1975 changed to AQUACADE)
RICHTER – SIGINT Exchange Designator for Germany
RIMROCK – Access to 4ESS circuit switches under the FAIRVIEW program *
RINGBILL – Some kind of communications traffic, including Internet data *
RIPCORD – ?
RIVET GYM – Codename for the four SIGINT positions aboard EC-121 COLLEGE EYE aircraft (Vietnam War)
RIVET JOINT – RC-135 reconaissance aircraft with a primary SIGINT mission *
ROADBED – Probably a military SIGINT database
ROCKING CHAIR (RC) – Dutch research program on behalf of the CIA for developing a telephone line bug *
ROCKSALT – Corporate partner for domestic long-distance cable access under the BLARNEY program *
ROCKYKNOB – Optional DSP when using Data Over Voice transmission in CROSSBEAM
RODEHOUSE – Offsite language processing center for Arabic, Amharic, Pasto/Dari and Tagalog (since 9/11) *
RODEO STAR – FAIRVIEW Site *
ROGUE – Cryptanalytic computer from the early 1950s, the first using remote terminals connected to a central processor *
ROLLERCOASTER – Tool or system that provides access to phone metadata, analyst queries and results of SKYNET Analytics *
RONIN – NSA tool for detecting TOR-node and/or mobile IP-addresses * *
RORIPA – SIGINT Exchange Designator for Japan *
ROSTER – Unclassified codename for MAGNUM/ORION SIGINT satellites *
ROUTEMASTER – Server/router for VoIP and audio traffic *
ROUTEVIEWS – Open source inforamtion used for the TREASUREMAP tool *
ROYALNET – Internet mapping tool to determine access points for target’s communications *
RUFF – Compartment of TALENT KEYHOLE for satellite imagery *
RUFFER – Unclassified codename for JUMPSEAT/TRUMPET SIGINT satellites
RUMBUCKET – Analytic tool to access FORNSAT data residing on GINPENNANT *
RUNWAY – Unclassified codename for CANYON/CHALET/VORTEX SIGINT satellites; or a processing system at Menwith Hill *
RUSTICBAGGAGE – Data source for the TREASUREMAP tool *
RUTLEY – Command and control transmissions, for example collected by the MERCURY SIGINT satellites *
RYE – NSA-developed software for Univac 490 computers (introduced 1963) or a system through which 200 remote terminals could access 4 main machines (since 1972)*
RYE – Computer complex supporting CSOC/NSOC, internetting Opscomm circuits, running several softwares including TIDE (late 1960s-?)
back to top
S
SABERTOOTH – SIGINT training program for South Vietnam government (launched in 1961)
SABRE – Retired SIGINT product codeword
SAGUARO (or SAGURA?) – Access to AT&T internet backbone cables, including OC-192 and 10GE peering circuits, under the FAIRVIEW program * *
SAGURA (or SAGUARO?) – Access to AT&T internet backbone cables, including OC-192 and 10GE peering circuits, under the FAIRVIEW program * *
SALEM – ?
SALTYDOGS – Tool to find frequency and carrier rates and discover signal characteristics of satellite links *
SAM HEARTBURN – General PROFORMA information/descriptions *
SAMOS – Reconnaissance satellite program
SANDGOAT – Method for locating large numbers of INMARSAT terminals (2008) *
SANDKEY – Joint NSA/DEA program that intercepts and exploits unencrypted VHF voice communications of narco-traffickers at sea *
SAPPY – Retired SIGINT product codeword
SARACEN – Intercept operation using unmaned equipment on a hilltop (Vietnam War, 1972)
SARATOGA – SSO access facility (since 2011) * *
SARDINE – SIGINT Exchange Designator for Sweden
SAVILLE – Narrow band voice encryption for radio and telephone communication
SAVIN – Retired SIGINT product codeword
SCALAWAG – Collection facility under the MYSTIC program *
SCALLION – Upstream collection site
SCAMPI – Secure voice and data network for C4I communications between the commander and the components of the US Special Operations Command, operational sites and other government agencies *
SCAPEL – Second Party satellite intercept station in Nairobi, Kenia
SCARAB – Commercial name for a ruggedized computer used for the LUNCHBOX PROFORMA processor; carried onboard the EP-3E surveillance aircraft *
SCATTERED CASTLES – US Intelligence Community database of security clearance holders (since 2008) *
SCHOOLMONTANA – Software implant for Juniper J-series routers used to direct traffic between server, desktop computers, corporate network and internet
SCIMITAR – A tool to create contact graphs? *
SCISSORS – Data scanning, formatting and distribution system *
SCORCHERSIX – FAIRVIEW support to TAO shaping operations under EO 12333 *
SCORECARD – NSA tool or database
SCORPIOFORE – SIGINT reporting tool *
SCQAWK – The “SID Mailbag” in the newsletter of NSA’s Signals Intelligence Directorate
SEABOOT – SIGINT Exchange Designator for South Korea *
SEADIVER – Collection system for telephony data
SEAGULL – Secure Allied Communications ISO BMD at COMUSSIXTHFLT *
SEARCHLIGHT – NSA’s internal corporate directory service for personnel information *
SEARCHLITE – Tactical SIGINT collecting system for like cell phone calls
SEA SENTRY – Program for collecting radar signatures from shipping traffic in the Dardanelles *
SEA SENTRY II – Choke point collection program in cooperation with Turkey *
SEASIDEFERRY – Commercially purchased data source for the TREASUREMAP tool *
SECUREINSIGHT – A software framework to support high-volume analytics
SEED SPHERE – Computer network “intrusion set” already identified in 2007 *
SEEKER – 4th party collection tool? *
SEENFLARE(?) – Codeword related to data exchange at NSA’s European Cryptologic Center (ECC) *
SEMESTER – NSA SIGINT reporting tool
SEMITONE – System that monitors fax and voice messages *
SENIOR SCOUT – Transportable suite of ISR equipment (since 1991)
SENIOR SPAN – Radome on top of the U2 to relay SIGINT data to ground stations
SEAGULL – BR-FISA metadata, LITHIUM’s billing records * collected under the FAIRVIEW program *
SEALION – FAIRVIEW site *
SENSOR PACER – Nickname assigned to the secure, digital, air-ground-air communications system used for SIGINT reporting and advisory support *
SENTINEL – NSA database security filter, part of project PLUS *
SENTRY EAGLE (SEE) – Overarching umbrella program for ECI compartments and SAP programs of the National Initiative to protect US cyberspace
SENTRY HAWK – ECI compartment of SENTRY EAGLE that protects information about Computer Network Exploitation *
SENTRY FALCON – ECI compartment of SENTRY EAGLE that protects information about Computer Network Defense *
SENTRY OSPREY – ECI compartment of SENTRY EAGLE that protects information about HUMINT enabled SIGINT *
SENTRY RAVEN – ECI compartment of SENTRY EAGLE that protects information about exploitation of encipherment *
SENTRY CONDOR – ECI compartment of SENTRY EAGLE that protects information about general Computer Network Operations *
SENTRY OWL – ECI compartment of SENTRY EAGLE that protects information about relationships with industry *
SERENADE – Covername for a corporate partner for domestic long-distance cable access under the BLARNEY program * *
SERRATEDEDGE – Conflict number access under the STORMBREW program *
SERUM – Bank of servers within ROC managing approvals and ticket system
SETTEE – Former SIGINT Exchange Designator for South Korea *
SHADOWCAT – Some system to be used at the Waihopai satellite station, New Zealand *
SHAMROCK – Operation for intercepting telegraphic data going in or out the US (1945-1975)
SHAREDQUEST (SQ) – Contains the DARKQUEST program *
SHAREDQUEST – 5-Eyes modernization program for the satellite interception architecture (follow-up of SHAREDVISION) *
SHAREDVISION (SV) – 5-Eyes modernization program for the satellite interception architecture (until 2010, followed by SHAREDQUEST) *
SHARKFIN – Sweeps up all-source communications intelligence at high speed and volumes *
SHELLTRUMPET – NSA metadata processing program (since December 2007)*
SHENANIGANS – Aircraft-based NSA geolocation system used by CIA *
SHERMAN – Cryptanalytic computer subcomplex at NSA HQ (1978)
SHIFTINGSHADOW – Sub-program of OAKSTAR for collecting telephone metadata and voice content from Afghanistan through a foreign access point
SHILLELAGH – Classified Suite A algorithm
SHORTHAND – Project initiated in 1966 to employ South Vietnamese as linguists in US LLVI operations
SHOTGIANT – NSA operation for hacking and monitoring the Huawei network (since 2009)
SIDELIGHT – Codeword related to data exchange at NSA’s European Cryptologic Center (ECC) *
SIERRAMIST – Tool to support various file systems *
SIGABA – American high-level cipher machine used from World War II until the 1950s, also known as ECM Mark II
SIGCOM – (National) Signals Intelligence Committee *
SIGINT NAVIGATOR – NSA analytic tool used in combination with MAINWAY
SIGSALY – The first secure voice system, used during World War II, also known as Green Hornet
SILKWORTH – A software program used for the ECHELON system
SILLYBUNNY – Some kind of webbrowser tag which can be used as selector *
SILO – Research project in high-speed computer memory, later integrated into HARVEST (1950s)
SILVER – Soviet cipher machine, 1950s-1960s, partially exploited by NSA in the 1960’s
SILVER COLLAM (SC) – The only FAIRVIEW collection site outside continental USA, but considered US territory, most likely operated by AT&T *
SILVERCOMET – SIGINT satellites? *
SILVER PEAK – WAN optimization project at Waihopai satellite station, New Zealand *
SILVERZEPHYR (SZ) – Sub-program of OAKSTAR for collecting phone and internet metadata and content from Latin and South America through an international transit switch
SIRE – A software program used for the ECHELON system(?)
SKIDROWE – System for processing low speed internet traffic, replaces WEALTHYCLUSTER2 and interoperates with XKEYSCORE *
SKIPJACK – Type 2 Block cipher algorithms used in various crypto products
SKOPE – SIGINT analytical toolkit
SKYNET – Collaborative cloud research program to identify patterns of suspect activity from bulk telephony data *
SKYSCRAPER – Interface to the ROADBED system
SKYWRITER – NSA tool to prepare (internet) intelligence reports
SLINGSHOT – End Product Reports (CSEC?)
SLIPSTICK – Azimuth and range tool, used in 2001 aboard the EP-3E surveillance aircraft *
SLIVER – Proof-of-Concept for cross-mission use of passive IP sensors *
SMARTTRACKER – Analytic tool for detecting geolocational patterns in cell phone usage *
SMOKEYSINK (SMK) – Cable tapping facility operated in cooperation with a 3rd Party agency, part of the RAMPART-A program (cosed in June 2011)*
SNICK – GCHQ satellite intercept station in Oman
SNOWFLAKE (SN) – An airborne COMINT collection system, installed on a Finnish Fokker F-27 SIGINT aircraft *
SNOWHAZE – NSA tool or database *
SOAPOPERA – (former?) database for voice, end product and SRI information *
SOARING EAGLE – Some US military/intelligence network protection program *
SOCIALSTAMP – Commercially purchased data source for the TREASUREMAP tool *
SOCIOPATH – Storage and/or distribution system *
SODAPRESSED – Linux application presistence *
SOLO – NSA-developed general-purpose cryptanalytic ccomputer, the world’s first entirely using transistors, later marketed by Philco as Transac S-1000 (mid-1950s) *
SOMALGET – Umbrella program for collecting content from mobile phone networks of two entire countries, part of MYSTIC (sigad: US-3310**)
SORA-2 – IP expansion effort for the FAIRVIEW program to exploit the access side of the Common Backbone (CBB) network *
SORTINGHAT – ?
SORTINGLEAD – NSA tool or database *
SOUNDER – Second Party satellite intercept station at Cyprus
SOURSMACK2 – PINWALE partition for DNI foreign government and counter-proliferation traffic collected through SSO corporate partners under FAA authority *
SOUTHWINDS – Collection program for Inmarsat satellite communications, first for its EMEA region, later global coverage *
SPARKLEPONY – Tool or program related to MARINA *
SPEARGUN – Cable access program of New Zealand’s GCSB *
SPECTRE – SCI control system for intelligence on terrorist activities *
SPECULATION – Protocol for over-the-air communication between COTTONMOUTH computer implant devices, compatible with HOWLERMONKEY
SPEEDBUMP – NSA database, since 2005 accessible through GLOBALVISION *
SPHINX – Counterintelligence database of the Defense Intelligence Agency
SPINALTAP – NSA program for combining data from active hacking operations and passive signals intelligence collection *
SPINNERET (SPN) – Cable tapping facility operated in cooperation with a trusted 3rd Party agency, part of the RAMPART-A program * *
SPIRITFIRE – Robust voice processing system based on speech-to-text keyword search and paired dialogue transcription (succeeded VoiceRT in 2013) *
SPIT – Typewriter designed for copying morse code; project named for SPecial Intercept Typewriter (1957)
SPITEFULANGEL – Hacking tool or method in or for the Python programming language *
SPLITGLASS – NSA analytical database *
SPLUNK – Tool used for SIGINT Development
SPOKE – Compartment for less sensitive (Category II) COMINT material, retired in 1999 * but apparently still in use as unpublished SCI control system
SPOTBEAM – NSA database, since 2005 accessible through GLOBALVISION *
SPORTCOAST – Upstream collection site
SPRIG – Retired SIGINT product codeword
SPRINGRAY – Some kind of internal notification system *
SPYDER – Analytic tool for selected content of text messages from the DISHFIRE database *
STAKECLAIM – Replacement of the mission system for NSA’s collection facility on Okinawa *
STARBURST – The initial code word for the STELLARWIND compartment
STARFIRE – NSA contact chaining algorithm (developed in 1999) *
STARGATE (SG) – FAIRVIEW site *
STARLIGHT – Analyst tool
STARPROC – User lead that can be used as a selector *
STARPROC – Processing system for intercepting foreign Lawful Intercept systems *
STARSEARCH – Target Knowledge tool or database (CSEC?)
STATEROOM – Covert SIGINT collection sites based in US diplomatic facilities *
STEALTHFIGTHER – Codeword found in the source code used by the Equation hacking group *
STEELFLAUTA – FAIRVIEW support to TAO shaping operations under EO 12333 *
STEELKNIGHT – (foreign?) partner providing a network access point for the SILVERZEPHYR program *
STEELWINTER – A supercomputer acquired by the Norwegian military intelligence agency *
STEEPLEBUSH – Program to expand satellite interception capabilities at Menwith Hill ca. 1980 *
STELLAR – Second Party satellite intercept station at Geraldton, Australia
STELLARWIND (STLW) – SCI compartment for the President’s Surveillance Program information
STEPHANIE – Covert listening post in the Canadian embassy in Moscow (est. 1972)
STINGRAY – Device for tracking the location of cell phones (made by Harris Corp.) * STONEGATE – Automated and scalable dial-up data modem and FAX modem demodulation system, used to collect, recognize, demodulate, format, forward, database, archive, and reporting on dial-up data modem, FAX modem, speech, and unknown signals.* For example used at the Waihopai satellite intercept station *
STONEGHOST – DIA network for information exchange with UK, Canada, Australia and New Zealand (TS/SCI)
STONEHOUSE – Site built in the 1960s at Asmara, Ethiopia, for collection against the Soviet space program. Featured two 150-feet diameter dishes (closed in 1975).
STONE RUBY – Intelligence exchange agreement between DIA and the Israeli military intelligence directorate (1996) *
STORMBREW – Domestic cable tapping program in cooperation with Verizon (since 2001) *
STORMFORCE – Hardware modem for processing satellite signals *
STOUTHEART – Collection program for internet data *
STRATOS – Tool or databse for GPRS Events (CSEC?)
STRAWHAT – NSA datalinks between field sites and processing centers (1969-?)*
STREAMLINER – NSA-developed automatic switch for communications centers (early 1970s)
STRETCH – IBM high-performance computer project, later integrated into HARVEST (1950s)
S-TRICKLER – Tool or database with IP address fingerprints and potential vulnarabilities from the FORNSAT collection *
STRONGMITE – Computer at remote operations center used for long range communications
STRUM – (see abbreviations)
STYGIAN FLOW – FBI nickname for network intrusions for which assistance of the NSA was asked *
STYLISHCHAMP – Tool that can create a HPA on a hard drive and then provide raw reads and writes to this area *
SUBSTRATUM – Upstream collection site
SUEDE – Compartment for Top Secret COMINT information (1951-1952) *
SUGAR-HALFLEX – Collection program for internet data *
SULPHUR – The mission of South Korea at the United Nations in New York *
SUNSCREEN – Tool or database
SURFBOARD – System for processing data from (satellite?) telephone networks *
SURPLUSHANGAR (SH) – High to low diode, part of the QUANTUM system *
SURREY – Main NSA requirements database, where tasking instructions are stored and validated, used by the FORNSAT, SSO and TAO divisions *
SWEEPFORWARD – Repository for manually processed target data (2009) *
SWEETSMACK2 – PINWALE partition for DNI counterterrorism traffic collected through SSO corporate partners under FAA authority *
SYNAPSE – NSA tool for analyzing target connections *
back to top
T
TABLON – Experiment of mass data storage technology, overtaken by disk storage technology (1960s)
TACOSUAVE – ?
TALENT KEYHOLE (TK) – Control system for space-based collection platforms
TALISMAN – Replaced the Consolidated Authoring Tool (CAT) in 2003 *
TALK QUICK – An interim secure voice system created to satisfy urgent requirements imposed by conditions to Southeast Asia. Function was absorbed by AUTOSEVOCOM
TAPERLAY – Covername for the Global Numbering Data Base (GNDB) containing telephony and provider information *
TARMAC – Program to intercept satellite communications at Menwith Hill Station *
TAROTCARD – NSA tool or database
TATTOO – Server used for vPCS shaping operations under the STEELFLAUTA program *
TAWDRYYARD – Beacon radio frequency radar retro-reflector used to positionally locate deployed RAGEMASTER units
TEABALL – Direct SIGINT support to fighter escorts of operation Linebacker (1972)
TELLURIAN – Internet packet processing system, maybe also used to forward data from the collection site to NSA headquarters.
TEMPEST – Spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations (codename originally from a COMSEC point of view, not an attacker’s one)
TENNIS – Network to remote-operate intercept facilities through satellite links (1967-?)
TETLEY – front-end collection device *
THAWFACTOR – Codeword related to data exchange at NSA’s European Cryptologic Center (ECC) *
THEORYMASTER – Program that, among others, includes the COURIERSKILL project.*
THERAPYCHEATER – A tool for identifying suspicious patterns in the access to draft folders of webmail accounts *
THESPIS – SIGINT Exchange Designator for ?
THINTREAD – Prototype program for wiretapping and sophisticated analysis of the resulting data (dismissed in 2002 in favor of TRAILBLAZER)
THIEVING MAGPIE (TM) – Program for collecting metadata of mobile phones from airplane passengers; data source for HOMING PIGEON *
THORNYHOSTILE – Digital map and foundation geodata repository *
THUMB – Retired SIGINT product codeword
THUNDERCLOUD – Data enrichment tool, collaborative program between NSA units T1222 and SSG *
THUNDERISLAND – US partner company for the MONKEYROCKET subprogram of OAKSTAR * *
TIAMAT – Joint venture between the German BND and another country with access for NSA *
TICKETWINDOW – System for sharing Special Source collection among the Five Eyes partners *
TIDALSURGE – Router Configurations tool (CSEC?)
TIDE – Software managing the KLIEGLIGHT database
TIDEWAY – Part of the communications network for ECHELON
TIKICUBE – Unit of NSA’s Security and Counterintelligence division (2014)
TIMBERLINE – The NSA satellite intercept station at Sugar Grove (US)
TINMAN – Database related to air warning and surveillance
TINSEL – Processing system related to FAIRVIEW and BLARNEY collection *
TITANPOINTE (TP) – Centralized processing facility for FISA data collected under the BLARNEY and FAIRVIEW programs, located in the AT&T switch at 33 Thomas Street in New York City * *
TITLEHOLDER – NSA tool
TOPAZ – Satellite program
TOPROCK – Facility for access to 4ESS circuit switches under the FAIRVIEW program *
TORUS – Satellite antenna that allows multiple satellites to be viewed simultaneously *
TOWER – SIGINT Emitter Database (SEDB) Query-Focussed Dataset (QFD) fed by telephony metadata from the GMHalo cloud *
TOWERPOWER – NSA tool or database
TOXICARE – NSA tool
TOYGRIPPE – NSA repository of VPN endpoints and metadata * *
TRACFIN – NSA database for financial data like credit card purchases *
TRACTOR – IBM-developed tape drives loading system, used for HARVEST (1960s)
TRAFFICTHIEF (TT) – NSA’s alerting and tipping system which alerts analysts of real-time target communications,* part of the TURBULENCE umbrella program
TRAILBLAZER – NSA Program to analyze data carried on communications networks (2002-2006, replaced by TURBULENCE)
TRAILMAPPER – NSA tool or database
TRANSIENT – Sub-program of FROSTING directed against Soviet satellites *
TRANSPORTORO – Something related to the OAKSTAR program *
TRANSX – Translation, transcription and transliteration system *
TREASUREMAP (TM) – Mapping, exploration and analysing tool that provides a near-real time, interactive map of the global internet *
TREASURETROVE – Analytic tool
TREBLECLEF – System for data received from hacking operations? *
TRIBUTARY – NSA provided voice threat warning network
TRIGGERFISH – Device to collect the content of digital cell phone calls (made by Harris Corp.) *
TRINE – Compartment for Top Secret COMINT information, predecessor of UMBRA (1965-1968) *
TRIREME – System for processing internet packet data *
TRITON – Tool or database for TOR Nodes (CSEC?)
TROJAN SPIRIT – Tactical network for sharing intelligence information with customers in the field
TROPICPUMA – Fax processing capability *
TRUMPET – Series of ELINT reconnaissance satellites (1994-2008)
TROPICTHUNDER – FAIRVIEW support to TAO shaping operations under EO 12333 *
TUBE – Back-end of the TURBULENCE architecture; it receives objects in SOTF format from TURMOIL, determine what forwarding actions should occur, and perform any requisite pre-forwarding preparation processing so as to create objects which can be ingested by the appropriate destination repositories. This includes 2nd and 3rd party legacy databases.* *
TUMULT – Part of the TURBULENCE program
TUNDRA – DSP Research of new statistics for codebook analysis *
TUNDRAFREEZE – NSA’s main in-house facial recognition program *
TUNINGFORK – NSA database or tool for protocol exploitation
TURBINE – Active SIGINT: centralized automated command/control system for managing a large network of active computer implants for intelligence gathering (since 2010) *
TURBULENCE (TU) – As part of NSA/CSS Transformation, TURBULENCE unifies MidPoint and Endpoint SIGINT, and dynamic defense, and enables network attack in a manner that creates cooperative, interoperable, real-time exploitation/defense/attack-enabling capabilities between geographically distributed nodes in a peer-to-peer (P2P) manner (since 2005).*
TURMEROL – ? *
TURMOIL (TML) – Passive SIGINT sensors: filtering and selection (at the packet level) of internet traffic on high-speed satellite, microwave and cable links, part of the TURBULENCE program * * * Maybe also for selecting common internet encryption technologies to exploit.*
TURNSTILE – SAGUARO VoIP access processing system *
TURNSTYLE – Collar for certain antennas (2004) *
TURNWEALTHY – Component for signal acquisition within the SKIDROW system, replacement for WEALTHYCLUSTER *
TURTLEPOWER – System to process VoIP communications data *
TUSKATTIRE – Ingest system for cleaning/processing/normalizing DNR (telephony) data *
TUTELAGE – Active defense system with detection sensors that monitor network traffic at for example the NIPRNet in order to detect malicious code and network attacks, part of the TURBULENCE program *
TWEED – Retired SIGINT product codeword
TWISTEDPATH – NSA tool or database
TYPHON – Airborne SIGINT system carried by MC-12W aircraft
TYPHON HX – GSM base station router network in box for tactical Sigint geolocating and capturing user
back to top
U
ULTIMATE – CIA operation sending weather balloons into Eastern Europe in order to map Soviet defense radar activity (1950s) *
ULTRA – Compartment for Top Secret COMINT information, like decrypted high-level military Nazi messages (until 1946)
UMBRA – Compartment for the most sensitive (Category III) COMINT material (1968-1999) * but apparently still in use as unpublished SCI control system
UNICORNSANDWICH – FAIRVIEW support to TAO shaping operations under EO 12333 *
UNIFORM – SIGINT Exchange Designator for Canada
UNITY – System for processing data collected from telephony networks * through a SAGUARO access under the FAIRVIEW program *
UPWARD – Classification compartment for a program under the defunct BYEMAN Control System (BCS).
USHER – Retired SIGINT product codeword
back to top
V
VANGUARD – Certain type of cable tapping sensor *
VENATOR – Access to a Philippine mobile network provider, part of the MYSTIC program *
VENONA – Joint US-UK project for decrypting historical intercepts of one-time pad messages from the KGB; previously codenamed JADE, BRIDE and DRUG subsequently
VENUSAFFECT – System used at the Waihopai satellite intercept station *
VERDANT (VER) – Alleged SCI control system *
VESUVIUS – Prototype quantum computer, situated in NSA’s Utah Data Center
VICTORYDANCE – Joint NSA-CIA operation to map WiFi fingerprints of nearly every major town in Yemen *
VICTORYUNIFORM – Special Source collection *
VIEWPLATE – Processor for external monitor recreating target monitor from red video
VINEYARD – System used at the Waihopai satellite intercept station *
VINSON – KY-57/58 family of voice encryption systems
VINTAGE – System used at the Waihopai satellite intercept station *
VINTAGE HARVEST – Probably a military SIGINT tool
VISIONQUEST (VQ) – System used at the TITANPOINTE access point under the BLARNEY program
VOICESAIL – Intelligence database?
VORTEX – Class of SIGINT spy satellites (1978-1989)
VOTEDOOR – NSA managed server for the InfoWorkSpace (IWS) collaboration tool (2003) *
VOXGLO – Multiple award contract providing cyber security and enterprise computing, software development, and systems integration support *
VOYEUR – 4th party collection tool *
back to top
W
WABASH – The embassy of France in Washington DC *
WAGONBED – Hardware GSM controller board implant on CrossBeam or HP Proliant G5 server that communicates over I2C interface
WALBURN – High-speed link encryption, used in various encryption products
WATERFRONT – Processing system for data collected from vPCS shaping under the STEELFLAUTA program *
WATERWITCH – Hand-held tool for geolocating targeted handsets to last mile
WAVELEGAL – Authorization service that logs data queries
WAYLAND – Processing system related to FAIRVIEW Transit collection under FAA 704 & 705b *
WEALTHYCLUSTER (WC) – Processing system for low data rate internet traffic, that sessionizes all the data on the link before sending it to XKEYSCORE (since 2002, will be replaced by TURMOIL) * *
WEALTHYCLUSTER2 (WC2) – Protocol processing & session reassembly *
WEASEL – Type 1 Cryptographic algorithm used in SafeXcel-3340
WEBCANDID – NSA tool or database
WEE LOOK – ELINT systems on Navy EA-3Bs detecting SAM radars (Vietnam War)
WELLGROUNDED – Proposed, but not implemented internal NSA oversight program (early 1990s)
WELLSPRING – Tool that strips out facial images from e-mails and other communications, and displays those that might contain passport images *
WESTPORT – The mission of Venezuela at the United Nations in New York *
WHARPDRIVE – Joint venture between the German BND and another country with access for NSA (2013)* *
WHIPGENIE (WPG) – ECI compartment for details about the STELLARWIND program *
WHITEBIRCH – ASA project to set up an HF-DF network in South East Asia (initiated 1961)
WHITEBOX – Program for intercepting the public switched telephone network? *
WHITE WOLF – Joint Chiefs of Staff “advisory warning” program for all peripheral airborne reconnaissance missions (1963-?)
WHITE CLOUD – Unclassified codename for the PARCAE SIGINT satellite for ocean reconnaissance
WHITELIST – NSA tool
WHITESQUALL – International gateway switch access under the STORMBREW program *
WHITETAMALE – Operation for collecting e-mails from Mexico’s Public Security Secretariat *
WHIZBANG – Training program (?)*
WILLOW – Combination of a JUMPSEAT satellite and Low-Earth Orbit Program-989 ELINT sub-satellites (since 1982)
WILLY – AFSS COMINT support program during the Korea War (1950-?)
WINDCHASER – Tool or program related to MARINA *
WINDSORBLUE – Supercomputer developed by IBM * succeeded by WINDSORGREEN *
WINDSORGREEN – Supercomputer developed by IBM, successor of WINDSORBLUE * WINDSTOP – Umbrella program for 2nd Party high-volume cable tapping programs *
WISPYKNIT – Special Source collection *
WIRESHARK – Database with malicious network signatures
WISPYKNIT – Special Source collection *
WISTFULTOLL – Premiere target survey tool for Windows that runs on almost all targets automatically. It brings back informatio about the target system’s machine and operating system *
WITCH – Retired SIGINT product codeword
WITCHHUNT – ?
WOLFPOINT – SSO corporate partner under the STORMBREW program *
WORDGOPHER – Software system to demodulate low-rate satellite signals (2009) *
Wordscape – Vocabulary tool used at NSA
WRANGLER – Database or system which focuses on Electronic Intelligence
back to top
X
XBIT – Signals analysis software (bit manipulation) on the SCARAB computer, used in 2001 aboard the EP-3E aircraft *
XCONCORD – Program for finding key words in foreign language documents
XKEYSCORE (XKS) – Computer Network Exploitation (CNE) system that combines high-speed filtering with SIGDEV functions such as target development for discovering new sources of information. XKEYSCORE is deployed around the world and is used by each Five Eyes partner.*
back to top
Y
YACHTSHOP – Sub-program of OAKSTAR for collecting internet metadata, or NSA database, since 2005 accessible through GLOBALVISION *
YANKEE – Part of the PINWALE database (NOFORN partition?) *
YELLOWSTONE – NSA analytical database *
YIELD – Combination of a JUMPSEAT satellite and low-Earth orbit Program-989 ELINT sub-satellites (since 1982)
YOKE – AFSS tactical voice intercept support program during the Korea War (1951-?)
YUKON – The embassy of Venezuela in Washington DC *
back to top
Z
ZAP – (former?) database for texts *
ZARF – Compartment of TALENT KEYHOLE for ELINT satellites, retired in 1999 *
[0] Like this shit. Those fuckers. Burn in bleach hell you glow in the dark N-words
https://theintercept.com/2015/09/28/death-athens-rogue-nsa-operation/
https://darknetdiaries.com/transcript/64/
[1]
Q
02 Sep 2024Relax.
It’s just a 4 min piece.
About a purse-wearing gay cop in Baltimore, called The Queen of the Northern.
With a probably superfluous intermittent fanny-pack consideration-tangent.
And a request for Tha Queen, or Q, to keep it sexy.
Spoiler warning..
I guess.
The rest of the episode is complete trash, definitely don’t watch it.
It almost got me to think police could be people. For a second there.
It was horrible.
Hi
01 Sep 2024

