Why Soviet Weather Was Secret, a Critical Gap in Korea, and Other NSA Newsletter Tales – The Intercept
Three years after the 9/11 attacks, a frustrated NSA employee complained that Osama bin Laden was alive and well, and yet the surveillance agency still had no automated way to search the Arabic language PDFs it had intercepted.
This is just one of many complaints and observations included in SIDtoday, the internal newsletter of the NSAs signals intelligence division. The Intercept today is publishing 251 articles from the newsletter, covering the second half of 2004 and the beginning of 2005. The newsletters were part of a large collection of NSA documents provided to The Intercept by Edward Snowden.
This latest batch of posts includes candid employee comments about over-classification, descriptions of tensions in the NSA-CIA relationship, and an interns enthusiastic appraisal of a stint in Pakistan.
Most revealing perhaps are insights into how NSA has operated domestically. The Intercept is publishing two stories on this topic, including one about NSA cooperation with law enforcement during American political conventions, and in a throwback to the movie Bladerunner, another article describes a spy balloon used over the United States.
Finally, The Intercept, in cooperation with the Japanese broadcaster NHK, is revealing the history of U.S. surveillance cooperation with Japan. Starting with the American occupation of Japan after World War II and reaching a standoff after the Soviet shoot-down of a South Korean aircraft, the long and sometimes tense relationship reveals how even close U.S. allies can find themselves targeted by the NSA.
The NSAs Follow-the-Money Branch (the actual name of the division) brings together experts from across a spectrum of disciplines and organizations. The division in 2004created a North Korea CRASH Team, short for Combined Rapid Analysis and Synthesis Hit, after the State Department issued a requirement for a new emphasis on regime finance and an increased emphasis on North Koreas financing of its nuclear proliferation. In response, the CRASH Team looked at North Korean transactions that went through foreign banks. In particular, the team targeted leadership finance, i.e. Kim Jong Il, the North Korean leader who died in 2011, and traced sales of precious metals allegedly owned by him, weapons shipments, and relationships among regime leaders.
The 6throck drill on Korea brought together NSA and officials from the U.K., Canada, Australia, and New Zealand to rehearse the scenarios involving civilian evacuations in Seoul and Pyongyang during a hypothetical Korean War. Participants planned a response to a North Korean attack and held a brainstorming session about signals intelligence operations in a hypothetical newly unified Korea. In the discussions, critical gaps were found in communications with trusted Five Eyes countries, which did not have access to the computer networks for the Korea Theater of Operations. Twenty-two other nations committed to defending South Korea are not included in intelligence sharing either.So NSA will be working through some of these problems, with the goal of exercising the resulting solutions sometime in early 2005.
Czech youngsters stand atop an overturned truck as the Soviet-led invasion by the Warsaw Pact armies crushes the so-called Prague Spring reform in former Czechoslovakia, in Prague on Aug. 21, 1968.
Photo: Libor Hajsky/AFP/Getty Images
Back in the late 1960s, Charlie Meals, the deputy director of SID, worked in the Soviet weather shop. The only way the U.S. could track weather in the Soviet Union was by listening to Soviet communications. The Soviets knew the U.S. was listening and so it encrypted the locations of weather reports. U.S. Strategic Air Command needed to have weather reports in case bombers ever had to fly into Soviet air space, and the weather reporting could also be an indicator of impending military action. For example, before the 1968 invasion of Czechoslovakia, the Soviets started including Czech weather reports in military broadcasts. (The intricacies of collecting weather data as intelligence is also described in this article by Jeffrey Richelson of National Security Archive.) The weather effort had at least 250 people at NSA and people at bases around the world. This desk was still in operation in 2004.
FBI field office staff made little use of signals intelligence and many didnt know how to access the information for themselves on the Intelligence Communitys Intelink system, according to an NSA intern, describing assignments at the bureau. The FBI field offices had little or no Sensitive Compartmented Information Facility space, which made it difficult to share the higher levels of intelligence between the agencies. The intern had higher regard for FBI headquarters. With data from the NSA, FBI analysts can now immediately tell if an individual in the U.S. has any foreign terrorism-related contacts.
A rebel is blessed during a Voodoo ceremony of the Gonaives Resistance Front, during a march in Gonaives, Haiti, on Feb. 13, 2004.
Photo: Walter Astrada/AP
The NSA tracked High Value Targets in Haiti following the 2004 coup, according to an article classified Top Secret. An NSA staffer reports that a task force on HVTs traveled to the central highlands of Haiti where they met with rebel leaders. During this trip they had collected several telephone numbers of these leaders and their associates, the staffer wrote. Soon thereafter, the NSA began to see multi-page reports of conversations between one important rebel leader and his wife which provided insight into his negotiating position and plans for control of the central highlands. Those private conversations proved useful. I received several emails from people who were incredulous that a conversation between an HVT target and his girlfriend was of any importance, the staffer went on. The truth is that a lot of SIGINT leavings that never make it into normal SIGINT reporting are actually valuable intelligence items for tactical warfighters.
NSA interns see the sights, even in Pakistan. An intelligence analysis intern working in SIDs Pakistan branch was deployed to assignments in Islamabad and Lahore. At the embassy, the intern focused on signals intelligence related to the non-tribal Settled Areas and coordinated communications among NSA, CIA and the local counterpart i.e. Pakistani partners, in tracking and targeting terrorists. The Settled Areas Office along with their local counterparts was responsible for the arrests of more than 600 alleged terrorists from September 11, 2001to 2004. Outside of working hours, the blonde American attracted a constant stream of stares and curious looks as she ventured out to tourist sites. Station Islamabad, which has been fictionalized in Homeland and Zero Dark Thirty, was to this staffer one of the most exciting, challenging, and fast-paced locations to work in the world.
Q: What do SIGINT and mad cows have in common?
A: Both are of critical interest to the U.S. Department of Agriculture
SIGINT isnt just for intelligence or military agencies. NSAs two-person Washington Liaison Office responds to signals intelligence requests from Departments of Agriculture, Health and Human Services, Interior, Transportation, the Environmental Protection Agency, Export-Import Bank, Federal Aviation Administration, Federal Communications Commission, Federal Reserve System, and National Aeronautics and Space Administration. With such a wide range of subject matter and competing priorities, the liaison officers have to balance topics from bovine spongiform encephalopathy to space launch vehicle capabilities; from narcotics interdiction techniques to wine labeling regulations; from toxin delivery technologies to secure communications options, and much, much more.
A protestor holding a portrait of Osama bin Laden shouts Allahu Akbar during a protest in front of Baiturrahman mosque, Banda Aceh, Indonesia, on Oct. 10, 2001.
Photo: AFP/Getty Images
Imagine if the NSA missed warning signs of an attack for no other reason than it couldnt search Arabic words in PDF format. If you were looking for Osama bin Laden, wrote an NSA employee in SIDtoday, and you had entered every Arabic word known to mankind in every possible encoding and Osama were doing nothing more than using PDF and writing in Arabic, youd never get a hit. Quite reassuring, isnt it?
Near the end of 2004, SIDtoday began publishing a technical advice column written by an experienced Digital Network Intelligence analyst under the pseudonym Raul. One articledescribes a gaping intelligence hole that NSA had at the time, three years after the 9/11 attacks. Though analysts at NSA understood exactly how foreign-language PDFs were encoded, they lacked the technology to untangle them in real-time in order to search them for keywords.
Apparently, this article hit a few nerves. Rauls subsequent column responded to a flood of complaints he had received. In the subsequent column, he outlined requirements for a hypothetical solution to the foreign-language PDF problem, and concluded with a bit of snark: Bin Laden is still safe and we, to the best of my knowledge, still have no reasonable solution to the PDF problem.
For some sensitive missions, NSA personnel need cover identities while working in the field. An article from October 2004 describes how agents go about making NSA personnel look like they actually work for an entity other than NSA. The Special Operational Support office is responsible for NSAs cover and sensitive personnel support programs. In addition to ensuring that cover operations comply with Department of Defense regulations, SOS provides logistics, transportation, personnel and medical support. The office also provides undercover operatives with DoD Common Access Cards (CAC), travel documents, state drivers licenses, credit cards, post office boxes, social security cards, pocket litter and telecommunications.
The NSA, it turns out, likes to stay on top of the latest scientific developments. Writing at the end of 2004, an NSA cryptanalyst described her experience working as an intern, and using her cryptography skills, on looking for information about genetic sequencing in the signals intelligence collected by the NSA. The ultimate goals of this project are to gain general knowledge about genetic engineering research activity by foreign entities, she wrote, and to identify laboratories and/or individuals who may be involved in nefarious use of genetic research.
Chairman Thomas Kean speaks during a news conference to release the 9/11 Commissions report in Washington on July 22, 2004.
Photo: Mark Wilson/Getty Images
Even though the 9/11 Commission report harshly criticized intelligence agencies failures to share information, the NSA touted its contribution to the July 22, 2004, report. It goes without saying that NSA Cooperation was absolutely vital to this effort, an article in SIDtoday says. SID staff aided in the declassification of material, turned over documents, and patiently explained the intricacies of their work. SID workers also scrubbed references to the NSA from the final report, rewording sections to avoid indications that certain pieces of intelligence derived from SIGINT. You should all feel proud, writes the posts author.
Yet the report itself points to specific SIGINT that could have led to the discovery of the attackers conspiracy that remained unshared due to agencies fear of disclosing intelligence to inappropriate channels and a culture of secrecy in which agencies feeling they own the information they gathered at taxpayer expense.
A prior SIDtoday article touted the agencys extraordinary level of cooperation and provision of large volumes of SIGINT assessment reporting on terrorism, strategic business plans, and a wide range of other topics.
Cooperation between the NSA and CIA runs deep, but it hasnt always been smooth. An August 6 post, CIAs Directorates . . . Understanding More About Them, talks about turf wars due to real or perceived mission overlap, particularly within the CIAs technical division. Yet the Special Collection Service (SCS), which surveils foreign communications from U.S. embassies, is seen as a positive example of joint CIA-NSA work. SIDtoday cites the achievements of that highly classified organization, which came under scrutiny in 2013 for reports that its Berlin office had been intercepting Chancellor Angela Merkels mobile phone data. The August 18 post, SCS and Executive Protection details the interception of Philippine police communications about a bomb that had been placed on President Clintons motorcade route, which the police were trying to defuse without informing the Americans. SCS passed this information to the Secret Service, who re-routed the cars.
The NSA-CIA relationship was also the subject of two SIDtoday articles in 2003.
Even the NSA acknowledges that it classifies too much. In an article, Do We Overclassify? Are We Sharing Enough Information? a senior SID leader echoes language from the 9/11 Commission report, specifically citing the need to go from a climate of need to know to one of need to share. This interview shares the reports concern that intelligence agencies err on the side of over-classification: If we continue to insist on classifying information which has already become known to our adversaries or for which disclosure would cause little or no harm to national security, we risk losing control over the really sensitive stuff. Tellingly, though, he fears that Congress itself will act to force the NSA to disclose more information.
Post-9/11, the NSA has expanded its cooperation with law enforcement agencies, including the U.S. Marshals Service. In February 2004, SID formalized a relationship with the Marshals and its Electronic Surveillance Unit, which functions like an intelligence operations team, as it both monitors fugitives and provides support and threat assessments to other agencies. The U.S. Marshals Service represents an ideal client for the NSA given its interest in stay(ing) out of the public limelight and courthouses.
Top photo: North Korean soldiers carry a portrait of late leader Kim Jong Il during a military parade to mark 100 years since the birth of the countrys founder Kim Il Sung in Pyongyang on April 15, 2012.
Read the rest here:
Why Soviet Weather Was Secret, a Critical Gap in Korea, and Other NSA Newsletter Tales - The Intercept
- Wyden blocks nominee to lead NSA and Cyber Command - Federal News Network - February 27th, 2026 [February 27th, 2026]
- Wyden blocks Rudd confirmation to lead Cyber Command, NSA - The Record from Recorded Future News - February 27th, 2026 [February 27th, 2026]
- NSA said to have seen security concerns in Grok - breakingthenews.net - February 27th, 2026 [February 27th, 2026]
- NSA: Solid Q4 Beat and Favorable 2026 Outlook, But Cost Pressures and High Expectations Justify Hold Rating - TipRanks - February 27th, 2026 [February 27th, 2026]
- Videotron and Samsung Expand Partnership Through 5G NSA and 4G LTE Core Gateway Deployment - samsung.com - February 24th, 2026 [February 24th, 2026]
- Videotron Taps Samsung for Cloud-Native 5G NSA and LTE Core Gateway Solution - The Fast Mode - February 24th, 2026 [February 24th, 2026]
- El-Rufai Demanded to Provide Evidence in NSA Hacking Claims - streamlinefeed.co.ke - February 24th, 2026 [February 24th, 2026]
- DSS to arraign El-Rufai on Feb. 25 over alleged NSA phone interception - Businessday NG - February 24th, 2026 [February 24th, 2026]
- Securus Technologies Supports Expansion of Sheriff-Led NSA I.G.N.I.T.E. Initiative to Improve Jail Safety and Reentry Outcomes - PR Newswire - February 7th, 2026 [February 7th, 2026]
- NSA set to deal with defiant parties, politicians, supporters on integrity of democratic process - ThePointNG - February 7th, 2026 [February 7th, 2026]
- Where NSA zero trust guidance aligns with enterprise reality - Help Net Security - February 4th, 2026 [February 4th, 2026]
- UNG third in Division 1 of NSA cyber event - University of North Georgia - February 4th, 2026 [February 4th, 2026]
- Green Beret Lieutenant General Joshua Rudd Tapped To Lead NSA and US Cyber Command - SOFREP - February 4th, 2026 [February 4th, 2026]
- SC Flags Health Concerns, Urges Rethink on Sonam Wangchuks NSA Detention - The Morning Voice - February 4th, 2026 [February 4th, 2026]
- What security teams need to know about the NSA's new zero trust guidelines - IT Pro - February 4th, 2026 [February 4th, 2026]
- 'India won't be bullied': NSA Ajit Doval told Marco Rubio that New Delhi would wait out Trump term for trade deal: Report - theweek.in - February 4th, 2026 [February 4th, 2026]
- When Protest becomes a Threat: Inside the Supreme Court hearing on Sonam Wangchuks NSA detention - SabrangIndia - February 4th, 2026 [February 4th, 2026]
- If NSA Commits Database Query Violations, But Nobody Audits Them, Do They Really Happen? - emptywheel - February 4th, 2026 [February 4th, 2026]
- Army general tapped to lead NSA vows to follow the law if confirmed - Military Times - February 1st, 2026 [February 1st, 2026]
- Overturned tractor-trailer shuts portion of Route 32 near NSA - WBAL-TV - February 1st, 2026 [February 1st, 2026]
- Nominee to lead NSA backs controversial spying law - Defense One - February 1st, 2026 [February 1st, 2026]
- NSA pick champions foreign spying law as nomination advances - The Record from Recorded Future News - February 1st, 2026 [February 1st, 2026]
- NSA Releases Phase One and Phase Two of the Zero Trust Implementation Guidelines - National Security Agency (.gov) - February 1st, 2026 [February 1st, 2026]
- Army General Tapped to Lead NSA Said He Doesnt Know Much About the Biggest NSA Controversy - The Intercept - February 1st, 2026 [February 1st, 2026]
- Trump's pick to lead the NSA vows to follow the law if confirmed - ABC News - February 1st, 2026 [February 1st, 2026]
- Trump's pick to lead the NSA vows to follow the law if confirmed - Oskaloosa Herald - February 1st, 2026 [February 1st, 2026]
- Trump's pick to lead the NSA vows to follow the law if confirmed - The Derrick - February 1st, 2026 [February 1st, 2026]
- Overturned tractor-trailer shuts westbound Maryland Route 32 near NSA exit, police say - WBAL News Radio - February 1st, 2026 [February 1st, 2026]
- SC to hear plea against Sonam Wangchuks NSA detention on February 2 - The New Indian Express - February 1st, 2026 [February 1st, 2026]
- Powys sheep sector to hear from Llyr Gruffydd at NSA meeting - County Times - February 1st, 2026 [February 1st, 2026]
- NSA calls for consultation on castration and tail docking to involve sheep farmers - cravenherald.co.uk - January 24th, 2026 [January 24th, 2026]
- NSA launches 13th annual survey for insight into cases of sheep worrying by dogs - Yahoo News UK - January 24th, 2026 [January 24th, 2026]
- NSA Ajit Doval says he doesn't use phone or internet. Here's why - MSN - January 14th, 2026 [January 14th, 2026]
- NSA Ajit Doval says he doesnt use phone or internet; shares views on Indias future and youth - WION - January 11th, 2026 [January 11th, 2026]
- Liberia: NSA Director's Special Assistant Suspended Amid Alleged Gang Sodomy of 15-Year-Old; Authorities Remain Silent - FrontPageAfrica - January 11th, 2026 [January 11th, 2026]
- 'Wars happen because some countries want to impose their will on others': NSA Ajit Doval - Deccan Herald - January 11th, 2026 [January 11th, 2026]
- We have to avenge our history: NSA Ajit Doval urges youth to make India great in every aspect - The Indian Express - January 11th, 2026 [January 11th, 2026]
- CISA, NSA, and Canadian Cyber Centre update Brickstorm analysis with new Rust-based variants - Industrial Cyber - January 11th, 2026 [January 11th, 2026]
- ROVER communication terminals approved for international use by NSA - Military Embedded Systems - January 9th, 2026 [January 9th, 2026]
- L3Harris ROVER and TNR systems gain NSA approval enabling secure coalition interoperability - Defence Industry Europe - January 9th, 2026 [January 9th, 2026]
- Former NSA insider Kosiba brought back as spy agencys No. 2 - The Record from Recorded Future News - January 9th, 2026 [January 9th, 2026]
- Trumps tariff threat to India self-inflicted wound: Former US NSA John Bolton - The Indian EYE - January 9th, 2026 [January 9th, 2026]
- NSA Scotland demands support for sheep farmers ahead of Holyrood elections - Farmers Guardian - January 9th, 2026 [January 9th, 2026]
- Announcing tariffs for purchasing Russian oil unfortunate: Former US NSA backs closer relationship with India - Punjab News Express - January 9th, 2026 [January 9th, 2026]
- NSA Ajit Doval likely to be part of Indian delegation at WEF in Davos - The New Indian Express - January 9th, 2026 [January 9th, 2026]
- "A lot of hot air": Former NSA John Bolton on Trump's remarks on possible action beyond Venezuela - ANI News - January 9th, 2026 [January 9th, 2026]
- NSA employee sues Trump administration over order on transgender rights and two 'immutable' genders - Yahoo - December 22nd, 2025 [December 22nd, 2025]
- NSA employee sues the Trump administration over transgender rights and 'immutable' genders - AP News - December 22nd, 2025 [December 22nd, 2025]
- Senior official at Indo-Pacific Command is set to be Trumps pick to lead Cyber Command, NSA - The Record from Recorded Future News - December 22nd, 2025 [December 22nd, 2025]
- NSA employee sues the Trump administration over transgender rights and 'immutable' genders - Temple Daily Telegram - December 22nd, 2025 [December 22nd, 2025]
- Potential NSA, Cyber Command leader nomination transmitted to Senate - Nextgov/FCW - December 22nd, 2025 [December 22nd, 2025]
- After Eight Months, White House Names Nominee To Head NSA And CYBERCOM - Defense Daily - December 22nd, 2025 [December 22nd, 2025]
- Fubara Hosts NSA, Says Tinubu Happy With Rivers Governor - TVC News - December 22nd, 2025 [December 22nd, 2025]
- CISA, NSA warn of Chinas BRICKSTORM malware after incident response efforts - The Record from Recorded Future News - December 10th, 2025 [December 10th, 2025]
- CISA and NSA Warn of BRICKSTORM Malware Attacking VMware ESXi and Windows Environments - CybersecurityNews - December 10th, 2025 [December 10th, 2025]
- NSA, CISA, and Others Release Guidance on Integrating AI in Operational Technology - National Security Agency (.gov) - December 4th, 2025 [December 4th, 2025]
- NSA has met 2,000-person workforce reduction goal, people familiar say - Nextgov/FCW - December 4th, 2025 [December 4th, 2025]
- NSA Doval, Thai Foreign Minister Phuangketkeow discuss maritime security, threats of online scams - The Indian EYE - December 4th, 2025 [December 4th, 2025]
- NSA Doval, Thai FM discuss maritime security, threats of online scams - Awaz The Voice - December 4th, 2025 [December 4th, 2025]
- All-clear issued about 2 hours after NSA Naples schools evacuated over potential threat - Stars and Stripes - November 18th, 2025 [November 18th, 2025]
- 'Dhurandhar': R Madhavan reveals Aditya Dhar's little trick that perfected his NSA-inspired look for the - The Times of India - November 18th, 2025 [November 18th, 2025]
- Army officer with Indo-Pacific experience emerges as potential Cyber Command, NSA pick - The Record from Recorded Future News - November 18th, 2025 [November 18th, 2025]
- NSA Dr Rahman to attend Security Conclave in New Delhi - United News of Bangladesh - November 18th, 2025 [November 18th, 2025]
- Man claims NSA told him to shatter glass at AT&T building with hatchet, Nashville police say - WSMV - November 18th, 2025 [November 18th, 2025]
- How the heartbreaking lack of a confirmed leader is impacting CYBERCOM and NSA - Breaking Defense - November 7th, 2025 [November 7th, 2025]
- Goa invokes NSA for three months to tackle anti-socials - The Times of India - November 7th, 2025 [November 7th, 2025]
- CISA, NSA and other unveil security blueprint to harden Microsoft Exchange servers - Homeland Preparedness News - November 7th, 2025 [November 7th, 2025]
- NSA Shares Q3 Revenue Results Below Expectations - GuruFocus - November 7th, 2025 [November 7th, 2025]
- Filipinos aware of civilian supremacy over military NSA Ao - Philippine News Agency - October 28th, 2025 [October 28th, 2025]
- Sonam Wangchuk says his words were twisted to justify his NSA detention - The Statesman - October 26th, 2025 [October 26th, 2025]
- Nokia and stc pioneer the first commercial 5G NSA Cloud RAN deployment in the MEA region - ZAWYA - October 26th, 2025 [October 26th, 2025]
- China accuses NSA of multi-year hack targeting its national time systems - Nextgov/FCW - October 23rd, 2025 [October 23rd, 2025]
- Cybersecurity News: AWS outage, NSA hacking accusations, High risk WhatsApp automation - CISO Series - October 23rd, 2025 [October 23rd, 2025]
- Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials - Homeland Security Today - October 23rd, 2025 [October 23rd, 2025]
- AWS outage, NSA hacking accusations, High risk WhatsApp automation - LinkedIn - October 23rd, 2025 [October 23rd, 2025]
- Palestinian President Mahmoud Abbas: No Concessions Were Made In The Oslo Accords 1.85 Million Palestinians Returned To Their Homeland;... - October 23rd, 2025 [October 23rd, 2025]
- NSA to partner JKG to drive sports technology through Artificial Intelligence - GhanaWeb - October 23rd, 2025 [October 23rd, 2025]
- China claims NSA hacked its national timing systems using 42 "special cyber weapons" - TechSpot - October 23rd, 2025 [October 23rd, 2025]
- US NSA alleged to have launched a cyber attack on a Chinese agency - csoonline.com - October 21st, 2025 [October 21st, 2025]
- Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials - 404 Media - October 21st, 2025 [October 21st, 2025]