No Filters
Add Filters
From sidebar or searchbox
Results
748 Total

Targets visiting specific websites

Document

Release Date: 2015-07-01
Ths undated set of annotated screenshots from XKeyScore provides a worked example of a search: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-targets-visiting-specific-websites-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, AUS, CAN. GBR. NZU/20320108 Center.! =*oc Book Aleo Hammer See next page for Derived From: NSA'CSSM ...

XKEYSCORE System Administration

Document

Document Date: 2012-12-01Release Date: 2015-07-01
This 143-page NSA presentation from December 2012 provides a general introduction to the architecture, operation and administration of XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-system-administration-p1-normal.gif: TOP SECRET II SI II REL TO USA. AUS. CAN. GBR. NZL December 2012 t-—v.—r---------------- TOP SECRET // Si II REL TO USA, AUS, CAN, GBR, NZLxks-sy...

X-KEYSCORE as a SIGDEV tool

Document

Document Date: 2009-01-01Release Date: 2015-07-01
This 2009 NSA presentation describes some of the plug ins available and the way the tool relates to other NSA methods for searching internet metadata, with XKeyScore having the broadest capability: see the book No Place To Hide, 13 May 2014.
xks-as-a-sigdev-tool-p1-normal.gif: X-KEYSCORE as a SIGDEV tool 2009 ■EBTxks-as-a-sigdev-tool-p2-normal.gif: What is X-KEYSCORE?xks-as-a-sigdev-tool-p3-normal.gif: TOP SECRET//COMINT//ORC...

The Unofficial XKEYSCORE User Guide

Document

Release Date: 2015-07-01
This 27-page NSA document, authored by a consultant from contractor Booz Allen Hamilton, provides a step-by-step guide to using XKeyScore, together with screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
unofficial-xks-user-guide-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 The Unofficial XKEYSCORE User Guide E92 - ADET Consultant, Booz Allen Hamilton Th...

Communications System How To Guide

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration instructions for Communications System (Comms), one of the integral parts of the XKeyScore system: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET (TS//SCI) Communications System How To Guide The communications system (Comms) is the primary means that XKEYSCORE systems use to communicate among servers in the same cluster...

UTT Configuration README

Document

Release Date: 2015-07-01
This undated NSA technical document provides information about the Universal Targeting Tool (UTT), “a mission critical component of the TURBULENCE architecture”: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
utt-config-readme-p1-normal.gif: SECRET//REL TO USA, FVEY (U) UTT Configuration README (U) Overview (S//SI//REL) The Unified Targeting Tool (UTT) makes it possible to transition from to...

How to configure category throttling in XKeyScore

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration instructions for XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
SECRET//COMINT//RELTO USA, AUS, CAN, GBR, NZL How to configure category throttling in XKEYSCORE Category throttling is performed by the selected output plugin, in the xks.config you need to ...

Forwarding Selected MAILORDER Files Read Me

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration information for XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
UNCLASSIFED//FOR OFFICIAL USE ONLY (U//FOUO) Forwarding Selected MAILORDER Files Read Me (U//FOUO) This document explains how to configure an XKS cluster to forward selected sessions via M...

XKEYSCORE Workflows 2009

Document

Document Date: 2009-03-05Release Date: 2015-07-01
This NSA presentation dated 5 March 2009 outlines the use of Workflows within XKeyScore and includes screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-workflows-2009-p1-normal.gif: XKEYSCORE Workflows 05 March 2009 i3I SECRET//COMINT//REL TO USA, AUS, CAN, GBR, MZL i —* DERIVED FROM: NSA/CSSM 1-52 DATED: 20070108 ...

Tech Strings in Documents (aka Tech Extractor) 2010

Document

Document Date: 2010-04-01Release Date: 2015-07-01
This April 2010 NSA presentation explains how keyword selection works within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-tech-extractor-2010-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. AUS, CAN. GBR, NZL Tech Strings in Documents (aka Tech Extractor) TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZLx...

XKEYSCORE Application IDs

Document

Release Date: 2015-07-01
This undated NSA presentation gives a technical introduction to the treatment of AppIDs within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-application-ids-brief-p1-normal.gif: Classification: TOP SECRET//COMIIMT//ORCON//REL TO USA, FVEY//20291123 Classification: TOP SECRET//COMINT//ORCON//REL TO USA, FVEY//20291123 M - 1 *...

HTTP Activity in XKEYSCORE

Document

Document Date: 2009-03-01Release Date: 2015-07-01
This NSA presentation from March 2009 explains how agency analysts can exploit HTTP data through XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 HTTP Activity in XKEYSCORE March 2009 Derived From: NSA/QSSM 1-52 Dated: 200701 (T Declassify On: 202911 ...

Guide to using Contexts in XKS Fingerprints

Document

Release Date: 2015-07-01
This undated NSA technical document provides detailed information for performing searches within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.s
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL Guide to using Contexts in XKS Fingerprints Version 1.0 Example 1 $a = cc('pk') and (web_search('jihad') or document_body('planning for ...

Royale with Cheese Updater How To Guide

Document

Release Date: 2015-07-01
This undated NSA technical document describes, and provides configuration information for, the tool by which XKeyScore dictionaries are updated: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
SECRET//RELTO USA, AUS, CAN, GBR, NZL (S//REL) Royale with Cheese Updater How To Guide (S//REL) Setup and configuration of the Royale with Cheese Updater takes just a few steps. Follow th...

Free File Uploaders (FFU)

Document

Document Date: 2009-08-13Release Date: 2015-07-01
This NSA presentation from 13 August 2009 explains how data from Free File Uploaders (FFU) can be analysed within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Agenda TOP SECRET//COMINT//RELTO USA, AUS, CAN, GBR, NZL ■ Ove...

DNI 101 How Do I Begin Analyzing a Target’s Email Address?

Document

Release Date: 2015-07-01
This undated NSA document provides a decision tree for the analysis of email addresses, IP addresses, cookies and phone numbers in XKeyScore and other agency tools: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//20291123 DNI101 How Do I Begin Analyzing a Target's Email Address? TOP SECRET//COMINT//20291i23 [ =Tool/Database^ What Things Are Found Doing DNI Analysis and What...

CNE Analysis in XKeyScore

Document

Document Date: 2009-10-15Release Date: 2015-07-01
This NSA presentation from 15 October 2009 explains how analysts can exploit the products of the agency’s CNE hacking operations within XKeyScore and provides examples with screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CNE Analysis in XKEYSCORE 15 October 2009 xkeyscore@nsa.ic.gov l@nsa.ic.gov) y >M 1-5 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL DERIVED F ROM: Ñ WCSSM 1-52 DATED: 2...

CADENCE Read Me

Document

Release Date: 2015-07-01
This undated NSA technical document provides an overview and configuration instructions for the tasking tool CADENCE, which can be integrated with XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CON Fl DENTIAL//SI (U/FOUO) CADENCE Read Me (U) Overview (C//SI) CADENCE is a strong selection tasking tool dating back to the days of telegraphy. In the world of telegraphy, only the t...

Analyzing Mobile/Cellular DNI in XKeyScore

Document

Document Date: 2009-05-01Release Date: 2015-07-01
This NSA presentation from May 2009 describes the procedure for analysing phone data within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015. analyzing-mobile-cellular-dni-in-xks
Analyzing Mobile/Cellular DNI in XKEYSCORE May 2009 TOP SECRET//COMINT//REL TO USA, AUS, CAN. GBR. NZL//20291123 08 TOP SECRET/,'COMINT//REL TO USA, AUS, CAN, GBR, NZL Mobile DNI ...

Phone Number Extractor

Document

Document Date: 2009-10-01Release Date: 2015-07-01
This NSA presentation from October 2009 explains how XKeyScore automatically extracts phone numbers from intercepts: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Phone Number Extractor TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//COMINT//RELTO USA, AUS, CAN...

Introduction to XKS Application IDs and Fingerprints

Document

Document Date: 2009-08-27Release Date: 2015-07-01
This 60-page NSA presentation from 27 August 2009 explains the use of different kinds of metadata tags in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Application IDs and Fingerprints 27 August 2009 .... ‘s 01 Ol A l • DERIVED FROM: NSA/CSSM...

DEEPDIVE Configuration Read Me

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration instructions for DEEPDIVE, a system that can be integrated with XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CONFIDENTIAL (U//FOUO) DEEPDIVE Configuration Read Me (U) Overview (C) The purpose of this document is to provide procedures to configure an XKEYSCORE server as a DEEPDIVE server. DEEPD...

Full Log vs. HTTP

Document

Document Date: 2009-06-11Release Date: 2015-07-01
This NSA presentation from 11 June 2009 explains the scope of metadata collection within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Log vs. HTTP 11 June 2009 * WHv:i DERIV TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//...

User-agents: Why and How and How to

Document

Document Date: 2010-07-01Release Date: 2015-07-01
This NSA presentation from July 2010 explains the User-agent options within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
user-agents-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. FVEY (S//SI//REL) User-agents: Why and How and How to The overall classification of this briefing to TOP SECRET//COMINT//REL TO US...

Using XKS to find and search for logos embedded in documents

Document

Release Date: 2015-07-01
This undated NSA document describes how the XKeyScore system automatically extracts logos from Microsoft Word documents and Outlook emails: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-logos-embedded-in-docs-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL Booz I Allen I Hamilton ADET-E92 Using XKS to find and search for logos embedded in documents ...

XKEYSCORE Search Forms

Document

Document Date: 2009-03-01Release Date: 2015-07-01
This 49-page March 2009 NSA presentation explains how to conduct searches within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-search-forms-p1-normal.gif: XKEYSCORE Search Forms March 2009 El • *1 ... ■ OK l 1001 SECRET//COMINT//REL TO USA, AUS, CAN, GBR, MZL 1-52 DATED: 20...

Email Address vs User Activity

Document

Document Date: 2009-06-24Release Date: 2015-07-01
This NSA presentation from 24 June 2009 explains how to use the email search functionality within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 vs User Activity 24 June 2009 "»Ol 01 t » «4 Ha#f* IWt De rived From: NSA/CSSM 1-52 ...

Statistics Configuration Read Me

Document

Release Date: 2015-07-01
This undated NSA technical document provides configuration information for XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
SECRET//RELTO USA, AUS, CAN, GBR, NZL (s//rel) Statistics Configuration Read Me (S//REL) Statistics configurations are stored in two locations: xks.config and xks.advanced.config. Some o...

Tech Strings in Documents (aka Tech Extractor) 2009

Document

Document Date: 2009-12-01Release Date: 2015-07-01
This December 2009 NSA presentation explains how keyword selection works within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-tech-extractor-2009-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. AUS, CAN, GBR. NZU/20291123 Tech Strings in Documents (aka Tech Extractor) December 2009xks-tech-extractor-2009-p2...

Advanced HTTP Activity Analysis

Document

Document Date: 2009-01-01Release Date: 2015-07-01
This 114-page NSA training presentation from 2009 explains how agency analysts can exploit HTTP traffic within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
Advanced HTTP Activity Analysis 2009 Goal The goal of this training is to get you familiar with basic HTTP traffic and understand how to target and expliot it using X-KEYSCORE Ag...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh