Filtered By
FASCIA X
Codewords [filter]
Results
13 Total
0.0

Events Product Centre

Document

Release Date: 2015-09-25 Document Date: 2010-11-01
This GCHQ presentation from November 2010 shows that the agency was logging 30 billion metadata records per day by that year: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
operational-engineering-nov-2010-p1-normal.gif: •¿events Events Product Centre W: CHQ SECRET STRAP1operational-engineering-nov-2010-p2-normal.gif: »¿events Agenda «Welcome «Im...
0.0

Tasking of SCALAWAG

Document

Release Date: 2014-03-18
This extract from the NSA’s Special Source Operations division’s weekly memo describes the operation of SCALAWAG, the SIGAD (or collection address) associated with the MYSTIC collection of bulk telephony data: see the Washington Post article NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls, 18 March 2014.
(U) Tasking of SCALAWAG (TS//SI//REL TO USA, FVEY) SCALAWAG/US-3310BG has long since reached the point where it was collecting and sending home far more than the bandwidth could handle. Over ...
0.0

APEX Active/Passive Exfiltration

Document

Release Date: 2015-01-17 Document Date: 2009-08-01
This NSA TURBULENCE presentation dated August 2009 explains the APEX method of combining passive with active methods to exfiltrate data from networks attacked: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Active/Passive Exfiltration "go apex" STDP: S32354 & T112, NCSC/C91 August 2009 OP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//COMHMT//REL TO USA. AUS. CAN....
0.0

Analytic Challenges from Active-Passive Integration

Document

Release Date: 2014-12-28
This undated NSA presentation from the agency’s Information Technology Directorate, aimed at analysts, describes techniques for decrypting IPSec VPN traffic: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
This Briefing is Classified TOP SECRET//COMINT//REL USA, FVEY Analytic Challenges from Active-Passive Integration S324 This Briefing is Classified TOP SECRET//COMINT//REL USA,FVEY DER...
0.0

XKEYSCORE Search Forms

Document

Release Date: 2015-07-01 Document Date: 2009-03-01
This 49-page March 2009 NSA presentation explains how to conduct searches within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-search-forms-p1-normal.gif: XKEYSCORE Search Forms March 2009 El • *1 ... ■ OK l 1001 SECRET//COMINT//REL TO USA, AUS, CAN, GBR, MZL 1-52 DATED: 20...
0.0

Summary of DNR and DNI Co-Travel Analytics

Document

Release Date: 2013-12-10 Document Date: 2012-10-01
This 24 page white paper dated 1 October 2012 describes and evaluates some of the Co-Traveller tools the NSA and partner agencies uses to analyse phone location data: see the Washington Post article New documents show how the NSA infers relationships based on mobile location data, 10 December 2013.
TOP SECRET//COMINT//REL TO USA, FVEY Summary of DNR and DNI Co-Travel Analytics S2I5 1 October 2012 Contact information TOP SECRET//COMINT//REL TO USA, FVEY TOP SECRET//COMINT//R...
0.0

Atomic SIGINT Data Format (ASDF) Configuration Readme

Document

Release Date: 2015-07-01
This undated NSA document explains how to set up an aspect of the XKeyScore architecture: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
SECRET (U//FOUO) Atomic SIGINT Data Format (ASDF) Configuration Read Me (U) Overview (U//FOUO) The ASDF Configuration Read Me is designed to provide procedures for other organizations ...
0.0

FAIRVIEW Dataflow Diagrams

Document

Release Date: 2015-08-15 Document Date: 2012-04-01
This April 2012 NSA presentation uses an AT&T specific term – Common Backbone or CBB – to refer to the Internet backbone of the corporate partner it codenames FAIRVIEW: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
Dataflow Diagrams April 2012 Note: Please refer to previous diagrams for decommissioned systems. Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20361101 TOP SECRET//COMIN...
0.0

VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN

Document

Release Date: 2014-03-12
Slides from an NSA Turbulence presentation describe two of the agency’s specialised implants, aimed at compromising virtual private networks (VPNs) and online telephony (VOIP): see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 APEX VPN Phases ► VPN Phase 1: IKE Metadata Only (Spin 15) - IKE packets are exfiled to TURMOIL APEX. ■ APEX reconstructs/r...
0.0

CRISSCROSS/PROTON

Document

Release Date: 2014-08-25 Document Date: 2006-02-26
This NSA Point Paper dated 22 February 2006 provides a history of the CRISSCROSS and PROTON information sharing systems that preceded ICREACH: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
TOP SECRET//COMINT//ORCON/NOFORN//MR POINT PAPER SUBJECT: CRISSCROSS/PROTON PURPOSE: Provide DIRNSA information on subject. BACKGROUND: 22 Feb 06 (U) History of CRISSCROSS/PROTON...
0.0

Event (SIGINT)

Document

Release Date: 2015-09-25
This undated page from GCHQ’s internal GCWiki provides a definition of “event”, the term the agency uses to refer to a metadata record, showing the variety of data collected: see the Intercept article Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, 25 September 2015.
events-p1-normal.gif: SECRET STRAP 1 COMiNT The maximum classification allowed on GCWiki is TOP SECRET STRAP1 COMINT. Click to report inappropriate content. For GCWiki help contact: webtea...
0.0

Sharing of MetaData across the IC —- Dissemination of SIGINT Metadata Beyond NSA

Document

Release Date: 2014-08-25 Document Date: 2005-07-06
This memorandum dated 6 July 2005 describes features of the intelligence sharing systems that preceded ICREACH: see the Intercept article The Surveillance Engine: How the NSA Built Its Own Secret Google, 25 August 2014.
SECRET//NOFORN//MR UNITED STATES GOVERNMENT memorandum TAC-0xx-05 DATE: 06 July 2005 REPLY TO ATTN OF: TD/TAC SUBJECT: Sharing of MetaData across the IC —Dissemination of SIGINT ...
0.0

Joint SIGINT Activity Annual Report for 2007

Document

Release Date: 2014-06-18
This undated NSA document gives updates on various activities of the US-German Joint SIGINT Activity during 2007: see the Der Spiegel article Snowden-Dokumente: Hier sitzt die NSA in Deutschland, 18 June 2014. jsa
TOP SECRET//COMINT//RELTO USA, FVEY (U//FOUO) TEC Successfully Installs BOTANICREALTY at LADYLOVE (USJ-799) (TS//SI//REL) In response to a request from S2B, MSOC System Development and Sign...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh