DocumentRelease Date: 2014-03-12
This extract from an undated NSA document describes the planned capability of the automated malware injection system Turbine as extending to “potentially millions of implants”: see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.
(TS//SI//REL) A new intelligent command and control capability designed to manage a very large number of covert implants for active SIGINT and active Attack that reside on the GENIE covert infras...
DocumentDocument Date: 2009-10-15Release Date: 2015-07-01
This NSA presentation from 15 October 2009 explains how analysts can exploit the products of the agency’s CNE hacking operations within XKeyScore and provides examples with screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CNE Analysis in XKEYSCORE 15 October 2009 email@example.com firstname.lastname@example.org) y >M 1-5 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL DERIVED F ROM: Ñ WCSSM 1-52 DATED: 2...
DocumentRelease Date: 2015-07-01
This 27-page NSA document, authored by a consultant from contractor Booz Allen Hamilton, provides a step-by-step guide to using XKeyScore, together with screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
unofficial-xks-user-guide-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 The Unofficial XKEYSCORE User Guide E92 - ADET Consultant, Booz Allen Hamilton Th...