Filtered By
GHOSTMACHINEX
Codewords [filter]
Results
7 Total
1.0

SSO GHOSTMACHINE Analytics

Document

Release Date: 2013-12-10
Excerpts from slides describing GHOSTMACHINE, the NSA Special Source Operations cloud-based analytics platform: see the Washington Post article New documents show how the NSA infers relationships based on mobile location data, 10 December 2013.
SSO GHOSTMACHINE Analytics TOP SECRET//COMINT//NOFORN Fascia Limit? 5,000M 4,000M - 3,000M - 2,000M - 1,000M - OM Hitting The Wall Tuskattire Volume Totals H CERF ...
1.0

Identifier Lead Triage with ECHOBASE

Document

Document Date: 2012-06-01Release Date: 2014-04-30
This SIGDEV presentation dated June 2012 describes techniques for filtering very large datasets through the cloud-based GHOSTMACHINE framework. Cooperation between NSA and GCHQ during the 2012 London Olympics – the “Olympic Option” – is used as a case study: see the Intercept article British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools, 30 […]
;---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------...
1.0

SPINALTAP: Making Passive Sexy for Generation Cyber

Document

Release Date: 2015-01-17
This undated NSA Menwith Hill presentation describes SPINALTAP, a project to combine data from active operations and passive signals intelligence: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, FVEY / '■%.^ (U//FOUO) SPINALTAP: Making Passive Sexy for Generation Cyber TOP SECRET//COMINT//REL TO USA, FVEY TOP SECRET//COMINT//REL TO USA, FVE...
1.0

Running Strategic Analytics Affecting Europe and Africa

Document

Release Date: 2014-06-18
This undated presentation from the NSA’s European Cryptologic Center explains some of the activities of the agency’s main European base: see the Der Spiegel article Terrorverdächtige: NSA nutzte Erkenntnisse aus Deutschland-Filiale für Tötungen, 15 June 2014.
(Uj Running btrategic Analytics Affecting Europe and Africa The overall classification of this briefing is: TOP SECRET//COM INT//REL USA, FVEYS//2D291 Region: Europe, Middle East (Isra...
1.0

HIDDENSALAMANDER: Alerting and Characterization of Botnet Activity in TURMOIL

Document

Release Date: 2015-01-17
This undated NSA presentation describes techniques for detecting botnets: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
P SECRET//COMINT//REL TO USA, FVEY HIDDENSALAMANDER Alerting and Characterization of _____iyiissiQr\] CAPABILIT, ES Botnet Activity in TURMOIL Briefers: SECRET//REL TO USA, FV...
1.0

TUTELAGE

Document

Release Date: 2015-01-17
This undated NSA presentation describes tecniques for repurposing third party attack tools: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET II COMINT ■ Communications Security Establishment Canada Centre de la sécurité des télécommunications Canada CSEC SIGINT Cyber Discovery: Summary of the current effort ...
1.0

How is Human Language (HTL) Progressing?

Document

Document Date: 2011-09-06Release Date: 2015-05-05
This 6 September 2011 post from the NSA’s internal SIDToday newsletter describes progress in the agency’s speech-to-text capability over the course of the year: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015.
(S//SI//REL) How Is Human Language Technology (HLT) Progressing? FROM: (U//FOUO)^^^H Language Analysis Modernization Lead (S2) Run Date: 09/06/2011 (S//SI//REL) Editor's intro: At the SI...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh