Filtered By
OAKSTAR X
Codewords [filter]
Results
17 Total
0.0

OAKSTAR Travel Handbook: A Guide for Traveling

Document

Release Date: 2018-03-20 Document Date: 2013-03-01
This internal document for NSA employees dated 1 March 2013 provides a guide for visiting facilities related with the OAKSTAR programme,which are largely based in the United States, save for the MONKEYROCKET source, which has information forwarded to the European Technical Center in Germany: see the Intercept article The NSA Worked To “track Down” Bitcoin […]
TOP SECRET//COMINT//NOFORN (U) OAKSTAR Travel Handbook: A Guide for Traveling Initials Revision 20060925 Initial draft template 20061124 Initial draft for site 20061130 ...
0.0

OAKSTAR Weekly Update – 5 April 2013

Document

Release Date: 2018-03-20 Document Date: 2012-04-01
This internal NSA technical update from March 2013 provides metrics about the information from the access point codenamed MONEYROCKET, which was the NSA’s source for tracking Bitcoin users: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
TOP SECRET//COMINT//NOFORN OAKSTAR Weekly Update Program Highlights Week of: March 30-April 5, 2013 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 TOP SECRET//CO...
0.0

OAKSTAR Weekly Update – 15 March 2013

Document

Release Date: 2018-03-20 Document Date: 2013-03-01
This internal NSA technical newsletter states that the source of information codenamed MONEYROCKET is collecting information on “senders and receivers of bitcoin” and users Liberty Reserve: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
TOP SECRET//COMINT//NOFORN OAKSTAR Weekly Update Program Highlights Week of: March 9-15, 2013 ETS: Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 TOP SECRET//C...
0.0

FAIRVIEW TDY Handbook

Document

Release Date: 2016-11-16 Document Date: 2013-02-06
This internal document for NSA employees dated 6 February 2013 provides a guide for visiting facilities related with the FAIRVIEW programme, including the TITANPOINTE building in New York City: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20301121 FAIRVIEW TDY Handbook (U) A guide for traveling to Site Last Updated: 6 February 2013 POC: I Derived From: NSA/CSSM 1-52 Date...
0.0

SHELLTRUMPET Processes it’s One Trillionth Metadata Record

Document

Release Date: 2014-05-13 Document Date: 2012-12-31
This 31 December 2012 post from the NSA’s intranet describes the scale of the metadata records handled by the SHELLTRUMPET analysis tool: see the book No Place To Hide, 13 May 2014.
Page 100 (S//SI//REL TO USA, FVEY) SHELLTRUMPET Processes it|'s One Trillionth Metadata Record (S//SI//REL TO USA, FVEY) On December 21, 2012 SHELLTRUMPET processed its One Trillionth meta...
0.0

OAKSTAR Weekly Update – 29 March 2013

Document

Release Date: 2018-03-20 Document Date: 2012-03-01
This internal NSA technical update from March 2013 provides metrics about the information from the access point codenamed MONEYROCKET, which was the NSA’s source for tracking Bitcoin users: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
TOP SECRET//COMINT//NOFORN OAKSTAR Weekly Update Program Highlights Week of: March 23-29, 2013 ETS: Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 TOP SECRET//...
0.0

Update software on all Cisco ONS nodes

Document

This NSA report dated 11 April 2014 describes the difficulties with the network switches the agency had compromised on Cisco devices in order to collect data from Cisco customers: see the book No Place To Hide, 13 May 2014.
Page 150 TOP SECRET//COMINT//REL TO USA, FVEY (Report generated on:4/11/2013 3:31:05PM ) NewCrossProgram | Active ECP Count: | i~~| CrossProgram-1-13 New ECP Lead: I name redacted"! ...
0.0

Special Source Operations Weekly – 14 March 2013

Document

Release Date: 2014-06-18 Document Date: 2013-03-14
This excerpt from the 14 March 2013 edition of internal NSA newsletter SSO Weekly describes an incident on 12 March where “unwitting” contractors discovered a cable tap known as WHARPDRIVE, which had to be discreetly reinstalled and provides details about the Breckenridge access point that corroborate the identification of the NSA’s corporate partner STORMBREW as […]
UNCLASSIFIED//FOR OFFICIAL USE ONLY 14 MARCH 2013 Special Source Operations Watkly UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY (U) CORPORATE TEAM ...
0.0

New FAA702 Certification in the Works – Cyber Threat

Document

Release Date: 2015-06-04 Document Date: 2012-03-23
This NSA memo from 23 March 2012 presentation describes the agency’s proposal for a fourth FAA 702 certification that would allow it to target hackers “tied to malicious cyber activity”: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.
(TS//SI//NF) New FAA702 Certification in the Works - Cyber Threat By on 2012-03-23 1423 (TS//SI//NF) NSA has drafted a new FAA702 Certification to target Cyber Threats. It is close to being r...
0.0

SSO FAIRVIEW Overview

Document

Release Date: 2015-08-15
This undated NSA Special Source Operations presentation describes the agency’s relationship with corporate partner AT&T, codenamed FAIRVIEW: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
TOP SECRET//SI/OC//NOFORN CAIDVICUU SSO FAIRVIEW Overview TOP SECRET//SI/OC//NOFORN • (U) FAIRVIEW DEFINED • (U) OPERATIONAL AUTHORITIES/CAPABILITIES • (U) STATS: WHO IS USING D...
0.0

Entries From Sample SSO Accesses

Document

Release Date: 2018-03-20
This extract from an undated NSA document describes how MONEYROCKET operates – an unspecified international cable is tapped and that data is then forwarded to the agency’s European Technical Center in Wiesbaden: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
OAKSTAR - Corporate program where covernames are mainly unrelated companies - 9 accesses over 7 corps. est 2004 MONKEYROCKET - Foreign cable site collecting ME, EUR, South American, and Asian ...
0.0

OAKSTAR Weekly Update – 22 March 2013

Document

Release Date: 2018-03-20 Document Date: 2013-03-01
This internal NSA technical update from March 2013 makes it clear that information from the access point codenamed MONEYROCKET, which tracked Bitcoin users, could be accessed through the agency’s main search interface for analysts, XKeyScore: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
TOP SECRET//COMINT//NOFORN OAKSTAR Weekly Update Program Highlights Week of: March 16-22, 2013 ETS: PRIMECANE Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 T...
0.0

ORANGE CRUSH

Document

Release Date: 2014-05-13
This undated NSA document describes a new data collection stream from Poland, demonstrating how the NSA’s relationships with governments and corporate partners can interact: see the book No Place To Hide, 13 May 2014.
Page 106 (TS//SI//NF) ORANGECRUSH, part of the OAKSTAR program under SSO's corporate portfolio, began forwarding metadata from a third party partner site (Poland) to NSA repositories as of 3 ...
0.0

Cyber Threats and Special Source Operations

Document

Release Date: 2015-08-15 Document Date: 2013-03-22
This NSA Special Source Operations presentation from 22 March 2013 supplies a detail about the Breckenridge access point that supports the identification of the corporate partner codenamed STORMBREW as US telecommunications company Verizon: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
TOP SECRET//COMINT//NOFORN TOP SECRET//COMINT//NOFORN TOPSECRET//SI//REL USA, Cyber Threats and Special Source Operations A Current Perspective for NTOC March 22 2013 Classified...
0.0

SSO Corporate Portfolio Overview

Document

Release Date: 2015-08-15
This undated NSA presentation, presented together with speaking notes, provides an introduction to the main cable access programmes facilitated by the agency’s corporate partners and specifies the relevant SIGADs: see the book No Place to Hide, 13 May 2014.
SSO Corporate Portfolio Overview Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 203612011 What is SSO’s Corporate Portfolio? What data can we collect? Where do I go for...
0.0

SSO dictionary – MONKEYROCKET

Document

Release Date: 2018-03-20
This extract is taken from an undated dictionary produced by NSA Special Source Operations: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
MONKEYROCKET (TS//SI//NF) A pending OAKSTAR access. Collection of full-take data sessions, and user data such as billing information and Internet Protocol addresses of selected CT targets utilizing...
0.0

OAKSTAR Weekly Update – 8 March 2013

Document

Release Date: 2018-03-20 Document Date: 2013-03-01
This internal NSA technical update from March 2013 describes a source of information codenamed MONEYROCKET, which provides data on users of the digital currency Bitcoin: see the Intercept article The NSA Worked To “track Down” Bitcoin Users, Snowden Documents Reveal, 20 March 2018.
TOP SECRET//COMINT//NOFORN OAKSTAR Weekly Update Program Highlights Week of: March 2-8, 2013 ETS: Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20320108 TOP SECRET//COMI...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh