Filtered By
PINWALEX
Codewords [filter]
Results
34 Total
1.0

FASHIONCLEFT Interface Control Document

Document

Document Date: 2009-06-15Release Date: 2015-01-17
This internal NSA document dated 15 June 2009 describes a protocol the agency uses to exfiltrate data from its computer network exploitation operations: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Classification: TOP SECRET//COMINT//X1 // COMINT // XI FASHIONCLEFT Interface Control Document Updated: 15 June 2009 Document Number: TAO.DNT_SE07_005_V1.1 28 March 2005 FASHIONCLE...
1.0

Advanced HTTP Activity Analysis

Document

Document Date: 2009-01-01Release Date: 2015-07-01
This 114-page NSA training presentation from 2009 explains how agency analysts can exploit HTTP traffic within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
Advanced HTTP Activity Analysis 2009 Goal The goal of this training is to get you familiar with basic HTTP traffic and understand how to target and expliot it using X-KEYSCORE Ag...
1.0

SSO Corporate Portfolio Overview

Document

Release Date: 2015-08-15
This undated NSA presentation, presented together with speaking notes, provides an introduction to the main cable access programmes facilitated by the agency’s corporate partners and specifies the relevant SIGADs: see the book No Place to Hide, 13 May 2014.
 SSO Corporate Portfolio Overview Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20361201 Agenda 2 What is SSO Corporate access collection? (TS//SI//NF) Access an...
1.0

Special Source Operations overview

Document

Release Date: 2013-11-04
This presentation gives an overview of the NSA’s programmes targeting the fibre optic cables that carry much of the world’s internet traffic. One slide gives a breakdown of which data sources form the basis of Presidential daily briefings. Another shows that the access point used to collect Yahoo and Google cloud data (MUSCULAR) is operated […]
TOP SECRET//COMINT//NOFORN Special Source Operations r The Cryptologic Provider of Intelligence from GlobalHigh-Capacity Telecommunications Systems P TOP SECRET//COMINT//NOFORN TO...
1.0

RAMPART-A Sites

Document

Release Date: 2014-06-18
These three undated NSA Special Source Operation slides supply details on selected RAMPART-A cable access sites: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 18 June 2014.
TOP SECRET//COMINT//NOFORN RAMPART A Sites Five sites, 4 with a Trusted 3rd Party Partner ■ US-3127!VH AZUREPHOENIX**4mb BW/1 Ogb/day ■ US-3145/KX MOONLIGHTPATH** - ~2mb BW/5gb/day ...
1.0

XKEYSCORE, Cipher Detection, and You!

Document

Document Date: 2008-08-21Release Date: 2013-12-11
This presentation from NSA’s Mathematics Research Group, dated 21 August 2008 provides an introduction to the XKeyScore system’s data sources and fingerprinting capabilities: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
xks-cipher-detection-and-you-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, FVEY , Cipher Detection, and You! Mathematics Research Group 21 August 2008 TOP SECRET//COMINT//REL TO USA, F...
1.0

User-agents: Why and How and How to

Document

Document Date: 2010-07-01Release Date: 2015-07-01
This NSA presentation from July 2010 explains the User-agent options within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
user-agents-p1-normal.gif: TOP SECRET//COMINT//REL TO USA. FVEY (S//SI//REL) User-agents: Why and How and How to The overall classification of this briefing to TOP SECRET//COMINT//REL TO US...
1.0

CNE Analysis in XKeyScore

Document

Document Date: 2009-10-15Release Date: 2015-07-01
This NSA presentation from 15 October 2009 explains how analysts can exploit the products of the agency’s CNE hacking operations within XKeyScore and provides examples with screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CNE Analysis in XKEYSCORE 15 October 2009 xkeyscore@nsa.ic.gov l@nsa.ic.gov) y >M 1-5 TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL DERIVED F ROM: Ñ WCSSM 1-52 DATED: 2...
1.0

SIGDEV: Is It Time for a ‘Target Reboot’?

Document

Document Date: 2011-03-23Release Date: 2015-11-18
This 23 March 2011 article from the internal NSA newsletter SIDToday describes an analyst’s surprise at discovering that the agency was collecting internal communications from Venezuelan energy company Petróleos de Venezuela (PDVSA): see the Intercept article Overwhelmed NSA Surprised To Discover Its Own Surveillance “Goldmine” on Venezuela’s Oil Executives, 18 November 2015.
sigdev-is-it-time-for-a-target-reboot-p1-normal.gif: DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL Welcome! Saturday, 10 Nov 2012 ...
1.0

FAIRVIEW Dataflow Diagrams

Document

Document Date: 2012-04-01Release Date: 2015-08-15
This April 2012 NSA presentation uses an AT&T specific term – Common Backbone or CBB – to refer to the Internet backbone of the corporate partner it codenames FAIRVIEW: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
flip Dataflow Diagrams April 2012 Note: Please refer to previous diagrams for decommissioned systems. Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20361101 Corporate...
1.0

XKeyScoreTabs XKS Development

Document

Release Date: 2014-06-18
This page from GCHQ’s internal GCWiki provides a guide to the NSA’s XKeyScore tool: see the Der Spiegel article The NSA in Germany: Snowden’s Documents Available for Download, 18 June 2014.
XKeyscoreTabs XKS Development Jump to: navigation. search N BWS Getting __ . I Using an ---- „ XKevscure Account Training XKS Development XKS Cuntacts Requirem...
1.0

Fielded Capability: End-to-End VPN SPIN 9 Design Review

Document

Release Date: 2014-12-28
This undated NSA presentation describes the Spin 9 system for decrypting VPN data: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
The overall classification for this brief is: TOPSECRET//COMINT//REL USA, AUS, CAN, GBR, NZL//20320108 SPIN 9 Design Review TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL//20320108 VPN ...
1.0

VALIANTSURF WikiInfo page

Document

Release Date: 2014-12-28
This undated page from NSA’s internal WikiInfo describes VALIANTSURF “the coverterm for the development of Data Network Cipher (DNC) exploitation capabilities in TURMOIL”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
VALIANTSURF - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLE//ORCON/PROPIN/RELIDO/REL TO USA, FVEY * TOP SECRET1/SI/10RCON1REL TO USA, FVEY ...
1.0

BYZANTINE HADES: An Evolution of Collection

Document

Document Date: 2010-06-01Release Date: 2015-01-17
This June 2010 NSA presentation for the SIGDEV conference describes efforts to trace a suspected Chinese cyber attack: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL (S//REL)BYZANTINE HADES: An Evolution of Collection NTOC, V225 SIGINT Development Conference June 2010 TOP SECRET//COMINT//REL TO...
1.0

DNI 101 How Do I Begin Analyzing a Target’s Email Address?

Document

Release Date: 2015-07-01
This undated NSA document provides a decision tree for the analysis of email addresses, IP addresses, cookies and phone numbers in XKeyScore and other agency tools: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//20291123 DNI101 How Do I Begin Analyzing a Target's Email Address? TOP SECRET//COMINT//20291i23 [ =Tool/Database^ What Things Are Found Doing DNI Analysis and What...
1.0

SSO FAIRVIEW Overview

Document

Release Date: 2015-08-15
This undated NSA Special Source Operations presentation describes the agency’s relationship with corporate partner AT&T, codenamed FAIRVIEW: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
TOP SECRET//SI/OC//NOFORN CAIDVICUU SSO FAIRVIEW Overview TOP SECRET//SI/OC//NOFORN • (U) FAIRVIEW DEFINED • (U) OPERATIONAL AUTHORITIES/CAPABILITIES • (U) STATS: WHO IS USING D...
1.0

PRISM/US-984XN Overview

Document

Document Date: 2013-04-01Release Date: 2013-06-06
Nineteen slides from a 41-slide April 2013 NSA presentation describing the PRISM collection of data via internet service providers, “the SIGAD most used in NSA reporting.” Slides have been published gradually by several media organisations: see the Washington Post article NSA slides explain the PRISM data-collection program, 6 June 2013.
01.jpg: PRISM/U S-984XN Overview OR The SIGAD Used Most in NS A Reporting Overview April 2013 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20360901 OP SECRET/...
1.0

SSO Collection Optimization overview

Document

Document Date: 2012-01-01Release Date: 2013-10-14
This NSA Special Source Operations presentation describes the agency’s collection of webmail address books and contact lists: see the Washington Post article NSA collects millions of e-mail address books globally, 14 October 2013.
TOP SECRET//SI//NOFORN SSO Collection Optimization Core SSO Team: TOP SECRET//SI//NOFORN TOP SECRET//SI//NOFORN Address Books • Email address books for most major webmail are col...
1.0

AURORAGOLD Working Group

Document

Document Date: 2012-06-06Release Date: 2014-12-04
This 26-page NSA document, originally presented at 2012’s Five Eyes SIGDEV conference, gives a detailed overview of the agency’s information gathering on world mobile phone networks. Some intercepted technical and contact details have been redacted: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//SI//REL TO FVEY (U//FOUO) AURORAGOLD Working Group (S//SI//REL) Shaping understanding of the global GSm/uMTS/LTE landscape SIGDEV Conference - 6 June 2012 This briefing is cl...
1.0

User’s Guide for PRISM Skype Collection

Document

Document Date: 2012-08-01Release Date: 2014-12-28
This NSA document from August 2012 provides guidance for analysts on ordering the PRISM collection of Skype communications, capabilities that were added over the course of 2011: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//NOFORN (TS//SI//NF) User’s Guide For PRISM Skype Collection August 2012 POC For Document: S3531 l. (TS//SI//NF) Introduction a. PRISM Skype collection can be ...
1.0

NSA’s Offensive and Defensive Missions: The Twain Have Met

Document

Document Date: 2011-04-26Release Date: 2015-01-17
This 26 April 2011 SIDToday post from the NSA/CSS Threat Operations Center (NTOC) Hawaii describes how the NSA has developed its capabilities in collecting “other people’s sigint”, for instance in exploiting Chinese operations against the United Nations: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015. […]
SIDToday - NSA's Offensive and Defensive Missions: The Twain Have Met DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) NSA's O...
1.0

APEX Active/Passive Exfiltration

Document

Document Date: 2009-08-01Release Date: 2015-01-17
This NSA TURBULENCE presentation dated August 2009 explains the APEX method of combining passive with active methods to exfiltrate data from networks attacked: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
Active/Passive Exfiltration "go apex" STDP: S32354 & T112, NCSC/C91 August 2009 OP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 TOP SECRET//COMHMT//REL TO USA. AUS. CAN....
1.0

For Media Mining, the Future is Now!

Document

Document Date: 2006-08-01Release Date: 2015-05-05
This 1 August 2006 post from the internal NSA newsletter SIDToday describes advances in the agency’s text-to-speech capability: see the Intercept article The Computers are Listening: How the NSA Converts Spoken Words Into Searchable Text, 5 May 2015. sidtoday-future-is-now-final
(U) For Media Mining, the Future Is Now! FROM: Human Language Technology (S23) Run Date: 08/01/2006 (TS//SI) In the first article on the Human Language Technology Program Management Offi...
1.0

An Easy Way to Win: Using SIGINT to Learn about New Viruses (Project Camberdada)

Document

Document Date: 2010-01-01Release Date: 2015-06-22
This 2010 NSA presentation describes Project Camberdada, an attempt to subvert popular antivirus software by means of surveilling email traffic: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL An Eas Using S about P fwmuuuu IGINT to Learn iew Viruses Project CAMBERDADA ByHH, 1412 (IAD) V252|| Derived From: NSA/CSSM...
1.0

Web Forum Exploitation using XKEYSCORE

Document

Release Date: 2009-07-01
This NSA presentation from July 2009 describes the kinds of information drawn from online forums that can be accessed in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
web-forum-exploitation-using-xks-p1-normal.gif: OPSECRET//COMINT//REL TO USA, AUS. CAN, GBR, NZL Web Forum Exploitation using XKEYSCORE S2I7 July 2009 TOP SECRET//COMINT//REL TO USA,...
1.0

The Unofficial XKEYSCORE User Guide

Document

Release Date: 2015-07-01
This 27-page NSA document, authored by a consultant from contractor Booz Allen Hamilton, provides a step-by-step guide to using XKeyScore, together with screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
unofficial-xks-user-guide-p1-normal.gif: TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108 The Unofficial XKEYSCORE User Guide E92 - ADET Consultant, Booz Allen Hamilton Th...
1.0

X-KEYSCORE as a SIGDEV tool

Document

Document Date: 2009-01-01Release Date: 2015-07-01
This 2009 NSA presentation describes some of the plug ins available and the way the tool relates to other NSA methods for searching internet metadata, with XKeyScore having the broadest capability: see the book No Place To Hide, 13 May 2014.
xks-as-a-sigdev-tool-p1-normal.gif: X-KEYSCORE as a SIGDEV tool 2009 ■EBTxks-as-a-sigdev-tool-p2-normal.gif: What is X-KEYSCORE?xks-as-a-sigdev-tool-p3-normal.gif: TOP SECRET//COMINT//ORC...
1.0

Intro to the VPN Exploitation Process

Document

Document Date: 2010-09-13Release Date: 2014-12-28
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...
1.0

Finding and Querying on Document Metadata

Document

Document Date: 2009-04-01Release Date: 2015-07-01
This NSA presentation from April 2009 explains how analysts can make use of document metadata available through XKeyScore, together with worked examples and screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123 Finding and Querying on Document Metadata tooz|/ 1 Booz|Allen| Hamilton Sigint Development Support / SIGINT Technica...
1.0

United Nations DNI Collection Enabled

Document

Document Date: 2012-04-18Release Date: 2015-08-15
This 18 April 2012 post from the NSA internal newsletter SSO Weekly reveals that AT&T (FAIRVIEW) cooperated with the NSA, under the terms of a FISA court order, to enable the agency to surveil the internet traffic going to and from the United Nations headquarters in New York: see the New York Times article AT&T […]
(TS//SI//NF) United Nations DNI Collection Enabled By on 2012-04-18 0853 (TS//SI//NF) FAIRVIEW and BLARNEY engineers collaborated to enable the delivery of 700Mbps of paired packet switched t...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh