Filtered By
SCISSORSX
Codewords [filter]
Results
6 Total
1.0

FAIRVIEW Dataflow Diagrams

Document

Document Date: 2012-04-01Release Date: 2015-08-15
This April 2012 NSA presentation uses an AT&T specific term – Common Backbone or CBB – to refer to the Internet backbone of the corporate partner it codenames FAIRVIEW: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
flip Dataflow Diagrams April 2012 Note: Please refer to previous diagrams for decommissioned systems. Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20361101 Corporate...
1.0

VALIANTSURF WikiInfo page

Document

Release Date: 2014-12-28
This undated page from NSA’s internal WikiInfo describes VALIANTSURF “the coverterm for the development of Data Network Cipher (DNC) exploitation capabilities in TURMOIL”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
VALIANTSURF - Wikiinfo The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLE//ORCON/PROPIN/RELIDO/REL TO USA, FVEY * TOP SECRET1/SI/10RCON1REL TO USA, FVEY ...
1.0

TRANSGRESSION Overview for Pod58

Document

Document Date: 2010-02-07Release Date: 2015-01-17
This 7 February 2010 NSA presentation outlines techniques to “discover, understand, evaluate, and exploit foreign CNE/CNA exploits”: see the Der Spiegel article The Digital Arms Race: NSA Preps America for Future Battle, 17 January 2015.
TOPSECRET//COMINT//REL TO USA, FVEY TRANSGRESSION Overview for Pod58 S31177 7 Feb 2010 DERIVED FROM: NSA/CSSM 1-52 DATED 08 JAN 2007 DECLASSIFY ON: 20320108 TOPSECRET//COMINT//REL T...
1.0

PRISM/US-984XN Overview

Document

Document Date: 2013-04-01Release Date: 2013-06-06
Nineteen slides from a 41-slide April 2013 NSA presentation describing the PRISM collection of data via internet service providers, “the SIGAD most used in NSA reporting.” Slides have been published gradually by several media organisations: see the Washington Post article NSA slides explain the PRISM data-collection program, 6 June 2013.
01.jpg: PRISM/U S-984XN Overview OR The SIGAD Used Most in NS A Reporting Overview April 2013 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20360901 OP SECRET/...
1.0

SSO Collection Optimization overview

Document

Document Date: 2012-01-01Release Date: 2013-10-14
This NSA Special Source Operations presentation describes the agency’s collection of webmail address books and contact lists: see the Washington Post article NSA collects millions of e-mail address books globally, 14 October 2013.
TOP SECRET//SI//NOFORN SSO Collection Optimization Core SSO Team: TOP SECRET//SI//NOFORN TOP SECRET//SI//NOFORN Address Books • Email address books for most major webmail are col...
1.0

Intro to the VPN Exploitation Process

Document

Document Date: 2010-09-13Release Date: 2014-12-28
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL Intro to the VPN Exploitation Process OTP VPN Exploitation Team S31176 September 13, 2010 TOP SECRET//COMINT//REL USA, AUS, CAN, G...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh