Results
21 Total
0.0
Tech Strings in Documents (aka Tech Extractor) 2009
Document
Release Date:
2015-07-01
Document Date:
2009-12-01
This December 2009 NSA presentation explains how keyword selection works within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-tech-extractor-2009-p1-normal.gif:
TOP SECRET//COMINT//REL TO USA. AUS, CAN, GBR. NZU/20291123
Tech Strings in
Documents
(aka Tech Extractor)
December 2009xks-tech-extractor-2009-p2...
0.0
XKEYSCORE, Cipher Detection, and You!
Document
Release Date:
2013-12-11
Document Date:
2008-08-21
This presentation from NSA’s Mathematics Research Group, dated 21 August 2008 provides an introduction to the XKeyScore system’s data sources and fingerprinting capabilities: see the SVT article FRA part of top-secret hacker project, 11 December 2013.
xks-cipher-detection-and-you-p1-normal.gif:
TOP SECRET//COMINT//REL TO USA, FVEY
, Cipher Detection, and You!
Mathematics Research Group
21 August 2008
TOP SECRET//COMINT//REL TO USA, F...
0.0
SIGINT Development Support II Program Management Review
Document
Release Date:
2016-08-19
Document Date:
2013-04-24
Four slides taken from a 24 April 2013 NSA presentation detail how SECONDDATE man-in-the-middle attacks were used against targets in Pakistan and Lebanon: see the Intercept article The NSA Leak is Real, Snowden Documents Confirm, 19 August 2016.
TOP SECRET//SI//NOFORN
The overall classification of this brief is
(U) SIGINT Development Support II
Program Management Review
► 24 April 2013
TOP SECRET//COMINT//NOFORN
Derived Fro...
0.0
X-KEYSCORE as a SIGDEV tool
Document
Release Date:
2015-07-01
Document Date:
2009-01-01
This 2009 NSA presentation describes some of the plug ins available and the way the tool relates to other NSA methods for searching internet metadata, with XKeyScore having the broadest capability: see the book No Place To Hide, 13 May 2014.
xks-as-a-sigdev-tool-p1-normal.gif:
X-KEYSCORE as a SIGDEV tool
2009
■EBTxks-as-a-sigdev-tool-p2-normal.gif:
What is X-KEYSCORE?xks-as-a-sigdev-tool-p3-normal.gif:
TOP SECRET//COMINT//ORC...
0.0
Norway Gets FORNSAT Collection Capability On Par With NSA’s
Document
Release Date:
2018-03-01
Document Date:
2006-02-09
This 2006 post from the internal NSA newsletter SIDToday describes the opening of VICTORYGARDEN, a “state-of-the-art FORNSAT site”: see the Intercept article Norway Used NSA Technology for Potentially Illegal Spying, 1 March 2018.
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(S) Norway Gets FORNSAT Collection Capability On Par With NSA's
FROM:
FAD's Engineer...
0.0
XKEYSCORE Search Forms
Document
Release Date:
2015-07-01
Document Date:
2009-03-01
This 49-page March 2009 NSA presentation explains how to conduct searches within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
xks-search-forms-p1-normal.gif:
XKEYSCORE
Search Forms
March 2009
El
• *1
... ■
OK
l 1001
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, MZL
1-52
DATED: 20...
0.0
SIGDEV: Is It Time for a ‘Target Reboot’?
Document
Release Date:
2015-11-18
Document Date:
2011-03-23
This 23 March 2011 article from the internal NSA newsletter SIDToday describes an analyst’s surprise at discovering that the agency was collecting internal communications from Venezuelan energy company Petróleos de Venezuela (PDVSA): see the Intercept article Overwhelmed NSA Surprised To Discover Its Own Surveillance “Goldmine” on Venezuela’s Oil Executives, 18 November 2015.
sigdev-is-it-time-for-a-target-reboot-p1-normal.gif:
DYNAMIC PAGE - HIGHEST POSSIBLE CLASSIFICATION
IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
Welcome! Saturday, 10 Nov 2012
...
0.0
VOIP in XKEYSCORE
Document
Release Date:
2015-07-01
Document Date:
2009-03-01
This NSA presentation from March 2009 shows how VOIP intercepts are handled in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
voip-in-xks-p1-normal.gif:
TOP SECRET//COMINT7/REL TO USA. AUS, CAN, GBR, NZL//20291123
VOIP in
XKEYSCORE
March 2009
TOP SECRET//COMINT//REL TO USA. AUS. CAN, GBR, NZL//20291123voip-in-...
0.0
The Unofficial XKEYSCORE User Guide
Document
Release Date:
2015-07-01
This 27-page NSA document, authored by a consultant from contractor Booz Allen Hamilton, provides a step-by-step guide to using XKeyScore, together with screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
unofficial-xks-user-guide-p1-normal.gif:
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20320108
The Unofficial XKEYSCORE User Guide
E92 - ADET
Consultant, Booz Allen Hamilton
Th...
0.0
Introduction to XKS Application IDs and Fingerprints
Document
Release Date:
2015-07-01
Document Date:
2009-08-27
This 60-page NSA presentation from 27 August 2009 explains the use of different kinds of metadata tags in XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123
Application IDs and
Fingerprints
27 August 2009
.... ‘s
01 Ol
A l •
DERIVED FROM: NSA/CSSM...
0.0
DNI 101 How Do I Begin Analyzing a Target’s Email Address?
Document
Release Date:
2015-07-01
This undated NSA document provides a decision tree for the analysis of email addresses, IP addresses, cookies and phone numbers in XKeyScore and other agency tools: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//20291123
DNI101
How Do I Begin Analyzing a Target's Email Address?
TOP SECRET//COMINT//20291i23
[ =Tool/Database^ What Things Are Found Doing DNI Analysis and What...
0.0
CADENCE Read Me
Document
Release Date:
2015-07-01
This undated NSA technical document provides an overview and configuration instructions for the tasking tool CADENCE, which can be integrated with XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
CON Fl DENTIAL//SI
(U/FOUO) CADENCE
Read Me
(U) Overview
(C//SI) CADENCE is a strong selection tasking tool dating back to the days of telegraphy. In the world of
telegraphy, only the t...
0.0
An Easy Way to Win: Using SIGINT to Learn about New Viruses (Project Camberdada)
Document
Release Date:
2015-06-22
Document Date:
2010-01-01
This 2010 NSA presentation describes Project Camberdada, an attempt to subvert popular antivirus software by means of surveilling email traffic: see the Intercept article Popular Security Software Came Under Relentless NSA and GCHQ Attacks, 22 June 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL
An Eas
Using S
about P
fwmuuuu
IGINT to Learn
iew Viruses
Project CAMBERDADA
ByHH, 1412 (IAD)
V252||
Derived From: NSA/CSSM...
0.0
Intro to the VPN Exploitation Process
Document
Release Date:
2014-12-28
Document Date:
2010-09-13
This 13 September 2010 presentation from the NSA’s OTP VPN Exploitation Team explains the work of the division: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
TOP SECRET//COMINT//REL USA, AUS, CAN, GBR, NZL
Intro to the VPN Exploitation
Process
OTP VPN Exploitation Team
S31176
September 13, 2010
TOP SECRET//COMINT//REL USA, AUS, CAN, G...
AGILITY, BLEAKINQUIRY, CADENCE, CORALREEF, FOURSCORE, MAILORDER, PINWALE, SCISSORS, TOYGRIPPE, TURTLEPOWER, XKEYSCORE (XKS)
Afghanistan (AFG/AF), China (CHN/CN), India (IND/IN), Indonesia (IDN/ID), Iran (IRN/IR), Iraq (IRQ/IQ), Japan (JPN/JP), North Korea (PRK/KP), Korea (KOR/KR), Mexico (MEX/MX), Nigeria (NGA/NG), Pakistan (PAK/PK), Russia (RUS/RU), Saudi Arabia (SAU/SA), Somalia (SOM/SO), Turkey (TUR/TR), United States (USA/US)
0.0
FAIRVIEW Dataflow Diagrams
Document
Release Date:
2015-08-15
Document Date:
2012-04-01
This April 2012 NSA presentation uses an AT&T specific term – Common Backbone or CBB – to refer to the Internet backbone of the corporate partner it codenames FAIRVIEW: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.
Dataflow Diagrams
April 2012
Note: Please refer to previous diagrams for decommissioned systems.
Derived From: NSA/CSSM 1-52
Dated: 20070108
Declassify On: 20361101
TOP SECRET//COMIN...
0.0
RAMPART-A Sites
Document
Release Date:
2014-06-18
These three undated NSA Special Source Operation slides supply details on selected RAMPART-A cable access sites: see the Intercept article How Secret Partners Expand NSA’s Surveillance Dragnet, 18 June 2014.
TOP SECRET//COMINT//NOFORN
RAMPART A Sites
Five sites, 4 with a Trusted 3rd Party Partner
■ US-3127!VH AZUREPHOENIX**4mb BW/1 Ogb/day
■ US-3145/KX MOONLIGHTPATH** - ~2mb BW/5gb/day
...
0.0
AURORAGOLD Working Group
Document
Release Date:
2014-12-04
Document Date:
2012-06-06
This 26-page NSA document, originally presented at 2012’s Five Eyes SIGDEV conference, gives a detailed overview of the agency’s information gathering on world mobile phone networks. Some intercepted technical and contact details have been redacted: see the Intercept article Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide, 4 December 2014.
SECRET//SI//REL TO FVEY
(U//FOUO) AURORAGOLD
Working Group
(S//SI//REL) Shaping understanding of
the global GSm/uMTS/LTE landscape
SIGDEV Conference - 6 June 2012
This briefing is cl...
0.0
Guide to using Contexts in XKS Fingerprints
Document
Release Date:
2015-07-01
This undated NSA technical document provides detailed information for performing searches within XKeyScore: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.s
SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL
Guide to using Contexts in XKS Fingerprints
Version 1.0
Example 1
$a = cc('pk') and (web_search('jihad') or document_body('planning
for ...
0.0
Finding and Querying on Document Metadata
Document
Release Date:
2015-07-01
Document Date:
2009-04-01
This NSA presentation from April 2009 explains how analysts can make use of document metadata available through XKeyScore, together with worked examples and screenshots: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123
Finding and
Querying on
Document Metadata
tooz|/
1
Booz|Allen| Hamilton
Sigint Development Support / SIGINT Technica...
0.0
SSO Corporate Portfolio Overview
Document
Release Date:
2015-08-15
This undated NSA presentation, presented together with speaking notes, provides an introduction to the main cable access programmes facilitated by the agency’s corporate partners and specifies the relevant SIGADs: see the book No Place to Hide, 13 May 2014.
SSO Corporate
Portfolio
Overview
Derived From: NSA/CSSM 1-52
Dated: 20070108
Declassify On: 203612011
What is SSO’s Corporate
Portfolio?
What data can we collect?
Where do I go for...
US-990, US-3206, US-3217, US-984, US-3230, US-984X*, US-3247, US-3251, US-3273, US-983, US-3277, US-3140, US-3354, US-3105S1, US-3105S1, US-3150, US-984XR, US-984X2, US-984T, US-984X, US-984X1, US-984P, US-984, US-984, US-984X*, US-3206
BLACKPEARL, BLARNEY, BLUEZEPHYR, CADENCE, COBALTFALCON, COWBOY, DARKTHUNDER, DISHFIRE, FAIRVIEW, OCELOT, MAINWAY (MW), MARINA, MISTRALWIND, MONKEYROCKET, NUCLEON, OAKSTAR, OCTAVE, ORANGEBLOSSOM, ORANGECRUSH, PERFECTSTORM, PINWALE, SERRATEDEDGE, SHIFTINGSHADOW, SILVERZEPHYR (SZ), STEELFLAUTA, STORMBREW, TOYGRIPPE, TWISTEDPATH, WHITESQUALL, XKEYSCORE (XKS), YACHTSHOP, YANKEE
0.0
VALIANTSURF WikiInfo page
Document
Release Date:
2014-12-28
This undated page from NSA’s internal WikiInfo describes VALIANTSURF “the coverterm for the development of Data Network Cipher (DNC) exploitation capabilities in TURMOIL”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.
VALIANTSURF - Wikiinfo
The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLE//ORCON/PROPIN/RELIDO/REL TO USA, FVEY *
TOP SECRET1/SI/10RCON1REL TO USA, FVEY
...
USJ-759, USJ-759A, US-3150, USD-1001TEC, USF-787, USJ-759, USJ-759A, US-3150, US-3301, US-3167, DS-200B, USF-787